WorldWideScience

Sample records for human engineered security

  1. Unmasking the social engineer the human element of security

    CERN Document Server

    Hadnagy, Christopher

    2014-01-01

    Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the c

  2. Human engineering considerations in designing a computerized controlled access security system

    International Nuclear Information System (INIS)

    Moore, J.W.; Banks, W.W.

    1988-01-01

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  3. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  4. Human engineering

    International Nuclear Information System (INIS)

    Yang, Seong Hwan; Park, Bum; Gang, Yeong Sik; Gal, Won Mo; Baek, Seung Ryeol; Choe, Jeong Hwa; Kim, Dae Sung

    2006-07-01

    This book mentions human engineering, which deals with introduction of human engineering, Man-Machine system like system design, and analysis and evaluation of Man-Machine system, data processing and data input, display, system control of man, human mistake and reliability, human measurement and design of working place, human working, hand tool and manual material handling, condition of working circumstance, working management, working analysis, motion analysis working measurement, and working improvement and design in human engineering.

  5. Systems Security Engineering

    Science.gov (United States)

    2010-08-22

    environment that contains network- borne cybersecurity threats, an argument may be made that the firewall increases overall system functionality by reserving...the number of administered devices. This approach to security analysis is at once old and new. In the early days of eCommerce , security

  6. Security and trust requirements engineering

    NARCIS (Netherlands)

    Giorgini, P.; Massacci, F.; Zannone, N.; Aldini, A.; Gorrieri, R.; Martinelli, F.

    2005-01-01

    Integrating security concerns throughout the whole software development process is one of today’s challenges in software and requirements engineering research. A challenge that so far has proved difficult to meet. The major difficulty is that providing security does not only require to solve

  7. Security systems engineering overview

    International Nuclear Information System (INIS)

    Steele, B.J.

    1996-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.)

  8. Security systems engineering overview

    Science.gov (United States)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  9. A human engineering and ergonomic evaluation of the security access panel interface

    International Nuclear Information System (INIS)

    Hartney, C.; Banks, W.W.

    1995-02-01

    The purpose of this study was to empirically determine which of several security hardware interface designs produced the highest levels of end-user performance and acceptance. The FESSP Security Alarms and Monitoring Systems program area commissioned the authors study as decision support for upgrading the Argus security system's primary user interface so that Argus equipment will support the new DOE and DoD security access badges. Twenty-two test subjects were repeatedly tested using six remote access panel (RAP) designs. Lawrence Livermore National Laboratory (LLNL) uses one of these interface designs in its security access booths. Along with the RAP B insert-style reader, the authors tested five prototype RAP variants, each with a different style of swipe badge reader, through which a badge is moved or swiped. The authors asked the untrained test subjects to use each RAP while they described how they thought they should respond so that the system would operate correctly in reading the magnetic strip on a security badge. With each RAP variant, subjects were required to make four successful card reads (swipes) in which the card reader correctly read and logged the transaction. After each trial, a subject completed a 10-item interface acceptance evaluation before approaching the next RAP. After interacting with the RAP interfaces (for a total of the six RAP trials), each subject completed a 7-item overview evaluation that compared and ranked the five experimental RAPs, using the original (RAP B) insert style as a standard

  10. Human factors in network security

    OpenAIRE

    Jones, Francis B.

    1991-01-01

    Human factors, such as ethics and education, are important factors in network information security. This thesis determines which human factors have significant influence on network security. Those factors are examined in relation to current security devices and procedures. Methods are introduced to evaluate security effectiveness by incorporating the appropriate human factors into network security controls

  11. Information technology security system engineering methodology

    Science.gov (United States)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  12. Security Research on Engineering Database System

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, ...

  13. A Research Agenda for Security Engineering

    Directory of Open Access Journals (Sweden)

    Rich Goyette

    2013-08-01

    Full Text Available Despite nearly 30 years of research and application, the practice of information system security engineering has not yet begun to exhibit the traits of a rigorous scientific discipline. As cyberadversaries have become more mature, sophisticated, and disciplined in their tradecraft, the science of security engineering has not kept pace. The evidence of the erosion of our digital security – upon which society is increasingly dependent – appears in the news almost daily. In this article, we outline a research agenda designed to begin addressing this deficit and to move information system security engineering toward a mature engineering discipline. Our experience suggests that there are two key areas in which this movement should begin. First, a threat model that is actionable from the perspectives of risk management and security engineering should be developed. Second, a practical and relevant security-measurement framework should be developed to adequately inform security-engineering and risk-management processes. Advances in these areas will particularly benefit business/government risk assessors as well as security engineers performing security design work, leading to more accurate, meaningful, and quantitative risk analyses and more consistent and coherent security design decisions. Threat modelling and security measurement are challenging activities to get right – especially when they need to be applied in a general context. However, these are decisive starting points because they constitute the foundation of a scientific security-engineering practice. Addressing these challenges will require stronger and more coherent integration between the sub-disciplines of risk assessment and security engineering, including new tools to facilitate that integration. More generally, changes will be required in the way security engineering is both taught and practiced to take into account the holistic approach necessary from a mature, scientific

  14. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  15. Security Engineering FY17 Systems Aware Cybersecurity

    Science.gov (United States)

    2017-12-07

    Security Engineering – FY17 Systems Aware Cybersecurity Technical Report SERC-2017-TR-114 December 7 2017 Principal Investigator: Dr...December 7, 2017 Copyright © 2017 Stevens Institute of Technology, Systems Engineering Research Center The Systems Engineering Research Center (SERC...supported, in whole or in part, by the U.S. Department of Defense through the Office of the Assistant Secretary of Defense for Research and Engineering (ASD

  16. Securing Humanity - Situating 'Human Security' as Concept and Discourse

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2005-01-01

    markdownabstractAbstract The label ‘human security’ (HS) has attracted much attention since the 1994 Human Development Report, but there are numerous conflicting definitions and agendas and widespread scepticism. The Ogata-Sen Commission report Human Security Now has proposed a unified yet

  17. Human security policy challenges

    Directory of Open Access Journals (Sweden)

    Andrew Morton

    2008-10-01

    Full Text Available All evidence points towards climate- and environmentallyinduced migration becoming one of the major policychallenges of this century. Adequate planning for andmanagement of this phenomenon will be critical forhuman security.

  18. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  19. Human Rights, Human Needs, Human Development, Human Security

    OpenAIRE

    Gasper, Des

    2009-01-01

    Human rights, human development and human security form increasingly important, partly interconnected, partly competitive and misunderstood ethical and policy discourses. Each tries to humanize a pre-existing and unavoidable major discourse of everyday life, policy and politics; each has emerged within the United Nations world; each relies implicitly on a conceptualisation of human need; each has specific strengths. Yet mutual communication, understanding and co-operation are deficient, espec...

  20. Security, Privacy, and Applied Cryptography Engineering

    DEFF Research Database (Denmark)

    This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012. The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized...... and applications, high-performance computing in cryptology and cryptography in ubiquitous devices....

  1. Security and computer forensics in web engineering education

    OpenAIRE

    Glisson, W.; Welland, R.; Glisson, L.M.

    2010-01-01

    The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually. Security is frequently taught as a stand-alone course, assuming that security can be 'bolted on' to a web application at some point. Security issues must be integrated into Web Engineering processes right from the beginning to create secure solutions and therefore security shou...

  2. Pattern and security requirements engineering-based establishment of security standards

    CERN Document Server

    Beckers, Kristian

    2015-01-01

    Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard

  3. Human Engineering Procedures Guide

    Science.gov (United States)

    1981-09-01

    Research Laboratory AFETR Air Force Eastern Test Range AFFTC Air Force Flight Test Center AFHRL Air Force Human Resources Laboratory AFR Air Force...performance requirements through the most effective use of man’s performance capability. 13 Human Engineering is one of five elements in the Human...applied judiciously and tailored to fit * the program or program phase and the acquisition strategy to achieve cost effective acquisition and life cycle

  4. Systems Security Engineering Capability Maturity Model SSE-CMM Model Description Document

    National Research Council Canada - National Science Library

    1999-01-01

    The Systems Security Engineering Capability Maturity Model (SSE-CMM) describes the essential characteristics of an organization's security engineering process that must exist to ensure good security engineering...

  5. Security Requirements Management in Software Product Line Engineering

    Science.gov (United States)

    Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario

    Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.

  6. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  7. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  8. Security requirements engineering : the SI* modeling language and the Secure Tropos methodology

    NARCIS (Netherlands)

    Massacci, F.; Mylopoulos, J.; Zannone, N.; Ras, Z.W.; Tsay, L.-S.

    2010-01-01

    Security Requirements Engineering is an emerging field which lies at the crossroads of Security and Software Engineering. Much research has focused on this field in recent years, spurred by the realization that security must be dealt with in the earliest phases of the software development process as

  9. Model-based security engineering for the internet of things

    OpenAIRE

    NEISSE RICARDO; STERI GARY; NAI FOVINO Igor; BALDINI Gianmarco; VAN HOESEL Lodewijk

    2015-01-01

    We propose in this chapter a Model-based Security Toolkit (SecKit) and methodology to address the control and protection of user data in the deployment of the Internet of Things (IoT). This toolkit takes a more general approach for security engineering including risk analysis, establishment of aspect-specific trust relationships, and enforceable security policies. We describe the integrated metamodels used in the toolkit and the accompanying security engineering methodology for IoT systems...

  10. Human Rights, Human Needs, Human Development, Human Security - Relationships between four international human discourses.

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2007-01-01

    markdownabstractAbstract: Human rights, human development and human security form increasingly important, partly interconnected, partly competitive and misunderstood ethical and policy discourses. Each tries to humanize a pre-existing and unavoidable major discourse of everyday life, policy and

  11. Medical devices and human engineering

    CERN Document Server

    Bronzino, Joseph D

    2014-01-01

    Known as the bible of biomedical engineering, The Biomedical Engineering Handbook, Fourth Edition, sets the standard against which all other references of this nature are measured. As such, it has served as a major resource for both skilled professionals and novices to biomedical engineering.Medical Devices and Human Engineering, the second volume of the handbook, presents material from respected scientists with diverse backgrounds in biomedical sensors, medical instrumentation and devices, human performance engineering, rehabilitation engineering, and clinical engineering.More than three doze

  12. Financial engineering on the corporate debt securities market of Ukraine

    OpenAIRE

    Bui, T.

    2009-01-01

    The approaches to the definition of financial engineering and its methods are highlighted, advisability of application of the new securities types created on the basis of financial engineering in Ukrainian corporate financing is grounded.

  13. Process Security in Chemical Engineering Education

    Science.gov (United States)

    Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.

    2005-01-01

    The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…

  14. Engineering Principles for Information Technology Security (A Baseline for Achieving Security)

    National Research Council Canada - National Science Library

    Stoneburner, Gary

    2001-01-01

    The purpose of the Engineering Principles for Information Technology (IT) Security (HP-ITS) is to present a list of system-level security principles to he considered in the design, development, and operation of an information system...

  15. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  16. Functional Security Model: Managers Engineers Working Together

    Science.gov (United States)

    Guillen, Edward Paul; Quintero, Rulfo

    2008-05-01

    Information security has a wide variety of solutions including security policies, network architectures and technological applications, they are usually designed and implemented by security architects, but in its own complexity this solutions are difficult to understand by company managers and they are who finally fund the security project. The main goal of the functional security model is to achieve a solid security platform reliable and understandable in the whole company without leaving of side the rigor of the recommendations and the laws compliance in a single frame. This paper shows a general scheme of the model with the use of important standards and tries to give an integrated solution.

  17. Human Security Concept in the UN Practice

    Directory of Open Access Journals (Sweden)

    Svetlana Alexandrovna Bokeriya

    2017-12-01

    Full Text Available This article is devoted to the theme, scientific actuality and practical relevance of which is not in doubt, and is caused by a new wave of interest in human security. The human security concept has been the subject of active discussions on national and international security forums for the past 10 years. This article is focused on the human security concept evolution in the framework of the UN in conditions of the growing challenges and threats as well as polycentric world and international relations transformation. The author turned to the analysis of human security issues in the UN human rights dimension, as this organization performs a key role in the application and implementation of the concept on a global scale. The detailed periodization of human security development within the UN is presented for the first time. The analysis of the situation with Syrian refugees in Lebanon is carried out in the format of a case study. Author has made an attempt to undertake not a comprehensive analysis of the concept within the UN, but re-evaluation of new trends and dominant problems in practical application of human security idea and its impact on the effectiveness of international organizations.

  18. Human security from paradigm shift to operationalisation: job description for a human security worker

    NARCIS (Netherlands)

    Glasius, M.

    2008-01-01

    This article shows how human security has functioned as both a paradigm-shifting and a bridging concept, with its most significant implications being, first, the shift from a focus on state security to one on human rights, and, second, the indivisibility of physical and material security. The

  19. Modern Human Engineering

    International Nuclear Information System (INIS)

    Jeong, Byeong Yong; Lee Dong Kyeong

    2005-08-01

    These are the titles of each chapter. They are as in the following; design of human-centerdness, human machine system, information processing process, sense of human, user interface, elements of human body, vital dynamics, measurement of reaction of human body, estimation and management of working environment, mental characteristic of human, human error, group, organization and leadership, safety supervision, process analysis, time studying, work sampling, work factor and methods time measurement, introduction of muscular skeletal disease and program of preventive management.

  20. Modern Human Engineering

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, Byeong Yong; Lee Dong Kyeong

    2005-08-15

    These are the titles of each chapter. They are as in the following; design of human-centerdness, human machine system, information processing process, sense of human, user interface, elements of human body, vital dynamics, measurement of reaction of human body, estimation and management of working environment, mental characteristic of human, human error, group, organization and leadership, safety supervision, process analysis, time studying, work sampling, work factor and methods time measurement, introduction of muscular skeletal disease and program of preventive management.

  1. The production of human security in premodern and contemporary history

    OpenAIRE

    Zwierlein, Cornel; Graf, Rüdiger

    2010-01-01

    "Since the end of the Cold War, Human Security has become an important approach in international politics, law, and political science. In contrast to the so-called 'Westphalian System' that knows only states as subjects and objects of security, human security aims at the security of individual human beings if failed or failing states do not protect them nor provide for their basic needs. Thereby, such heterogeneous forms of security as security from war, food security, energy security or secu...

  2. Development of security engineering curricula at US universities

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, M.L.

    1998-08-01

    The Southwest Surety Institute was formed in June 1996 by Arizona State University (ASU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL) to provide educational programs in Security Engineering, and to conduct research and development in security technologies. This is the first science-based program of its kind in the US, focused on educating Security Engineers to help government and industry address their security needs. Each member brings a unique educational capability to the Institute. NM Tech has a formidable explosives testing and evaluation facility. ASU is developing a Masters program in Security Engineering at their School of Technology located on a new campus in Mesa, Arizona. NMSU provides a Security Technology minor, merging programs in Criminal Justice and Engineering Technology. The Sandia National Laboratories security system design and evaluation process forms the basis for the Security Engineering curricula. In an effort to leverage the special capabilities of each university, distance education will be used to share courses among Institute members and eventually with other sites across the country.

  3. How to Compare the Security Quality Requirements Engineering (SQUARE) Method with Other Methods

    National Research Council Canada - National Science Library

    Mead, Nancy R

    2007-01-01

    The Security Quality Requirements Engineering (SQUARE) method, developed at the Carnegie Mellon Software Engineering Institute, provides a systematic way to identify security requirements in a software development project...

  4. Spent fuel reprocessing system security engineering capability maturity model

    International Nuclear Information System (INIS)

    Liu Yachun; Zou Shuliang; Yang Xiaohua; Ouyang Zigen; Dai Jianyong

    2011-01-01

    In the field of nuclear safety, traditional work places extra emphasis on risk assessment related to technical skills, production operations, accident consequences through deterministic or probabilistic analysis, and on the basis of which risk management and control are implemented. However, high quality of product does not necessarily mean good safety quality, which implies a predictable degree of uniformity and dependability suited to the specific security needs. In this paper, we make use of the system security engineering - capability maturity model (SSE-CMM) in the field of spent fuel reprocessing, establish a spent fuel reprocessing systems security engineering capability maturity model (SFR-SSE-CMM). The base practices in the model are collected from the materials of the practice of the nuclear safety engineering, which represent the best security implementation activities, reflect the regular and basic work of the implementation of the security engineering in the spent fuel reprocessing plant, the general practices reveal the management, measurement and institutional characteristics of all process activities. The basic principles that should be followed in the course of implementation of safety engineering activities are indicated from 'what' and 'how' aspects. The model provides a standardized framework and evaluation system for the safety engineering of the spent fuel reprocessing system. As a supplement to traditional methods, this new assessment technique with property of repeatability and predictability with respect to cost, procedure and quality control, can make or improve the activities of security engineering to become a serial of mature, measurable and standard activities. (author)

  5. Human Security versus Human Development - Behavioristic Approach

    Directory of Open Access Journals (Sweden)

    Duralia Oana

    2016-08-01

    Full Text Available Recent terrorist attacks in Brussels, Paris and Istanbul, are shaking a world bewildered of daily fear of violence, while the contemporary consumer has to deal with the “new wars” emerging in the context of the current socio-economic and political context. The issue is especially thorny since, most of the times, the “enemy” the citizens must face is unknown, not only when it comes to terrorist attacks, but also when dealing with the question of the “enemy” in foods purchased for consumption (food security or the security of personal data when accessing and using the Internet (cyber security. Consequently, this paper attempts to highlight the way in which the safety and security needs of the contemporary consumer have diversified over time, often becoming determinants of social behavior in general, and of the buying and consumption behavior, in particular.

  6. Human Rights, Human Needs, Human Development, Human Security : Relationships between four international 'human' discourses

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2007-01-01

    textabstractHuman rights, human development and human security form increasingly important, partly interconnected, partly competitive and misunderstood ethical and policy discourses. Each tries to humanize a pre-existing and unavoidable major discourse of everyday life, policy and politics; each

  7. Toward a Theory of Human Security

    OpenAIRE

    Tanaka, Akihiko

    2015-01-01

    Human security” has occupied a significant place in the global discourses of peace, development, and diplomacy, despite often made criticisms of its conceptual ambiguity. Arguing for the merit of a broader definition of human security, i.e. “the right of people to live in freedom and dignity, free from poverty and despair” (UN Resolution A/RES/66/290), this paper offers an interdisciplinary theoretical framework in which key aspects of human security are systematically laid out: types of thr...

  8. Key Future Engineering Capabilities for Human Capital Retention

    Science.gov (United States)

    Sivich, Lorrie

    Projected record retirements of Baby Boomer generation engineers have been predicted to result in significant losses of mission-critical knowledge in space, national security, and future scientific ventures vital to high-technology corporations. No comprehensive review or analysis of engineering capabilities has been performed to identify threats related to the specific loss of mission-critical knowledge posed by the increasing retirement of tenured engineers. Archival data from a single diversified Fortune 500 aerospace manufacturing engineering company's engineering career database were analyzed to ascertain whether relationships linking future engineering capabilities, engineering disciplines, and years of engineering experience could be identified to define critical knowledge transfer models. Chi square, logistic, and linear regression analyses were used to map patterns of discipline-specific, mission-critical knowledge using archival data of engineers' perceptions of engineering capabilities, key developmental experiences, and knowledge learned from their engineering careers. The results from the study were used to document key engineering future capabilities. The results were then used to develop a proposed human capital retention plan to address specific key knowledge gaps of younger engineers as veteran engineers retire. The potential for social change from this study involves informing leaders of aerospace engineering corporations on how to build better quality mentoring or succession plans to fill the void of lost knowledge from retiring engineers. This plan can secure mission-critical knowledge for younger engineers for current and future product development and increased global competitiveness in the technology market.

  9. Introduction to human factors engineering

    International Nuclear Information System (INIS)

    Derfuss, Ch.

    2010-01-01

    Some of the main aspects of human factors engineering are discussed. The following topics are considered: Integration into the design process; Identification and application of human-centered design requirements; Design of error-tolerant systems; Iterative process consisting of evaluations and feedback loops; Participation of operators/users; Utilization of an interdisciplinary design/ evaluation team; Documentation of the complete HFE-process: traceability

  10. Engineering Information Security The Application of Systems Engineering Concepts to Achieve Information Assurance

    CERN Document Server

    Jacobs, Stuart

    2011-01-01

    Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal,

  11. The golden triangle of human dignity: human security, human development and human rights

    NARCIS (Netherlands)

    Gaay Fortman, B. de

    2004-01-01

    The success or failure of processes of democratization cannot be detached from processes of development related to the aspirations of people at the grassroots. Human rights, in a more theoretical terminology, require human development in order to enhance human security.

  12. Engineering secure Internet of Things systems

    CERN Document Server

    Aziz, Benjamin; Crispo, Bruno

    2016-01-01

    This book examines important security considerations for the Internet of Things (IoT). IoT is collecting a growing amount of private and sensitive data about our lives, and requires increasing degrees of reliability and trustworthiness in terms of the levels of assurance provided with respect to confidentiality, integrity and availability.

  13. Engineering security agreements against external insider threat

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; van Cleeff, A.; van Eck, Pascal; Wieringa, Roelf J.

    2013-01-01

    Companies are increasingly engaging in complex inter-organisational networks of business and trading part- ners, service and managed security providers to run their operations. Therefore, it is now common to outsource critical business processes and to completely move IT resources to the custody of

  14. Software Engineering for Human Spaceflight

    Science.gov (United States)

    Fredrickson, Steven E.

    2014-01-01

    The Spacecraft Software Engineering Branch of NASA Johnson Space Center (JSC) provides world-class products, leadership, and technical expertise in software engineering, processes, technology, and systems management for human spaceflight. The branch contributes to major NASA programs (e.g. ISS, MPCV/Orion) with in-house software development and prime contractor oversight, and maintains the JSC Engineering Directorate CMMI rating for flight software development. Software engineering teams work with hardware developers, mission planners, and system operators to integrate flight vehicles, habitats, robotics, and other spacecraft elements. They seek to infuse automation and autonomy into missions, and apply new technologies to flight processor and computational architectures. This presentation will provide an overview of key software-related projects, software methodologies and tools, and technology pursuits of interest to the JSC Spacecraft Software Engineering Branch.

  15. Goal-Equivalent Secure Business Process Re-engineering

    DEFF Research Database (Denmark)

    Acosta, Hugo Andrés Lópes; Massacci, Fabio; Zannone, Nicola

    2008-01-01

    that they are somehow “equivalent”. In this paper we propose a method for passing from SI*, a modeling language for capturing and modeling functional, security, and trust organizational and system requirements, to business process specifications and vice versa. In particular, starting from an old secure business......The introduction of information technologies in health care systems often requires to re-engineer the business processes used to deliver care. Obviously, the new and re-engineered processes are observationally different and thus we cannot use existing model-based techniques to argue...... process, we reconstruct the functional and security requirements at organizational level that such a business process was supposed to meet (including the trust relations that existed among the members of the organization). To ensure that the re-engineered business process meets the elicited requirements...

  16. Security Implications of Human-Trafficking Networks

    Science.gov (United States)

    2007-06-15

    to those security concerns. Background How is Human Trafficking Carried Out? While trafficking victims are often found in sweatshops , domestic...labor. This type of trafficking is often found in agricultural labor, the production of goods (typically called sweatshops ) and construction labor

  17. The study on network security based on software engineering

    Science.gov (United States)

    Jia, Shande; Ao, Qian

    2012-04-01

    Developing a SP is a sensitive task because the SP itself can lead to security weaknesses if it is not conform to the security properties. Hence, appropriate techniques are necessary to overcome such problems. These techniques must accompany the policy throughout its deployment phases. The main contribution of this paper is then, the proposition of three of these activities: validation, test and multi-SP conflict management. Our techniques are inspired by the well established techniques of the software engineering for which we have found some similarities with the security domain.

  18. Master planning for successful safeguard/security systems engineering

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1987-01-01

    The development and phased implementation of an overall master plan for weapons systems and facilities engaged in the complexities of high technology provides a logical road map for system accomplishment. An essential factor in such a comprehensive plan is development of an integrated systems security engineering plan. Some DOD programs use new military regulations and policy directives to mandate consideration of the safeguard/security disciplines be considered for weapons systems and facilities during the entire life cycle of the program. The emphasis is to make certain the weapon system and applicable facilities have complementary security features. Together they must meet the needs of the operational mission and, at the same time, provide the security forces practical solutions to their requirements. This paper discusses the process of meshing the safe- guards/security requirements with an overall the master plan and the challenges attendant to this activity

  19. Development of security engineering curricula at US universities

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, M.L.

    1998-06-01

    The Southwest Surety Institute was formed in 1996 to create unique, science-based educational programs in security engineering. The programs will integrate business, technology, and criminal justice elements to educate a new generation of security professionals. Graduates of the programs will better understand basic security system design and evaluation and contribute to strengthening of the body of knowledge in the area of security. A systematic approach incorporating people, procedures, and equipment will be taught that will emphasize basic security principles and establish the science of security engineering. The use of performance measures in the analysis of designed systems will enable effective decisions by an enterprise and provide the rationale for investment in security systems. Along with educational programs, Institute members will conduct original research and development built on existing relationships with sponsors from government and industry in areas such as counterterroism, microelectronics, banking, aviation, and sensor development. Additional information and updates on the Southwest Surety Institute are available via the Institute home page at www.emrtc.nmt.edu/ssi.

  20. Agent of opportunity risk mitigation: people, engineering, and security efficacy.

    Science.gov (United States)

    Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R

    2010-12-01

    Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk. Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes. We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to "defeat" inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about "open" front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access

  1. Genome engineering in human cells.

    Science.gov (United States)

    Song, Minjung; Kim, Young-Hoon; Kim, Jin-Soo; Kim, Hyongbum

    2014-01-01

    Genome editing in human cells is of great value in research, medicine, and biotechnology. Programmable nucleases including zinc-finger nucleases, transcription activator-like effector nucleases, and RNA-guided engineered nucleases recognize a specific target sequence and make a double-strand break at that site, which can result in gene disruption, gene insertion, gene correction, or chromosomal rearrangements. The target sequence complexities of these programmable nucleases are higher than 3.2 mega base pairs, the size of the haploid human genome. Here, we briefly introduce the structure of the human genome and the characteristics of each programmable nuclease, and review their applications in human cells including pluripotent stem cells. In addition, we discuss various delivery methods for nucleases, programmable nickases, and enrichment of gene-edited human cells, all of which facilitate efficient and precise genome editing in human cells.

  2. Security Engineering and Educational Initiatives for Critical Information Infrastructures

    Science.gov (United States)

    2013-06-01

    content. The curriculum development efforts are accompanied by exercises that expose students to practical tools and resources for security engineering...with relatively simple analytical features, but high pedagogical value. Information Assurance Courses Curriculum development has occurred for...tool chain and accompanying methodology confronts serious challenges posed by large heterogeneous networks (e.g., SCADA and corporate systems) from

  3. Security engineering: systems engineering of security through the adaptation and application of risk management

    Science.gov (United States)

    Gilliam, David P.; Feather, Martin S.

    2004-01-01

    Information Technology (IT) Security Risk Management is a critical task in the organization, which must protect its resources and data against the loss of confidentiality, integrity, and availability. As systems become more complex and diverse, and more vulnerabilities are discovered while attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security. This paper describes an approach to address IT security risk through risk management and mitigation in both the institution and in the project life cycle.

  4. Environmentally-induced displacement and human security

    OpenAIRE

    Terminski, Bogumil

    2012-01-01

    We can distinguish two general causes of internal displacement worldwide: 1. the impact of threats to and ensuing decline in the level of human security below that needed for normal existence in the homeland territory, 2. administrative compulsion to leave the current place of residence. Every year, at least tens of millions of people on all continents are forced to leave their places of residence. The predominant cause is the occurrence of natural disasters, creating the most dynamic categor...

  5. The Theoretical Aspects of the Security of Human Development

    OpenAIRE

    Markova Natalia S.; Demyanenko Alina A.

    2017-01-01

    The article is aimed at substantiating the basic categories of the conception of security of human development and formation of a definition of the concept of «security of human development» that would provide the most comprehensive understanding of the nature of this process. The main approaches to researching the phenomenon of «security» were analyzed. Characteristics of the formation of human security as part of a holistic paradigm of human development were considered together with rethink...

  6. Development of undergraduate nuclear security curriculum at College of Engineering, Universiti Tenaga Nasional

    Science.gov (United States)

    Hamid, Nasri A.; Mujaini, Madihah; Mohamed, Abdul Aziz

    2017-01-01

    The Center for Nuclear Energy (CNE), College of Engineering, Universiti Tenaga Nasional (UNITEN) has a great responsibility to undertake educational activities that promote developing human capital in the area of nuclear engineering and technology. Developing human capital in nuclear through education programs is necessary to support the implementation of nuclear power projects in Malaysia in the near future. In addition, the educational program must also meet the nuclear power industry needs and requirements. In developing a certain curriculum, the contents must comply with the university's Outcomes Based Education (OBE) philosophy. One of the important courses in the nuclear curriculum is in the area of nuclear security. Basically the nuclear security course covers the current issues of law, politics, military strategy, and technology with regard to weapons of mass destruction and related topics in international security, and review legal regulations and political relationship that determine the state of nuclear security at the moment. In addition, the course looks into all aspects of the nuclear safeguards, builds basic knowledge and understanding of nuclear non-proliferation, nuclear forensics and nuclear safeguards in general. The course also discusses tools used to combat nuclear proliferation such as treaties, institutions, multilateral arrangements and technology controls. In this paper, we elaborate the development of undergraduate nuclear security course at the College of Engineering, Universiti Tenaga Nasional. Since the course is categorized as mechanical engineering subject, it must be developed in tandem with the program educational objectives (PEO) of the Bachelor of Mechanical Engineering program. The course outcomes (CO) and transferrable skills are also identified. Furthermore, in aligning the CO with program outcomes (PO), the PO elements need to be emphasized through the CO-PO mapping. As such, all assessments and distribution of Bloom Taxonomy

  7. Architectural model for crowdsourcing for human security threats ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Crowdsourcing for Human Security Threats Situation Information and Response System (CHSTSIRS) is proposed in this paper to report Human Security (HS) ... Keywords: Human security, Crowdsourcing, Threats, Situation Information, Agency, Google, Cloud Messaging ...

  8. Helping the Hacker? Library Information, Security, and Social Engineering

    Directory of Open Access Journals (Sweden)

    Samuel T. C. Thompson

    2006-12-01

    Full Text Available Social engineering is the use of nontechnical means to gain unauthorized access to information or computer systems. While this method is recognized as a major security threat in the computer industry, little has been done to address it in the library field. This is of particular concern because libraries increasingly have access to databases of both proprietary and personal information. This tutorial is designed to increase the awareness of library staff in regard to the issue of social engineering.

  9. The Theoretical Aspects of the Security of Human Development

    Directory of Open Access Journals (Sweden)

    Markova Natalia S.

    2017-10-01

    Full Text Available The article is aimed at substantiating the basic categories of the conception of security of human development and formation of a definition of the concept of «security of human development» that would provide the most comprehensive understanding of the nature of this process. The main approaches to researching the phenomenon of «security» were analyzed. Characteristics of the formation of human security as part of a holistic paradigm of human development were considered together with rethinking it as a new theory of global security. A cross-categorical analysis of the concepts of «human development» and of «human security» was carried out by the main criteria: characteristics, time frames, main purpose and objectives. As a result, the human security is complementary to the concept of human development in the part of safe variants of choice (freedom from needs; it further facilitated the security provision at the level of prosperity and progress, not at the level of survival. It has been determined that the conception of human security is at the same time an element of the conception of human development as well as of human security.

  10. 1 THE HUMANITIES AND NATIONAL IDENTITY, SECURITY AND ...

    African Journals Online (AJOL)

    User

    ethnicity in favour of social stability as a pre-requisite for security. ... Humanities, National Identity, Ethnicity, Security and Political. Stability. .... instability. They are often used in open violence during elections where contending political ...

  11. Creation of security engineering programs by the Southwest Surety Institute

    Science.gov (United States)

    Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn

    1998-12-01

    The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.

  12. Adaptive engineering management tools of enterprise economic security

    Directory of Open Access Journals (Sweden)

    G.E. Krokhicheva

    2018-06-01

    Full Text Available This paper discusses the organizational and methodological foundations and methods exploited to forecast, analyze and scale down threats and risks in the sphere of economic security, to solve the adaptation problems, to implement and to evaluate of the potency of protective measures. The object of the conducted research is associated with various economic activities of the commercial enterprises affiliated in Rostov region. A suggested model of the formation and functioning of adaptive engineering tools for managing economic security in the form of derivative balance of the enterprise resources and the sources of their formation will allow the proprietors, executive board and mana-gerial staff to obtain necessary information within the requested context regarding the enterprise vital economic interests. In addition, the paper pays attention to the methodological aspects of accounting description and estimation of the iterative achievements to meet the desired adaptation results, implemented within the framework of the described iterative algorithm aimed at ensuring strategic prediction.

  13. (Human Security in Central America: A Return to the Past?

    Directory of Open Access Journals (Sweden)

    Jordi Urgell García

    2007-02-01

    Full Text Available After having become one of the principal scenarios of the Cold War, the pacification and democratisation of Central America in the 1990s were forged under the protection of the Esquipulas Process and the birth of the concept of human security. The resulting model of security was founded on the Framework Treaty on Democratic Security, which incorporated some of the basic postulates of human security and became one of its first institutional implementations. Nevertheless, the performance of this model has been eclipsed and questioned by the evolution of events in Central America (such as the impact of 9-11 on security agendas or the emergence of new forms of violence in the region, which open the door to a new security instrument (the Rapid Reaction Force, generate fears about an eventual regression of Central America in the area of security and raise doubts about the habitual assumptions of human security.

  14. HUMAN SECURITY – BUILDING THE POST-2015 DEVELOPMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Andreea IANCU

    2015-04-01

    Full Text Available This article approaches the post-2015 Millennium Development Goals agenda through the human security paradigm. It suggests that the human security paradigm represents “the missing link” from the development agenda. Therefore, this analysis explains the necessity for extending the development agenda by including the human security doctrine. The first part of the article discusses the relation between human security and development. The next section analyzes the values of the Millennium Declaration and the Millennium Development Goals. The last part evaluates the improvements that the inclusion of the human security on the post-2015 development framework may bring. The results of this analysis present illustrate the opportunity of deepening the MDGs agenda with a more realistic and ethical approach, through the inclusion of the human security paradigm within the development agenda.

  15. Security engineering a guide to building dependable distributed systems

    CERN Document Server

    Anderson, Ross

    2008-01-01

    The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

  16. Soil, Food Security and Human Health

    Science.gov (United States)

    Oliver, Margaret

    2017-04-01

    "Upon this handful of soil our survival depends. Husband it and it will grow food, our fuel, and our shelter and surround us with beauty. Abuse it and the soil will collapse and die, taking humanity with it" Vedas Sanskrit Scripture, 1500 BC. As the world's population increases issues of food security become more pressing as does the need to sustain soil fertility and to minimize soil degradation. Soil and land are finite resources, and agricultural land is under severe competition from many other uses. Lack of adequate food and food of poor nutritional quality lead to under-nutrition of different degrees, all of which can cause ill- or suboptimal-health. The soil can affect human health directly and indirectly. Direct effects of soil or its constituents result from its ingestion, inhalation or absorption. For example, hook worms enter the body through the skin and cause anaemia, and fungi and dust can be inhaled resulting in respiratory problems. The soil is the source of actinomycetes on which our earliest antibiotics are based (actinomycin, neomycin and streptomycin). Furthermore, it is a potential reservoir of new antibiotics with methods such as functional metagenomics to identify antibiotic resistant genes. Indirect effects of soil arise from the quantity and quality of food that humans consume. Trace elements can have both beneficial and toxic effects on humans, especially where the range for optimal intake is narrow as for selenium. Deficiencies of four trace elements, iodine, iron, selenium and zinc, will be considered because of their substantial effects on human health. Relations between soil and human health are often difficult to extricate because of the many confounding factors present such as the source of food, social factors and so on. Nevertheless, recent scientific understanding of soil processes and factors that affect human health are enabling greater insight into the effects of soil on our health. Multidisciplinary research that includes soil

  17. Simulating human behavior for national security human interactions.

    Energy Technology Data Exchange (ETDEWEB)

    Bernard, Michael Lewis; Hart, Dereck H.; Verzi, Stephen J.; Glickman, Matthew R.; Wolfenbarger, Paul R.; Xavier, Patrick Gordon

    2007-01-01

    This 3-year research and development effort focused on what we believe is a significant technical gap in existing modeling and simulation capabilities: the representation of plausible human cognition and behaviors within a dynamic, simulated environment. Specifically, the intent of the ''Simulating Human Behavior for National Security Human Interactions'' project was to demonstrate initial simulated human modeling capability that realistically represents intra- and inter-group interaction behaviors between simulated humans and human-controlled avatars as they respond to their environment. Significant process was made towards simulating human behaviors through the development of a framework that produces realistic characteristics and movement. The simulated humans were created from models designed to be psychologically plausible by being based on robust psychological research and theory. Progress was also made towards enhancing Sandia National Laboratories existing cognitive models to support culturally plausible behaviors that are important in representing group interactions. These models were implemented in the modular, interoperable, and commercially supported Umbra{reg_sign} simulation framework.

  18. Human Flesh Search Engine and Online Privacy.

    Science.gov (United States)

    Zhang, Yang; Gao, Hong

    2016-04-01

    Human flesh search engine can be a double-edged sword, bringing convenience on the one hand and leading to infringement of personal privacy on the other hand. This paper discusses the ethical problems brought about by the human flesh search engine, as well as possible solutions.

  19. Gender security between human development and human security. Recent issues in the political international agenda

    Directory of Open Access Journals (Sweden)

    Paola Degani

    2014-06-01

    Full Text Available Issues regarding security, for a long time have been proposed, both in the scientific literature, that in the writings of popular character, without taking into due consideration the specificity of the effects that certain threats can cause the different subjectivity or on specific groups rather than on other . In particular, very rarely takes into account the fact that, in relation to the condition of women, we can talk, referring to certain areas or aspects of the problem, think of the problem of violence, of a real security crisis. The safety cultures sedimentation processes of socialization through everyday practices, can be considered an integral part of the internal structures of states. The issues relating to the in / security for women are on the agenda institutional, only a few years, do not fall within the traditional framework of interventions aimed at regulating sector profiles of women, in line with a vision of the subject recipient of this policy individual as "neutral." These are issues that today are also of inter-governmental organizations, in particular the United Nations, a central political role with respect to the adoption of policies related to the affirmation, respect and the effectiveness of human rights and at the same time enrich and innovate in order substantial guidelines and decision-making processes in the field of security.

  20. Gender, Conflict and Human Security in Nigeria: Challenges and ...

    African Journals Online (AJOL)

    ... buttress the inadequacies of human security in Nigeria; strategies were proffered to tackle these challenges. The paper concluded that once the strategies are critically looked into and steps are taken to implement them, certain prospects will accrue to gender human security network in Nigeria. Gender and Behaviour Vol.

  1. Rethinking energy security in Asia. A non-traditional view of human security

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  2. Redefining Human Security for Vulnerable Migrants in East Asia

    Directory of Open Access Journals (Sweden)

    Jiyoung Song

    2015-01-01

    Full Text Available This article proposes human security as an analytical framework to understand the current trends of irregular migration (both forced and unauthorised in East Asia and revisits the seven pillars of human security defined in the 1994 Human Development Report by the United Nations Development Programme (UNDP. It explains how the concepts of human security are parallel to those prescribed in international human rights conventions but different in terms of the attitude towards states. Human security does not directly challenge state authority and adds a sense of urgency and moral authority that requires extra-legal measures by the states. The author argues that human security is the securitisation of human rights and is a better framework and policy discourse than human rights to engage with state and non-state actors, especially in East Asia where political leaders are more receptive to the former idea. The study draws examples from stateless Rohingyas, undocumented sex workers in Thailand and Singapore, trafficked brides from Vietnam and Cambodia, and smuggled North Korean refugees in China to demonstrate the nexus between human security and irregular migration.

  3. Human modeling in nuclear engineering

    International Nuclear Information System (INIS)

    Yoshikawa, Hidekazu; Furuta, Kazuo.

    1994-01-01

    Review on progress of research and development on human modeling methods is made from the viewpoint of its importance on total man-machine system reliability surrounding nuclear power plant operation. Basic notions on three different approaches of human modeling (behavioristics, cognitives and sociologistics) are firstly introduced, followed by the explanation of fundamental scheme to understand human cognitives at man-machine interface and the mechanisms of human error and its classification. Then, general methodologies on human cognitive model by AI are explained with the brief summary of various R and D activities now prevailing in the human modeling communities around the world. A new method of dealing with group human reliability is also introduced which is based on sociologistic mathematical model. Lastly, problems on human model validation are discussed, followed by the introduction of new experimental method to estimate human cognitive state by psycho-physiological measurement, which is a new methodology plausible for human model validation. (author)

  4. Measuring Human Performance within Computer Security Incident Response Teams

    Energy Technology Data Exchange (ETDEWEB)

    McClain, Jonathan T. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Silva, Austin Ray [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Avina, Glory Emmanuel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Forsythe, James C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  5. 130 FEMINISM AND HUMAN GENETIC ENGINEERING: A ...

    African Journals Online (AJOL)

    Ike Odimegwu

    genetic engineering to reconstruct the life of the human person. Negatively .... height, beauty or intelligence. Apart from ... cloning and stem-cell researches, artificial insemination. ..... form of manufacturing children involving their quality control.

  6. Human Factors Engineering Guidelines for Overhead Cranes

    Science.gov (United States)

    Chandler, Faith; Delgado, H. (Technical Monitor)

    2001-01-01

    This guideline provides standards for overhead crane cabs that can be applied to the design and modification of crane cabs to reduce the potential for human error due to design. This guideline serves as an aid during the development of a specification for purchases of cranes or for an engineering support request for crane design modification. It aids human factors engineers in evaluating existing cranes during accident investigations or safety reviews.

  7. Understanding human factors in cyber security as a dynamic system

    NARCIS (Netherlands)

    Young, H.J.; Vliet, A.J. van; Ven, J.G.S. van de; Jol, S.C.; Broekman, C.C.M.T.

    2018-01-01

    The perspective of human factors is largely missing from the wider cyber security dialogue and its scope is often limited. We propose a framework in which we consider cyber security as a state of a system. System change is brought on by an entity’s behavior. Interventions are ways of changing

  8. Secure Business Process Engineering: a socio-technical approach

    OpenAIRE

    Salnitri, Mattia

    2016-01-01

    Dealing with security is a central activity for todays organizations. Security breaches impact on the activities executed in organizations, preventing them to execute their business processes and, therefore, causing millions of dollars of losses. Security by design principles underline the importance of considering security as early as during the design of organizations to avoid expensive fixes during later phases of their lifecycle. However, the design of secure business processes cannot tak...

  9. Child rights, right to water and sanitation, and human security.

    Science.gov (United States)

    Pink, Ross

    2012-06-15

    The article explores the intersection between child rights, water scarcity, sanitation, and the human security paradigm. The recognition of child rights has been advanced through the 1989 Convention on the Rights of the Child and other international legal instruments, while water rights are increasingly affirmed in international law and through the historic July 2010 United Nations General Assembly resolution that strengthened the legal foundation for water security and human rights. Yet there remains a development gap in terms of child access to clean and secure water sources for basic human development needs. The human security paradigm provides a legal and humanitarian foundation for the extension of child rights related to water and sanitation. Copyright © 2012 Pink.

  10. Impact of Boko Haram insurgency on human security in Nigeria ...

    African Journals Online (AJOL)

    Impact of Boko Haram insurgency on human security in Nigeria. ... Global Journal of Social Sciences ... denied millions of children and youths access to education; increased the number of internally displaced persons with dire need of shelter ...

  11. impact of boko haram insurgency on human security in nigeria

    African Journals Online (AJOL)

    abduction and killing of people; destruction of houses, schools, health care centres, churches, mosques and farms has ... KEYWORDS: Boko Haram, Insurgency, Human Security, Violence, Nigeria ..... Provide the citizens with adequate ...

  12. Human Modeling for Ground Processing Human Factors Engineering Analysis

    Science.gov (United States)

    Stambolian, Damon B.; Lawrence, Brad A.; Stelges, Katrine S.; Steady, Marie-Jeanne O.; Ridgwell, Lora C.; Mills, Robert E.; Henderson, Gena; Tran, Donald; Barth, Tim

    2011-01-01

    There have been many advancements and accomplishments over the last few years using human modeling for human factors engineering analysis for design of spacecraft. The key methods used for this are motion capture and computer generated human models. The focus of this paper is to explain the human modeling currently used at Kennedy Space Center (KSC), and to explain the future plans for human modeling for future spacecraft designs

  13. The Unreasonable Ineffectiveness of Security Engineering: An Overview

    NARCIS (Netherlands)

    Pavlovic, Dusko

    2010-01-01

    In his 1960 essay, Eugene Wigner raised the question of ‿the unreasonable effectiveness of mathematics in natural sciences‿. After several decades of security research, we are tempted to ask the opposite question: Are we not unreasonably ineffective? Why are we not more secure from all the security

  14. Legislating for Terrorism: The Philippines’ Human Security Act 2007

    Directory of Open Access Journals (Sweden)

    Pauline E. Eadie

    2011-11-01

    Full Text Available In February 2007 the Philippine Senate passed the Human Security Act (HSA otherwise known as Republic Act No. 9372: An Act to Secure the State and Protect our People From Terrorism. Philippine Senate Minority Leader Aquilino Q. Pimentel Jr. was heavily involved in the final drafting of the HSA. He gave it its final name shortly before the Senate Chamber passed it into law. Previously the Act had been known by various titles including ‘An Act to Deter and Punish Acts of Terrorism and for Other Purposes’ (Senate Bill No. 2137 and ‘An Act to Define and Punish the Crime of Terrorism, the Crime of Conspiracy to Commit Terrorism, and the Crime of Proposal to Commit Terrorism, and for Other Purposes (Senate Bill No. 2187. Thus the Human Security Act exists as an instrument of counter terrorism as opposed to human security policy.

  15. 40 CFR 1068.225 - What are the provisions for exempting engines/equipment for national security?

    Science.gov (United States)

    2010-07-01

    ... engines/equipment for national security? 1068.225 Section 1068.225 Protection of Environment ENVIRONMENTAL...) Manufacturers may request a national security exemption for engines/equipment not meeting the conditions of... applicable): (i) “THIS ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1068.225.” (ii) “THIS...

  16. Impact of Human Security Threats on Leadership and Political ...

    African Journals Online (AJOL)

    Human security threats in contemporary Africa have become a major political challenge. Whether it involves sectional conflicts, kidnapping, human trafficking, armed robbery they have continued to exert a far reaching impact on the leadership and political stability in the region. This paper is therefore an attempt to examine ...

  17. Human Security and Mutual Vulnerability: The Global Political ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Human Security and Mutual Vulnerability: The Global Political Economy of Development and ... that will help us understand this turbulent and chaotic period in human history. ... The Rapid Research Fund (RRF) for Ebola Virus Disease Outbreaks will fund ... Copyright · Open access policy · Privacy policy · Research ethics ...

  18. Human engineering in mobile radwaste systems

    International Nuclear Information System (INIS)

    Jones, D.; McMahon, J.; Motl, G.

    1988-01-01

    To a large degree, mobile radwaste systems are replacing installed plant systems at US nuclear plants due to regulatory obsolescence, high capital and maintenance costs, and increased radiation exposure. Well over half the power plants in the United States now use some sort of mobile system similar to those offered by LN Technologies Corporation. Human engineering is reflected in mobile radwaste system design due to concerns about safety, efficiency, and cost. The radwaste services business is so competitive that vendors must reflect human engineering in several areas of equipment design in order to compete. The paper discusses radiation exposure control, contamination control, compact components, maintainability, operation, and transportability

  19. Systems Security Engineering Capability Maturity Model (SSECMM), Model Description, Version 1.1

    National Research Council Canada - National Science Library

    1997-01-01

    This document is designed to acquaint the reader with the SSE-CMM Project as a whole and present the project's major work product - the Systems Security Engineering Capability Maturity Model (SSE- CMM...

  20. Human Factors Interface with Systems Engineering for NASA Human Spaceflights

    Science.gov (United States)

    Wong, Douglas T.

    2009-01-01

    This paper summarizes the past and present successes of the Habitability and Human Factors Branch (HHFB) at NASA Johnson Space Center s Space Life Sciences Directorate (SLSD) in including the Human-As-A-System (HAAS) model in many NASA programs and what steps to be taken to integrate the Human-Centered Design Philosophy (HCDP) into NASA s Systems Engineering (SE) process. The HAAS model stresses systems are ultimately designed for the humans; the humans should therefore be considered as a system within the systems. Therefore, the model places strong emphasis on human factors engineering. Since 1987, the HHFB has been engaging with many major NASA programs with much success. The HHFB helped create the NASA Standard 3000 (a human factors engineering practice guide) and the Human Systems Integration Requirements document. These efforts resulted in the HAAS model being included in many NASA programs. As an example, the HAAS model has been successfully introduced into the programmatic and systems engineering structures of the International Space Station Program (ISSP). Success in the ISSP caused other NASA programs to recognize the importance of the HAAS concept. Also due to this success, the HHFB helped update NASA s Systems Engineering Handbook in December 2007 to include HAAS as a recommended practice. Nonetheless, the HAAS model has yet to become an integral part of the NASA SE process. Besides continuing in integrating HAAS into current and future NASA programs, the HHFB will investigate incorporating the Human-Centered Design Philosophy (HCDP) into the NASA SE Handbook. The HCDP goes further than the HAAS model by emphasizing a holistic and iterative human-centered systems design concept.

  1. Human Factors in Coast Guard Computer Security - An Analysis of Current Awareness and Potential Techniques to Improve Security Program Viability

    National Research Council Canada - National Science Library

    Whalen, Timothy

    2001-01-01

    .... As such, our ability to ensure the security of those systems is also increasing in import. Traditional information security measures tend to be system-oriented and often fail to address the human element that is critical to system success...

  2. EVALUATION OF ECONOMIC SECURITY NOVOSIBIRSK REGION (FOR EXAMPLE, A REGIONAL ENGINEERING

    Directory of Open Access Journals (Sweden)

    Lugacheva L. I.

    2014-12-01

    Full Text Available The article shows the importance of regional engineering for the Russian economy, it clarifies the factors of economic security of the Novosibirsk region (NSO. Analyzed the characteristics prevailing in the engineering industry, its competitive advantages. The research results of the export orientation of the regional engineering VAT: its direction and priorities; discusses the trends that influence the growth during the recovery has formed a new profile of its foreign economic relations. Threats identified in the development of engineering and to propose measures to overcome them to ensure the economic security of the region. The article deals with the problem-tional institutes provide for the sustainable development of regional engineering, discusses the possibility of using pub-lic-private partnerships. Sharing of risks and responsibilities between the subject of the Russian Federation, municipalities and entrepreneurs - one of the priorities in the creation of the necessary conditions for the economic security of the NSO.

  3. Food Security and Human Rights in Indonesia

    NARCIS (Netherlands)

    Hadiprayitno, I.

    2010-01-01

    Food is crucial to an adequate standard of living. The acknowledgement of the right to food in government policies is fundamental to the protection of human dignity, particularly in relation to food insecurity. It allows the right-holder to seek redress and hold government accountable for

  4. MODEL-BASED SECURITY ENGINEERING OF SOA SYSTEM USING SECURITY INTENT DSL

    OpenAIRE

    Muhammad Qaiser Saleem; Jafreezal Jaafar; Mohd Fadzil Hassan

    2011-01-01

    Currently most of the enterprises are using SOA and web services technologies to build their web information system. They are using MDA principles for design and development of WIS and using UML as a modelling language for business process modelling. Along with the increased connectivity in SOA environment, security risks rise exponentially. Security is not defined during the early phases of development and left onto developer. Properly configuring security requirements in SOA applications is...

  5. Human Security and Energy Security: A Sustainable Energy System as a Public Good

    NARCIS (Netherlands)

    Karlsson-Vinkhuyzen, S.I.S.E.; Jollands, N.

    2013-01-01

    This chapter is dedicated to the concept of human security and its link to energy and energy governance, particularly global energy governance. Through this focus emerges the need to look at the links between the concept of public goods and energy. Our starting argument is that conventional notions

  6. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    Science.gov (United States)

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  7. Advanced Course in Engineering (ACE) - Cyber Security Boot Camp

    National Research Council Canada - National Science Library

    Older, Susan

    2008-01-01

    .... ACE achieved its stated objectives by completely immersing students in the cyber-security discipline for ten weeks, through a combination of intense coursework, open-ended problems, and internship...

  8. Development of human resource capacity building assistance for nuclear security

    International Nuclear Information System (INIS)

    Nakamura, Yo; Noro, Naoko

    2014-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency (JAEA) has been providing nuclear security human resource development projects targeting at nuclear emerging countries in Asia in cooperation with the authorities concerned including the Sandia National Laboratory (SNL) and the International Atomic Energy Agency (IAEA). In the aftermath of the attacks of Sept. 11, the threat of terrorism was internationally recognized and thus the human resource capacity building is underway as an urgent task. In order to responding to emerging threats, the human resource capacity building that ISCN has implemented thus far needs to be multilaterally analyzed in order to develop more effective training programs. This paper studies ISCN's future direction by analyzing its achievements, as well as introduces the collaborative relationships with SNL that contributes to the reflection and maintenance of international trends for the contents of nuclear security training, the nuclear security enhancement support with which Japan is to provide nuclear emerging countries in Asia, and the achievements of the nuclear security training program that ISCN implemented. (author)

  9. Security and trust: taking care of the human factor

    NARCIS (Netherlands)

    Egger, F.N.; Abrazhevich, D.

    2001-01-01

    In the e-business chain, the last link that needs to be convinced of the security of an online transaction is the end-user. That is why this article puts forward a user-centred perspective of the problem of trust in online payments, derived from the discipline of Human-Computer Interaction (HCI). We

  10. Peace, Human Security and Sustainable Development in Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Peace, Human Security and Sustainable Development in Africa ... into a sustainable livelihood for some of the poorest communities in Africa. ... Project status ... IDRC congratulates first cohort of Women in Climate Change Science Fellows ... titled “Climate change and adaptive water management: Innovative solutions from ...

  11. Mediapolis, Human (In)Security and Citizenship

    DEFF Research Database (Denmark)

    Tufte, Thomas

    2011-01-01

    is minimal? There are some of the questions addressed in this chapter. In the first section I assess communication for social change in the digital era from a citizen’s perspective. Secondly, I provide an example of a civil society driven media platform which seeks to enhance processes of empowerment...... and ultimately influence good governance and promote social change. The example is from Tanzania in Eastern Africa. Thirdly, I introduce Roger Silverstone’s (2007) notion of ‘mediapolis’ as a conceptual approach to explore the mediated public sphere as a space for civic action and participation. In the fourth...... section I present the concept of ‘human (in)security’ which refers to how cultures of fear and insecurity permeate public discourse, public sentiment and ultimately civic action. Finally, I discuss how to theorize communication for social change in a digital era, approaching it from a citizens perspective...

  12. Human and Citizen Rights Guarantees While Providing Information Security

    Directory of Open Access Journals (Sweden)

    Serhii Yesimov

    2018-05-01

    Full Text Available With the development of information and communication technologies, issues of providing information security are becoming more and more aggravated. These are crimes related to the use of electronic computers, systems and computer networks and telecommunication networks, the propaganda of separatism and extremism, etc. While providing information security in the digital environment, the role of technical and legal human rights guarantees, due to technical means of protection, is increasing. Relying on the developers of technical means of protection determines the difference between the aforesaid concepts and the traditional approach to ensuring the protection of human and citizen rights, in which responsibilities are put on information intermediaries, owners of confidential information. Technical guarantees of human rights are a necessary component of ensuring information security, but the effectiveness of the application is provided in conjunction with the legal guarantees of human rights, as evidenced by the tendency to recognize the principles of inviolability of privacy on the basis of design decisions in the law of the European Union as legal acts. Providing information security is a legitimate goal of establishing constraints of human rights, since it can be correlated with the norms of international law. The establishment of constraints of human rights is permissible in order to attain other objectives–ensuring state security, public order, health, rights and freedoms of the person in the information sphere. The legitimacy of this goal is determined by its compliance with the objectives envisaged by international agreements ratified in an established order. The article examines the impact of the use of technical means in the field of providing information security in the aspect of following the fundamental human and civil rights in Ukraine, taking into account the legislation of the European Union and the decision of the European Court

  13. The application of human engineering in control room of HFETR

    International Nuclear Information System (INIS)

    Yang Shuchun; Shan Songlin

    2003-01-01

    The human-machine system for improving the working environment in the control room of HFETR is described. The reliability of the equipment, instruments and operation by human engineering is increased. The relations between human engineering and lowering human failure in HFETR are also discussed. It is concluded that the further application of human engineering can increase interaction of the human and machine in the control room and provide assurances for the safe and reliable operation of reactor. (authors)

  14. The application of human engineering in control room of HFETR

    Energy Technology Data Exchange (ETDEWEB)

    Shuchun, Yang; Songlin, Shan [Nuclear Power Inst. of China, Chengdu (China)

    2003-07-01

    The human-machine system for improving the working environment in the control room of HFETR is described. The reliability of the equipment, instruments and operation by human engineering is increased. The relations between human engineering and lowering human failure in HFETR are also discussed. It is concluded that the further application of human engineering can increase interaction of the human and machine in the control room and provide assurances for the safe and reliable operation of reactor. (authors)

  15. Zephyr: A secure Internet process to streamline engineering

    Energy Technology Data Exchange (ETDEWEB)

    Jordan, C.W.; Niven, W.A.; Cavitt, R.E. [and others

    1998-05-12

    Lawrence Livermore National Laboratory (LLNL) is implementing an Internet-based process pilot called `Zephyr` to streamline engineering and commerce using the Internet. Major benefits have accrued by using Zephyr in facilitating industrial collaboration, speeding the engineering development cycle, reducing procurement time, and lowering overall costs. Programs at LLNL are potentializing the efficiencies introduced since implementing Zephyr. Zephyr`s pilot functionality is undergoing full integration with Business Systems, Finance, and Vendors to support major programs at the Laboratory.

  16. Applications of human factors engineering in the digital HMI

    International Nuclear Information System (INIS)

    Zhou Bingjian

    2014-01-01

    In order to prevent and minimize human errors in the digital main control room, the principles of human factors engineering must be complied strictly in the design process of digital human-machine interface. This paper briefly describes the basic human factors engineering principles of designing main control room, introduces the main steps to implement the human factors engineering verification and validation of main control room, including HSI task support verification, human factors engineering design verification and integrated system validation. Meanwhile, according to the new digital human-machine interface characteristics, the development models of human error are analyzed. (author)

  17. Integrating security issues in nuclear engineering curriculum in Indonesia. Classical vs policy approaches

    International Nuclear Information System (INIS)

    Putero, Susetyo Hario; Rosita, Widya; Sihana, Fnu; Ferdiansjah; Santosa, Haryono Budi; Muharini, Anung

    2015-01-01

    Recently, risk management for nuclear facilities becomes more complex due to security issue addressed by IAEA. The harmonization between safety, safeguards and security is still questionable. It also challenges to nuclear engineering curriculum in the world how to appropriately lecture the new issue. This paper would like to describe how to integrate this issue in developing nuclear engineering curriculum in Indonesia. Indonesia has still no nuclear power plant, but there are 3 research reactors laid in Indonesia. As addition, there are several hospitals and industries utilizing radioisotopes in their activities. The knowledge about nuclear security of their staffs is also not enough for handling radioactive material furthermore the security officers. Universitas Gadjah Mada (UGM) is the only university in Indonesia offering nuclear engineering program, as consequently the university should actively play the role in overcoming this issue not only in Indonesia, but also in Southeast Asia. In the other hand, students has to have proper knowledge in order to complete in the global nuclear industry. After visited several universities in USA and participated in INSEN meeting, we found that most of universities in the world anticipate this issue by giving the student courses related to policy (non-technical) study based on IAEA NSS 12. In the other hand, the rest just make nuclear security as a case study on their class. Furthermore, almost all of programs are graduate level. UGM decided to enhance several present related undergraduate courses with security topics as first step to develop the awareness of student to nuclear security. The next (curriculum 2016) is to integrate security topics into the entire of curriculum including designing a nuclear security elective course for undergraduate level. The first trial has successfully improved the student knowledge and awareness on nuclear security. (author)

  18. Validation of human factor engineering integrated system

    International Nuclear Information System (INIS)

    Fang Zhou

    2013-01-01

    Apart from hundreds of thousands of human-machine interface resources, the control room of a nuclear power plant is a complex system integrated with many factors such as procedures, operators, environment, organization and management. In the design stage, these factors are considered by different organizations separately. However, whether above factors could corporate with each other well in operation and whether they have good human factors engineering (HFE) design to avoid human error, should be answered in validation of the HFE integrated system before delivery of the plant. This paper addresses the research and implementation of the ISV technology based on case study. After introduction of the background, process and methodology of ISV, the results of the test are discussed. At last, lessons learned from this research are summarized. (authors)

  19. Need for a gender-sensitive human security framework: results of a quantitative study of human security and sexual violence in Djohong District, Cameroon.

    Science.gov (United States)

    Parmar, Parveen Kaur; Agrawal, Pooja; Goyal, Ravi; Scott, Jennifer; Greenough, P Gregg

    2014-01-01

    Human security shifts traditional concepts of security from interstate conflict and the absence of war to the security of the individual. Broad definitions of human security include livelihoods and food security, health, psychosocial well-being, enjoyment of civil and political rights and freedom from oppression, and personal safety, in addition to absence of conflict. In March 2010, we undertook a population-based health and livelihood study of female refugees from conflict-affected Central African Republic living in Djohong District, Cameroon and their female counterparts within the Cameroonian host community. Embedded within the survey instrument were indicators of human security derived from the Leaning-Arie model that defined three domains of psychosocial stability suggesting individuals and communities are most stable when their core attachments to home, community and the future are intact. While the female refugee human security outcomes describe a population successfully assimilated and thriving in their new environments based on these three domains, the ability of human security indicators to predict the presence or absence of lifetime and six-month sexual violence was inadequate. Using receiver operating characteristic (ROC) analysis, the study demonstrates that common human security indicators do not uncover either lifetime or recent prevalence of sexual violence. These data suggest that current gender-blind approaches of describing human security are missing serious threats to the safety of one half of the population and that efforts to develop robust human security indicators should include those that specifically measure violence against women.

  20. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists.

    Science.gov (United States)

    Kraemer, Sara; Carayon, Pascale

    2007-03-01

    This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.

  1. Editorial for Journal of Human Security Volume 10

    Directory of Open Access Journals (Sweden)

    Sabina Lautensach

    2014-01-01

    Full Text Available Nelson Rolihlahla Mandela's death on 5 December 2013 and his funeral ten days later were taken as an occasion in the global media to discuss the merits of political leadership for human security, with occasional comments on its pitfalls. This particular leader is not the most politically safe object of discussion, as, for a long time, he openly advocated civil disobedience and resistance, initially of the non-violent kind, but later becoming violent. Predictably, the local hegemon reacted with great brutality and sweeping measures to the resistance of the ANC, policies that shocked many in the western world. This reaction by the gov­ernment and its supporters and the counterreaction it incited amounted, in the long run, to little more than a vast reduction in human security for most citizens of South Africa, lasting until the ANC's victory and Mr Mandela's ascendance to the presidency in 1994.

  2. Improving Safety through Human Factors Engineering.

    Science.gov (United States)

    Siewert, Bettina; Hochman, Mary G

    2015-10-01

    Human factors engineering (HFE) focuses on the design and analysis of interactive systems that involve people, technical equipment, and work environment. HFE is informed by knowledge of human characteristics. It complements existing patient safety efforts by specifically taking into consideration that, as humans, frontline staff will inevitably make mistakes. Therefore, the systems with which they interact should be designed for the anticipation and mitigation of human errors. The goal of HFE is to optimize the interaction of humans with their work environment and technical equipment to maximize safety and efficiency. Special safeguards include usability testing, standardization of processes, and use of checklists and forcing functions. However, the effectiveness of the safety program and resiliency of the organization depend on timely reporting of all safety events independent of patient harm, including perceived potential risks, bad outcomes that occur even when proper protocols have been followed, and episodes of "improvisation" when formal guidelines are found not to exist. Therefore, an institution must adopt a robust culture of safety, where the focus is shifted from blaming individuals for errors to preventing future errors, and where barriers to speaking up-including barriers introduced by steep authority gradients-are minimized. This requires creation of formal guidelines to address safety concerns, establishment of unified teams with open communication and shared responsibility for patient safety, and education of managers and senior physicians to perceive the reporting of safety concerns as a benefit rather than a threat. © RSNA, 2015.

  3. On recent advances in human engineering.

    Science.gov (United States)

    Anton, Roman

    2016-01-01

    Advances in embryology, genetics, and regenerative medicine regularly attract attention from scientists, scholars, journalists, and policymakers, yet implications of these advances may be broader than commonly supposed. Laboratories culturing human embryos, editing human genes, and creating human-animal chimeras have been working along lines that are now becoming intertwined. Embryogenic methods are weaving traditional in vivo and in vitro distinctions into a new "in vivitro" (in life in glass) fabric. These and other methods known to be in use or thought to be in development promise soon to bring society to startling choices and discomfiting predicaments, all in a global effort to supply reliably rejuvenating stem cells, to grow immunologically nonprovocative replacement organs, and to prevent, treat, cure, or even someday eradicate diseases having genetic or epigenetic mechanisms. With humanity's human-engineering era now begun, procedural prohibitions, funding restrictions, institutional controls, and transparency rules are proving ineffective, and business incentives are migrating into the most basic life-sciences inquiries, wherein lie huge biomedical potentials and bioethical risks. Rights, health, and heritage are coming into play with bioethical presumptions and formal protections urgently needing reassessment.

  4. Threshold-Dependent Camouflaged Cells to Secure Circuits Against Reverse Engineering Attacks

    OpenAIRE

    Collantes, Maria I. Mera; Massad, Mohamed El; Garg, Siddharth

    2016-01-01

    With current tools and technology, someone who has physical access to a chip can extract the detailed layout of the integrated circuit (IC). By using advanced visual imaging techniques, reverse engineering can reveal details that are meant to be kept secret, such as a secure protocol or novel implementation that offers a competitive advantage. A promising solution to defend against reverse engineering attacks is IC camouflaging. In this work, we propose a new camouflaging technique based on t...

  5. Human factors engineering in nuclear plant rehabilitations

    International Nuclear Information System (INIS)

    Bernston, K.; Remisz, M.; Malcolm, S.

    2001-01-01

    There are several unique considerations when creating and maintaining a human factors program for a plant refurbishment. These consideration arise from a variety of sources, including budget and time constraints on life extension projects, working to existing plant protocols and current acceptable HFE practices, and issues relating to function and task analysis. This results in a need to streamline and carefully time HFE practices from project start up to completion. In order to perform this task adequately, a comprehensive Human Factors Engineering Program Plan should be designed and tailored to the project. Systems of planning and prioritization are essential, and the required HFE designer training needs to be established. HFE specialists need to be aware of the existing plant constraints, and he prepared to work within them when providing support. The current paper discusses these aspects in the context of major refurbishment work at CANDU stations. (author)

  6. Human subject research for engineers a practical guide

    CERN Document Server

    de Winter, Joost C F

    2017-01-01

    This Brief introduces engineers to the main principles in ethics, research design, statistics, and publishing of human subject research. In recent years, engineering has become strongly connected to disciplines such as biology, medicine, and psychology. Often, engineers (and engineering students) are expected to perform human subject research. Typical human subject research topics conducted by engineers include human-computer interaction (e.g., evaluating the usability of software), exoskeletons, virtual reality, teleoperation, modelling of human behaviour and decision making (often within the framework of ‘big data’ research), product evaluation, biometrics, behavioural tracking (e.g., of work and travel patterns, or mobile phone use), transport and planning (e.g., an analysis of flows or safety issues), etc. Thus, it can be said that knowledge on how to do human subject research is indispensable for a substantial portion of engineers. Engineers are generally well trained in calculus and mechanics, but m...

  7. Human Development Index and Efficiency level of Social Security Hospitals

    Directory of Open Access Journals (Sweden)

    H. Sepehrdost

    2012-04-01

    Full Text Available Introduction & Objective: Hospitals as one of the main institutions providing health care services play an important role in the health system and allocate a high percentage of health sector's budget to them. This study aimed to answer whether social security hospitals efficiency levels are the same for all provinces in Iran? And whether any relationship exists between the human development indexes (HDI of the provinces and technical efficiency levels of the hospitals?Materials & Methods: Data envelopment analysis model has been used to measure technical efficiency of 65 social security hospitals, including small hospitals (working with lower than one hundred active beds and large hospitals (working with over one hundred active beds during the years 2007 to 2009. Further, the relationship between human development index and technical efficiency of hospitals in the provinces has been analyzed.Results: Results show that the average technical efficiency of small and large hospitals working in low and medium HDI provinces (0.912 and 0.937 are more than the average technical efficiency of hospitals in higher HDI provinces (0.870 and 0.887.Conclusion: It is recommended that social security organization concentrated distribute its hospital services in provinces with lower HDI and higher density of population living under the coverage of organization’s insurance. This will eventually puts its positive effects on per capita income of people, as well as more equitable distribution of income. (Sci J Hamadan Univ Med Sci 2012;19(1:32-38

  8. Results in Developing an Engineering Degree Program in Safeguards and Security of Nuclear Materials at Moscow Engineering Physics Institute

    International Nuclear Information System (INIS)

    Kryuchkov, Eduard F.; Geraskin, Nikolay I.; Killinger, Mark H.; Goodey, Kent O.; Butler, Gilbert W.; Duncan, Cristen L.

    2007-01-01

    The world's first master's degree program in nuclear safeguards and security, established at Moscow Engineering Physics Institute (MEPhI), has now graduated nine classes of students. Most of the graduates have gone on to work at government agencies, research organizations, or obtain their PhD. In order to meet the demand for safeguards and security specialists at nuclear facilities, MEPhI established a 5-1/2 year engineering degree program that provides more hands-on training desired by facilities. In February 2004, the first students began their studies in the new discipline Nuclear Material Safeguards and Nonproliferation. This class, as well as other subsequent classes, included students who started the program in their third year of studies, as the first 2-1/2 years consists of general engineering curriculum. Fourteen students made up the first graduating class, receiving their engineering degrees in February 2007. The topics addressed in this paper include specific features of the program caused by peculiarities of Russian education legislation and government quality control of academic education. This paper summarizes the main joint actions undertaken by MEPhI and the US National Laboratories in conjunction with the U.S. Department of Energy, to develop the engineering degree program. Also discussed are the program's specific training requirements, student internships, and job placement. The paper concludes with recommendations from a recent international seminar on nonproliferation education and training

  9. Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation

    NARCIS (Netherlands)

    Massacci, F.; Prest, M.; Zannone, N.

    2005-01-01

    Extending Requirements Engineering modelling and formal analysis methodologies to cope with Security Requirements has been a major effort in the past decade. Yet, only few works describe complex case studies that show the ability of the informal and formal approaches to cope with the level

  10. Analysis of appraisal tool of system security engineering capability maturity based on component

    International Nuclear Information System (INIS)

    Liu Zhenghai; Yang Xiaohua; Zou Shuliang; Liu Yachun; Xiao Jiantian; Liu Zhiming

    2012-01-01

    Spent Fuel Reprocessing is a part of nuclear fuel cycle and is the inevitably choice of nuclear power sustainable development. Reprocessing needs to face with radiological, criticality, chemical hazards. Besides using the tradition appraisal methods based on the security goals, it is a beneficial supplement that using the appraisal method of system security engineering capability maturity model based on the process. Experts should check and approve large numbers of documents during the appraisal based on system security engineering capability maturity model, so it is necessary that developing a tool to assist the expert to complete the appraisal. The method of developing software based on component is highly effective, nimble and reliable. Component technology is analyzed, the methods of extraction model domain components and general components is introduced, and the appraisal system is developed based on component technology. (authors)

  11. International Security Presence in Kosovo and its Human Rights Implications

    Directory of Open Access Journals (Sweden)

    Istrefi Remzije

    2017-11-01

    Full Text Available In this article I will examine the powers and activities of NATO-led Kosovo forces (KFOR and their impact on human rights protection in Kosovo. Through this examination, I seek to answer the following questions: which KFOR actions affected the human rights of Kosovars? Does KFOR carry out responsibilities and abide by the obligations normally imposed upon nation-states? And is there a solution available when the alleged violator is KFOR? KFOR is responsible for carrying out military tasks and for ‘shouldering’ UNMIK and local security forces in some civilian peace-building tasks. In the course of the exercise of its mandate, there were alleged complaints of human rights violations by KFOR. The legal implications of these alleged complaints against KFOR (inactions will also be discussed.

  12. Human factors engineering program review model

    International Nuclear Information System (INIS)

    1994-07-01

    The staff of the Nuclear Regulatory Commission is performing nuclear power plant design certification reviews based on a design process plan that describes the human factors engineering (HFE) program elements that are necessary and sufficient to develop an acceptable detailed design specification and an acceptable implemented design. There are two principal reasons for this approach. First, the initial design certification applications submitted for staff review did not include detailed design information. Second, since human performance literature and industry experiences have shown that many significant human factors issues arise early in the design process, review of the design process activities and results is important to the evaluation of an overall design. However, current regulations and guidance documents do not address the criteria for design process review. Therefore, the HFE Program Review Model (HFE PRM) was developed as a basis for performing design certification reviews that include design process evaluations as well as review of the final design. A central tenet of the HFE PRM is that the HFE aspects of the plant should be developed, designed, and evaluated on the basis of a structured top-down system analysis using accepted HFE principles. The HFE PRM consists of ten component elements. Each element in divided into four sections: Background, Objective, Applicant Submittals, and Review Criteria. This report describes the development of the HFE PRM and gives a detailed description of each HFE review element

  13. Human Security: China’s Discourses and Experience

    Directory of Open Access Journals (Sweden)

    Xiao Ren

    2016-02-01

    Full Text Available This article addresses three research questions by elaborating on how the idea of human security is understood or defined by the government and social actors in China; how the distinction between the “protection” aspect and “empowerment” aspect of human security is understood and accepted; and what particular downside risks are perceived as pressing human security issues in China. Amongst these the major ones include air pollution, food security, and cyber security. The study reveals that, whilst as a term “human security” is not frequently used, there have been significant discussions leading to the consideration and implementation of various human security practices in China. The idea of human security has been firmly established and threats to human security detected. For both the government and academic community in China, human security and state security are not necessarily confrontational but can rather be combined, often complimenting each other. Recent developments in China are pointing to a positive direction in terms of human security in the country.

  14. International Security, Development, and Human Rights: Policy Conversion or Conflict?

    Directory of Open Access Journals (Sweden)

    Miao-ling Lin Hasenkamp

    2012-04-01

    Full Text Available This article uses an institutional network governance approach to explore the overlapping dimension of the policy fields between security, development, and human rights, reflected in the US and German provincial reconstruction teams (PRTs in Afghanistan. The past two decades have witnessed a gradually changing paradigm in academic and policy debates regarding the questions of the normative basis of world order and possibilities for tackling imminent threats to security and peace (i.e. intra-state armed conflicts, failed states, terrorism, poverty, and deepening inequality. The introduction of concepts such as “human security” and “the right to humanitarian intervention/responsibility to protect (R2P” as well as critical examinations of peace-, nation-, and state-building missions (PNSB have led to a relativist tendency of state sovereignty and a changing attitude regarding how to address the intersection of security, development, and human rights. Despite this shift, the policy commitments to integrating these policy considerations remain puzzling. How have they been redefined, conceptualized, and put into practice? I argue that an integrated conceptual approach has facilitated the redefinition of common policy goals, principles, and the mobilization of resources. At the same time, civil and military cooperation, as demonstrated in the multifunctional work of PRTs, has been Janus-headed—permanently caught in an ongoing tension between the war on terror and short-term stability operation on the one hand and long-term durable peace and development on the other. The misunderstanding of its interim character, the dynamics of Afghan environment, the blurring of policy lines, and the differences between national PRT models have made it difficult to systematically assess the efficiency and legitimacy of each policy frame and program.

  15. Human Factors in Coast Guard Computer Security - An Analysis of Current Awareness and Potential Techniques to Improve Security Program Viability

    National Research Council Canada - National Science Library

    Whalen, Timothy

    2001-01-01

    .... This thesis attempts to identify both the susceptibility of Coast Guard information systems to human factors-based security risks and possible means for increasing user awareness of those risks...

  16. HLA engineering of human pluripotent stem cells.

    Science.gov (United States)

    Riolobos, Laura; Hirata, Roli K; Turtle, Cameron J; Wang, Pei-Rong; Gornalusse, German G; Zavajlevski, Maja; Riddell, Stanley R; Russell, David W

    2013-06-01

    The clinical use of human pluripotent stem cells and their derivatives is limited by the rejection of transplanted cells due to differences in their human leukocyte antigen (HLA) genes. This has led to the proposed use of histocompatible, patient-specific stem cells; however, the preparation of many different stem cell lines for clinical use is a daunting task. Here, we develop two distinct genetic engineering approaches that address this problem. First, we use a combination of gene targeting and mitotic recombination to derive HLA-homozygous embryonic stem cell (ESC) subclones from an HLA-heterozygous parental line. A small bank of HLA-homozygous stem cells with common haplotypes would match a significant proportion of the population. Second, we derive HLA class I-negative cells by targeted disruption of both alleles of the Beta-2 Microglobulin (B2M) gene in ESCs. Mixed leukocyte reactions and peptide-specific HLA-restricted CD8(+) T cell responses were reduced in class I-negative cells that had undergone differentiation in embryoid bodies. These B2M(-/-) ESCs could act as universal donor cells in applications where the transplanted cells do not express HLA class II genes. Both approaches used adeno-associated virus (AAV) vectors for efficient gene targeting in the absence of potentially genotoxic nucleases, and produced pluripotent, transgene-free cell lines.

  17. HLA Engineering of Human Pluripotent Stem Cells

    Science.gov (United States)

    Riolobos, Laura; Hirata, Roli K; Turtle, Cameron J; Wang, Pei-Rong; Gornalusse, German G; Zavajlevski, Maja; Riddell, Stanley R; Russell, David W

    2013-01-01

    The clinical use of human pluripotent stem cells and their derivatives is limited by the rejection of transplanted cells due to differences in their human leukocyte antigen (HLA) genes. This has led to the proposed use of histocompatible, patient-specific stem cells; however, the preparation of many different stem cell lines for clinical use is a daunting task. Here, we develop two distinct genetic engineering approaches that address this problem. First, we use a combination of gene targeting and mitotic recombination to derive HLA-homozygous embryonic stem cell (ESC) subclones from an HLA-heterozygous parental line. A small bank of HLA-homozygous stem cells with common haplotypes would match a significant proportion of the population. Second, we derive HLA class I–negative cells by targeted disruption of both alleles of the Beta-2 Microglobulin (B2M) gene in ESCs. Mixed leukocyte reactions and peptide-specific HLA-restricted CD8+ T cell responses were reduced in class I–negative cells that had undergone differentiation in embryoid bodies. These B2M−/− ESCs could act as universal donor cells in applications where the transplanted cells do not express HLA class II genes. Both approaches used adeno-associated virus (AAV) vectors for efficient gene targeting in the absence of potentially genotoxic nucleases, and produced pluripotent, transgene-free cell lines. PMID:23629003

  18. Human Genetic Engineering: A Survey of Student Value Stances

    Science.gov (United States)

    Wilson, Sara McCormack; And Others

    1975-01-01

    Assesses the values of high school and college students relative to human genetic engineering and recommends that biology educators explore instructional strategies merging human genetic information with value clarification techniques. (LS)

  19. Threats to Security Posed by ISIS in Syria: A Human Security Approach

    Directory of Open Access Journals (Sweden)

    Lee-Ann Louw

    2017-02-01

    Full Text Available The civil war in Syria coupled with the attacks by ISIS, has resulted in one of the largest humanitarian crises since World War II. Although international efforts have resulted in regaining control of important cities, these military approaches have escalated and inflamed the violence of which innocent civilians bear the consequences. The continuing violence and resulting threats or insecurities negatively affect the lives, freedom, dignity and development of the people to name but a few. For that reason, the aim is to explore the applicability of a human security approach to the conflict in Syria that focuses on, among other aspects, minimising violence, mitigating the effects of the conflict, protecting people, restoring peace and eliminating the grounds that resulted in the development of these conditions in the first place.

  20. Human factors in layers of defense in airport security

    NARCIS (Netherlands)

    Andriessen, H.; Van Gulijk, C.; Ale, B.J.M.

    2012-01-01

    Airport security systems are built up out of layers of defence based on the security-in-depth model (Talbot & Jakeman, 2008). The Transport Safety Authority (TSA) in the United States defined a staggering 20 layers of defence to control security risks. This means that not only security personnel is

  1. Human factor engineering applied to nuclear power plant design

    International Nuclear Information System (INIS)

    Manrique, A.; Valdivia, J.C.

    2007-01-01

    Advantages of implementing adequate Human Factor Engineering techniques in the design of nuclear reactors have become not only a fact recognized by the majority of engineers and operators but also an explicit requirement regulated and mandatory for the new designs of the so called advanced reactors. The first step for this is preparing a plan to incorporate all the Human Factor Engineering principles and developing an integral design of the Instrumentation and Control and Man-machine interface systems. Such a plan should state: -) Activities to be performed, and -) Creation of a Human Factor Engineering team adequately qualified. The Human Factor Engineering team is an integral part of the design team and is strongly linked to the engineering organizations but simultaneously has independence to act and is free to evaluate designs and propose changes in order to enhance human behavior. TECNATOM S.A. (a Spanish company) has been a part of the Design and Human Factor Engineering Team and has collaborated in the design of an advanced Nuclear Power Plant, developing methodologies and further implementing those methodologies in the design of the plant systems through the development of the plant systems operational analysis and of the man-machine interface design. The methodologies developed are made up of the following plans: -) Human Factor Engineering implementation in the Man-Machine Interface design; -) Plant System Functional Requirement Analysis; -) Allocation of Functions to man/machine; -) Task Analysis; -) Human-System Interface design; -) Control Room Verification and -) Validation

  2. An existential analysis of genetic engineering and human rights ...

    African Journals Online (AJOL)

    Genetic engineering for purposes of human enhancement poses risks that justify regulation. However, this paper argues philosophically that it is inappropriate to use human rights treaties to prohibit germ-line genetic engineering whether therapeutic or for purposes of enhancement. When also looked at existentially, the ...

  3. Local control stations: Human engineering issues and insights

    International Nuclear Information System (INIS)

    Brown, W.S.; Higgins, J.C.; O'Hara, J.M.

    1994-09-01

    The objective of this research project was to evaluate current human engineering at local control stations (LCSs) in nuclear power plants, and to identify good human engineering practices relevant to the design of these operator interfaces. General literature and reports of operating experience were reviewed to determine the extent and type of human engineering deficiencies at LCSs in nuclear power plants. In-plant assessments were made of human engineering at single-function as well as multifunction LCSs. Besides confirming the existence of human engineering deficiencies at LCSs, the in-plant assessments provided information about the human engineering upgrades that have been made at nuclear power plants. Upgrades were typically the result of any of three influences regulatory activity, broad industry initiatives such as INPO, and specific in-plant programs (e.g. activities related to training). It is concluded that the quality of LCSs is quite variable and might be improved if there were greater awareness of good practices and existing human engineering guidance relevant to these operator interfaces, which is available from a variety of sources. To make such human engineering guidance more readily accessible, guidelines were compiled from such sources and included in the report as an appendix

  4. Ergonomics in nuclear and human factors engineering

    International Nuclear Information System (INIS)

    Muench, E.; Schultheiss, G.F.

    1988-01-01

    The work situation including man-machine-relationships in nuclear power plants is described. The overview gives only a compact summary of some important ergonomic parameters, i.e. human body dimension, human load, human characteristics and human knowledge. (DG)

  5. Research on the NPP human factors engineering operating experience review

    International Nuclear Information System (INIS)

    Ren Xiangchen; Miao Hongxing; Ning Zhonghe

    2006-01-01

    This paper addresses the importance of the human factors engineering (HFE) for the design of nuclear power plant (NPP), especially for the design of human-machine interface in the NPP. It also summarizes the scope and content of the NPP HFE. The function, scope, content and process of the NPP human factors engineering operating experience review (OER) are mainly focused on, and significantly discussed. Finally, it briefly introduces the situation of the studies on the OER in China. (authors)

  6. Human Engineering Modeling and Performance Lab Study Project

    Science.gov (United States)

    Oliva-Buisson, Yvette J.

    2014-01-01

    The HEMAP (Human Engineering Modeling and Performance) Lab is a joint effort between the Industrial and Human Engineering group and the KAVE (Kennedy Advanced Visualiations Environment) group. The lab consists of sixteen camera system that is used to capture human motions and operational tasks, through te use of a Velcro suit equipped with sensors, and then simulate these tasks in an ergonomic software package know as Jac, The Jack software is able to identify the potential risk hazards.

  7. Seeking perfection: a Kantian look at human genetic engineering.

    Science.gov (United States)

    Gunderson, Martin

    2007-01-01

    It is tempting to argue that Kantian moral philosophy justifies prohibiting both human germ-line genetic engineering and non-therapeutic genetic engineering because they fail to respect human dignity. There are, however, good reasons for resisting this temptation. In fact, Kant's moral philosophy provides reasons that support genetic engineering-even germ-line and non-therapeutic. This is true of Kant's imperfect duties to seek one's own perfection and the happiness of others. It is also true of the categorical imperative. Kant's moral philosophy does, however, provide limits to justifiable genetic engineering.

  8. Human factors evaluation of the engineering test reactor control room

    International Nuclear Information System (INIS)

    Banks, W.W.; Boone, M.P.

    1981-03-01

    The Reactor and Process Control Rooms at the Engineering Test Reactor were evaluated by a team of human factors engineers using available human factors design criteria. During the evaluation, ETR, equipment and facilities were compared with MIL-STD-1472-B, Human Engineering design Criteria for Military Systems. The focus of recommendations centered on: (a) displays and controls; placing displays and controls in functional groups; (b) establishing a consistent color coding (in compliance with a standard if possible); (c) systematizing annunciator alarms and reducing their number; (d) organizing equipment in functional groups; and (e) modifying labeling and lines of demarcation

  9. Human resource development program for nuclear safety and security in Tokyo Institute of Technology

    International Nuclear Information System (INIS)

    Han, Chi Young; Sagara, Hiroshi; Nagasaka, Hideo

    2014-01-01

    The Academy for Global Nuclear Safety and Security Agent was established at Tokyo Institute of Technology in 2011, to develop global nuclear human resources in the field of 3S (Safety, Security, and Safeguards) as a Program for Leading Graduate Schools supported by MEXT (Ministry of Education, Culture, Sports, Science and Technology). New courses of nuclear safety and security were developed in addition to the existing nuclear engineering program; 1) Environmental Dynamics of Radioactive Nuclides; Numerical simulation of the environmental dispersion of radioactive materials released from hypothetical nuclear accidents and evaluation of the public exposure are performed, by using a computer-based emergency response system, to have students predict the environmental dispersion of radionuclides and radiological consequence by nuclear accidents. 2) Measurement of Environmental Radiation; Students acquire hands-on experiences measuring environmental radiation contamination caused by the nuclear accident in Fukushima with multiple types of radiation detectors. Environmental samples are collected and analyzed for isotope identification and its spatial distribution. 3) Simulation of Severe Nuclear Accidents; The evaluation results of Fukushima accident progression are discussed as well as typical sever accidents that threaten the integrity of reactor vessel. Students simulate BWR (Boiling Water Cooled Reactor) transients, design basis accidents, and severe accidents by using simulators. 4) Nuclear Security Training; Design of physical protection systems, its fundamental physics, and regulatory frameworks are covered and students gain the practical experiences by use of intrusion detection systems at JAEA (Japan Atomic Energy Agency), and by numerical simulation of hydro-dynamics of structure material and nuclear material criticality at the university. (author)

  10. Human factor engineering applied to nuclear power plant design

    International Nuclear Information System (INIS)

    Manrique, A.; Valdivia, J.C.; Jimenez, A.

    2001-01-01

    For the design and construction of new nuclear power plants as well as for maintenance and operation of the existing ones new man-machine interface designs and modifications are been produced. For these new designs Human Factor Engineering must be applied the same as for any other traditional engineering discipline. Advantages of implementing adequate Human Factor Engineering techniques in the design of nuclear reactors have become not only a fact recognized by the majority of engineers and operators but also an explicit requirement regulated and mandatory for the new designs of the so called advanced reactors. Additionally, the big saving achieved by a nuclear power plant having an operating methodology which significantly decreases the risk of operating errors makes it necessary and almost vital its implementation. The first step for this is preparing a plan to incorporate all the Human Factor Engineering principles and developing an integral design of the Instrumentation and Control and Man-machine interface systems. (author)

  11. Issues of Human Security and Educational Development in the Niger Delta Region of Nigeria

    Science.gov (United States)

    Ololube, Nwachukwu Prince; Kpolovie, Peter James; Amaele, Samuel

    2013-01-01

    Drawing from documents, observation, interview and questionnaire, we highlighted the role of issues of human security and its impact on the educational development of the Niger Delta region as well as means of enhancing human security in Nigeria. This article is a conceptual and methodological breakthrough in Nigeria's academic landscape where…

  12. Securing Sensitive Flight and Engine Simulation Data Using Smart Card Technology

    Science.gov (United States)

    Blaser, Tammy M.

    2003-01-01

    NASA Glenn Research Center has developed a smart card prototype capable of encrypting and decrypting disk files required to run a distributed aerospace propulsion simulation. Triple Data Encryption Standard (3DES) encryption is used to secure the sensitive intellectual property on disk pre, during, and post simulation execution. The prototype operates as a secure system and maintains its authorized state by safely storing and permanently retaining the encryption keys only on the smart card. The prototype is capable of authenticating a single smart card user and includes pre simulation and post simulation tools for analysis and training purposes. The prototype's design is highly generic and can be used to protect any sensitive disk files with growth capability to urn multiple simulations. The NASA computer engineer developed the prototype on an interoperable programming environment to enable porting to other Numerical Propulsion System Simulation (NPSS) capable operating system environments.

  13. Engineering safe and secure cyber-physical systems the specification PEARL approach

    CERN Document Server

    Gumzej, Roman

    2016-01-01

    This book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system’s safety and using appropriate hardware and software components inherently safe system’s architectures can be devised and certified. While the standards already enable testing and certification of inherently safe and sound hardware, this is still not the case with software. The book demonstrates that Specification PEARL(SPEARL) addresses this issue and proposes appropriate solutions from the viewpoints of software engineering as well as concrete program components. By doing so it reduces the complexity of cyber physical systems design in an innovative way. Three ultimate goals are being followed in the course of defining this new PEARL standard, namely: 1. simplicity over complexity, 2. inherent real-time ability, and 3. conformity to safety integrity and security capability levels.

  14. Development of human factors engineering guide for nuclear power project

    International Nuclear Information System (INIS)

    Wu Dangshi; Sheng Jufang

    1997-01-01

    'THE PRACTICAL GUIDE FOR APPLICATION OF HUMAN FACTORS ENGINEERING TO NUCLEAR POWER PROJECT (First Draft, in Chinese)', which was developed under a research program sponsored by National Nuclear Safety Administration (NNSA) is described briefly. It is hoped that more conscious, more systematical and more comprehensive application of Human Factors Engineering to the nuclear power projects from the preliminary feasibility studies up to the commercial operation will benefit the safe, efficient and economical operations of nuclear power plants in China

  15. Protocol and the post-human performativity of security techniques.

    Science.gov (United States)

    O'Grady, Nathaniel

    2016-07-01

    This article explores the deployment of exercises by the United Kingdom Fire and Rescue Service. Exercises stage, simulate and act out potential future emergencies and in so doing help the Fire and Rescue Service prepare for future emergencies. Specifically, exercises operate to assess and develop protocol; sets of guidelines which plan out the actions undertaken by the Fire and Rescue Service in responding to a fire. In the article I outline and assess the forms of knowledge and technologies, what I call the 'aesthetic forces', by which the exercise makes present and imagines future emergencies. By critically engaging with Karen Barad's notion of post-human performativity, I argue that exercises provide a site where such forces can entangle with one another; creating a bricolage through which future emergencies are evoked sensually and representatively, ultimately making it possible to experience emergencies in the present. This understanding of exercises allows also for critical appraisal of protocol both as phenomena that are produced through the enmeshing of different aesthetic forces and as devices which premise the operation of the security apparatus on contingency.

  16. The Systems Engineering Process for Human Support Technology Development

    Science.gov (United States)

    Jones, Harry

    2005-01-01

    Systems engineering is designing and optimizing systems. This paper reviews the systems engineering process and indicates how it can be applied in the development of advanced human support systems. Systems engineering develops the performance requirements, subsystem specifications, and detailed designs needed to construct a desired system. Systems design is difficult, requiring both art and science and balancing human and technical considerations. The essential systems engineering activity is trading off and compromising between competing objectives such as performance and cost, schedule and risk. Systems engineering is not a complete independent process. It usually supports a system development project. This review emphasizes the NASA project management process as described in NASA Procedural Requirement (NPR) 7120.5B. The process is a top down phased approach that includes the most fundamental activities of systems engineering - requirements definition, systems analysis, and design. NPR 7120.5B also requires projects to perform the engineering analyses needed to ensure that the system will operate correctly with regard to reliability, safety, risk, cost, and human factors. We review the system development project process, the standard systems engineering design methodology, and some of the specialized systems analysis techniques. We will discuss how they could apply to advanced human support systems development. The purpose of advanced systems development is not directly to supply human space flight hardware, but rather to provide superior candidate systems that will be selected for implementation by future missions. The most direct application of systems engineering is in guiding the development of prototype and flight experiment hardware. However, anticipatory systems engineering of possible future flight systems would be useful in identifying the most promising development projects.

  17. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications.

    Science.gov (United States)

    Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-12-24

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  18. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Directory of Open Access Journals (Sweden)

    Tiago M. Fernández-Caramés

    2016-12-01

    Full Text Available The Internet of Things (IoT is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification, which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3 to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  19. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Science.gov (United States)

    Fernández-Caramés, Tiago M.; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-01-01

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol. PMID:28029119

  20. Cooperative and human aspects of software engineering: CHASE 2010

    DEFF Research Database (Denmark)

    Dittrich, Yvonne; Sharp, Helen C.; Winschiers Theophilus, Heike

    2010-01-01

    Software is created by people -- software engineers in cooperation with domain experts, users and other stakeholders--in varied environments, under various conditions. Thus understanding cooperative and human aspects of software development is crucial to comprehend how and which methods and tools...... are required, to improve the creation and maintenance of software. The 3rd workshop on Cooperative and Human Aspects of Software Engineering held at the International Conference on Software Engineering continued the tradition from earlier workshops and provided a lively forum to discuss current developments...... and high quality research in the field. Further dissemination of research results will lead to an improvement of software development and deployment across the globe....

  1. Incorporating Security Quality Requirements Engineering (SQUARE) into Standard Life-Cycle Models

    National Research Council Canada - National Science Library

    Mead, Nancy R; Viswanathan, Venkatesh; Padmanabhan, Deepa; Raveendran, Anusha

    2008-01-01

    ...). This report is for information technology managers and security professionals, management personnel with technical and information security knowledge, and any personnel who manage security-critical...

  2. Genetic engineering of crops: a ray of hope for enhanced food security.

    Science.gov (United States)

    Gill, Sarvajeet Singh; Gill, Ritu; Tuteja, Renu; Tuteja, Narendra

    2014-01-01

    Crop improvement has been a basic and essential chase since organized cultivation of crops began thousands of years ago. Abiotic stresses as a whole are regarded as the crucial factors restricting the plant species to reach their full genetic potential to deliver desired productivity. The changing global climatic conditions are making them worse and pointing toward food insecurity. Agriculture biotechnology or genetic engineering has allowed us to look into and understand the complex nature of abiotic stresses and measures to improve the crop productivity under adverse conditions. Various candidate genes have been identified and transformed in model plants as well as agriculturally important crop plants to develop abiotic stress-tolerant plants for crop improvement. The views presented here are an attempt toward realizing the potential of genetic engineering for improving crops to better tolerate abiotic stresses in the era of climate change, which is now essential for global food security. There is great urgency in speeding up crop improvement programs that can use modern biotechnological tools in addition to current breeding practices for providing enhanced food security.

  3. "Human Nature": Chemical Engineering Students' Ideas about Human Relationships with the Natural World

    Science.gov (United States)

    Goldman, Daphne; Assaraf, Orit Ben-Zvi; Shemesh, Julia

    2014-01-01

    While importance of environmental ethics, as a component of sustainable development, in preparing engineers is widely acknowledged, little research has addressed chemical engineers' environmental concerns. This study aimed to address this void by exploring chemical engineering students' values regarding human-nature relationships. The study was…

  4. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Doohwan Oh

    2014-12-01

    Full Text Available With the emergence of the Internet of Things (IoT, a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.

  5. A malicious pattern detection engine for embedded security systems in the Internet of Things.

    Science.gov (United States)

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-12-16

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.

  6. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

    Science.gov (United States)

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-01-01

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns. PMID:25521382

  7. Human factors and security in the nuclear and radioactive facilities in Cuba

    International Nuclear Information System (INIS)

    Ferro Fernandez, R.; Guillen Campos, A.; Ilizastegui Perez, F.

    1998-01-01

    Considering the wide and multidisciplinary character the topics related with the human factors and the security one believes in the one in CNSN a group gives human factors that has carried out some works in several addresses such form that can be integrated the knowledge and experience in an unique objective to reduce the incidence the human factors in the security starting from a fundamentally preventive work. The present work picks up the main results the developed work

  8. Buried waste integrated demonstration human engineered control station. Final report

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    This document describes the Human Engineered Control Station (HECS) project activities including the conceptual designs. The purpose of the HECS is to enhance the effectiveness and efficiency of remote retrieval by providing an integrated remote control station. The HECS integrates human capabilities, limitations, and expectations into the design to reduce the potential for human error, provides an easy system to learn and operate, provides an increased productivity, and reduces the ultimate investment in training. The overall HECS consists of the technology interface stations, supporting engineering aids, platform (trailer), communications network (broadband system), and collision avoidance system.

  9. Buried waste integrated demonstration human engineered control station. Final report

    International Nuclear Information System (INIS)

    1994-09-01

    This document describes the Human Engineered Control Station (HECS) project activities including the conceptual designs. The purpose of the HECS is to enhance the effectiveness and efficiency of remote retrieval by providing an integrated remote control station. The HECS integrates human capabilities, limitations, and expectations into the design to reduce the potential for human error, provides an easy system to learn and operate, provides an increased productivity, and reduces the ultimate investment in training. The overall HECS consists of the technology interface stations, supporting engineering aids, platform (trailer), communications network (broadband system), and collision avoidance system

  10. Human Factors Engineering Aspects of Modifications in Control Room Modernization

    Energy Technology Data Exchange (ETDEWEB)

    Hugo, Jacques [Idaho National Lab. (INL), Idaho Falls, ID (United States); Clefton, Gordon [Idaho National Lab. (INL), Idaho Falls, ID (United States); Joe, Jeffrey [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2017-06-01

    This report describes the basic aspects of control room modernization projects in the U.S. nuclear industry and the need for supplementary guidance on the integration of human factors considerations into the licensing and regulatory aspects of digital upgrades. The report pays specific attention to the integration of principles described in NUREG-0711 (Human Factors Engineering Program Review Model) and how supplementary guidance can help to raise general awareness in the industry regarding the complexities of control room modernization projects created by many interdependent regulations, standards and guidelines. The report also describes how human factors engineering principles and methods provided by various resources and international standards can help in navigating through the process of licensing digital upgrades. In particular, the integration of human factors engineering guidance and requirements into the process of licensing digital upgrades can help reduce uncertainty related to development of technical bases for digital upgrades that will avoid the introduction of new failure modes.

  11. Mouse Chromosome Engineering for Modeling Human Disease

    OpenAIRE

    van der Weyden, Louise; Bradley, Allan

    2006-01-01

    Chromosomal rearrangements occur frequently in humans and can be disease-associated or phenotypically neutral. Recent technological advances have led to the discovery of copy-number changes previously undetected by cytogenetic techniques. To understand the genetic consequences of such genomic changes, these mutations need to be modeled in experimentally tractable systems. The mouse is an excellent organism for this analysis because of its biological and genetic similarity to humans, and the e...

  12. Human security and the quest for peace in the Middle East, 24 October 2006, University of Maryland

    Energy Technology Data Exchange (ETDEWEB)

    ElBaradei, M

    2006-10-24

    In his talk about 'Human Security And The Quest For Peace In The Middle East' Dr. Mohamed ElBaradei, Director General of the IAEA, first looked at the international security landscape and then focused on the Middle East as a case in point. According to a recent report on human security, there has been a sharp decline since the early 1990s in civil wars and other forms of armed conflict. The number of refugees has also gone down, and human rights abuses have decreased. These statistics indicate that the world is becoming more peaceful. Yet at the same time, the collective sense of insecurity is higher than at any time before, because the forces that drive insecurity remain persistent and pervasive. These drivers of insecurity fit into four categories: poverty (poverty-related insecurities, for the billions who lack access to reliable food supplies, safe drinking water, adequate health care, and modern energy supplies), the lack of good governance, the sense of injustice (resulting from the imbalance between the 'haves' and the 'have nots' and the artificial polarization along religious or ethnic lines. The modern age demands that we think in terms of human security - a concept of security that is people centered and without borders. A concept that acknowledges the inherent linkages between economic and social development, respect for human rights, and peace. This is the basis on which we must 're-engineer' security. UN bodies have succeeded in setting norms and overseeing many important aspects of our life - such as labour relations, global health, civil aviation, food and agriculture, and trade. Despite these achievements, however the system often fails short in addressing threats to international peace and security. To understand the urgency of reforming our system for maintaining international peace and security, we must also look critically at situations where it has not been able to adequately fulfill its function. Three aspects in that regard are to be

  13. Human security and the quest for peace in the Middle East, 24 October 2006, University of Maryland

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2006-01-01

    In his talk about 'Human Security And The Quest For Peace In The Middle East' Dr. Mohamed ElBaradei, Director General of the IAEA, first looked at the international security landscape and then focused on the Middle East as a case in point. According to a recent report on human security, there has been a sharp decline since the early 1990s in civil wars and other forms of armed conflict. The number of refugees has also gone down, and human rights abuses have decreased. These statistics indicate that the world is becoming more peaceful. Yet at the same time, the collective sense of insecurity is higher than at any time before, because the forces that drive insecurity remain persistent and pervasive. These drivers of insecurity fit into four categories: poverty (poverty-related insecurities, for the billions who lack access to reliable food supplies, safe drinking water, adequate health care, and modern energy supplies), the lack of good governance, the sense of injustice (resulting from the imbalance between the 'haves' and the 'have nots' and the artificial polarization along religious or ethnic lines. The modern age demands that we think in terms of human security - a concept of security that is people centered and without borders. A concept that acknowledges the inherent linkages between economic and social development, respect for human rights, and peace. This is the basis on which we must 're-engineer' security. UN bodies have succeeded in setting norms and overseeing many important aspects of our life - such as labour relations, global health, civil aviation, food and agriculture, and trade. Despite these achievements, however the system often fails short in addressing threats to international peace and security. To understand the urgency of reforming our system for maintaining international peace and security, we must also look critically at situations where it has not been able to adequately fulfill its function. Three aspects in that regard are to be

  14. EXPERIMENTAL SEMIOTICS: AN ENGINE OF DISCOVERY FOR UNDERSTANDING HUMAN COMMUNICATION

    OpenAIRE

    BRUNO GALANTUCCI; GARETH ROBERTS

    2012-01-01

    The recent growth of Experimental Semiotics (ES) offers us a new option to investigate human communication. We briefly introduce ES, presenting results from three themes of research which emerged within it. Then we illustrate the contribution ES can make to the investigation of human communication systems, particularly in comparison with the other existing options. This comparison highlights how ES can provide an engine of discovery for understanding human communication. In fact, in complemen...

  15. The Role of Divine Revelation and Religious Teachings in Human Rights System: Security and Global Peace

    Directory of Open Access Journals (Sweden)

    Mahmoud Ghayyoum Zadeh

    2009-03-01

    Full Text Available Peace and security have always been considered as one of man’s concerns. The basis of peace and security should be sought in the theoretical foundations. However, the drafters of universal human rights have struggled to attain peace and security away from religious principles. The present article intends to introduce universal human rights in the light of religious teachings and elaborate on the related religious principles. It also deals with the distinctions between the principles governing the present world with regard to human rights and religious principles to show that if religious principles are seriously followed in the international relations, they will bring about perpetual peace and security for mankind. Therefore, Religion has a unique role in peace and security.

  16. Patching the Wetware: Addressing the Human Factor in Information Security

    Science.gov (United States)

    2011-06-01

    and encryption in the world will never stop a gifted social engineer from rifling a corporate database or an irate employee form crashing a system... response to the loss freedoms, property, or in the case of scarce resources Figure 4.1 Mitnick’s Psychological Insights of Social Engineering (2005...Kitty Genovese murder in which social proof was at play through dispersion of responsibility . Social engineers often prey on this social proof

  17. Human performance models for computer-aided engineering

    Science.gov (United States)

    Elkind, Jerome I. (Editor); Card, Stuart K. (Editor); Hochberg, Julian (Editor); Huey, Beverly Messick (Editor)

    1989-01-01

    This report discusses a topic important to the field of computational human factors: models of human performance and their use in computer-based engineering facilities for the design of complex systems. It focuses on a particular human factors design problem -- the design of cockpit systems for advanced helicopters -- and on a particular aspect of human performance -- vision and related cognitive functions. By focusing in this way, the authors were able to address the selected topics in some depth and develop findings and recommendations that they believe have application to many other aspects of human performance and to other design domains.

  18. Human security and access to water, sanitation, and hygiene: exploring the drivers and nexus

    NARCIS (Netherlands)

    Obani, P.; Gupta, J.; Pahl-Wostl, C.; Badhuri, A.; Gupta, J.

    2016-01-01

    Water security challenges are mostly covered in the literature on the food and energy nexus. This chapter however adopts a broader conception of water security in relation to lack of access to water, sanitation, and hygiene (WASH), and argues that the human rights approach could be instrumental in

  19. Human Security and the Governmentality of Neo-Liberal Mobility : A Feminist Perspective

    NARCIS (Netherlands)

    T-D. Truong (Thanh-Dam)

    2006-01-01

    textabstractTransnational migration and its implications for human security as a policy field constitute one of the most complex issues of our time. Current experiences of displacement and security spans between a cyber world characterized by hyper mobility of finance, technology, information and

  20. Book Review: Anja Jetschke: Human Rights and State Security: Indonesia and the Philippines

    Directory of Open Access Journals (Sweden)

    Salvador Santino F. Regilme, Jr.

    2013-01-01

    Full Text Available Book Review of the Monograph: Jetschke, Anja (2010, Human Rights and State Security: Indonesia and the Philippines ; Philadelphia: University of Pennsylvania Press, ISBN: 978-0-8122-4301-7, 368 pages

  1. Engineering applications of fpgas chaotic systems, artificial neural networks, random number generators, and secure communication systems

    CERN Document Server

    Tlelo-Cuautle, Esteban; de la Fraga, Luis Gerardo

    2016-01-01

    This book offers readers a clear guide to implementing engineering applications with FPGAs, from the mathematical description to the hardware synthesis, including discussion of VHDL programming and co-simulation issues. Coverage includes FPGA realizations such as: chaos generators that are described from their mathematical models; artificial neural networks (ANNs) to predict chaotic time series, for which a discussion of different ANN topologies is included, with different learning techniques and activation functions; random number generators (RNGs) that are realized using different chaos generators, and discussions of their maximum Lyapunov exponent values and entropies. Finally, optimized chaotic oscillators are synchronized and realized to implement a secure communication system that processes black and white and grey-scale images. In each application, readers will find VHDL programming guidelines and computer arithmetic issues, along with co-simulation examples with Active-HDL and Simulink. Readers will b...

  2. Patient safety - the role of human factors and systems engineering.

    Science.gov (United States)

    Carayon, Pascale; Wood, Kenneth E

    2010-01-01

    Patient safety is a global challenge that requires knowledge and skills in multiple areas, including human factors and systems engineering. In this chapter, numerous conceptual approaches and methods for analyzing, preventing and mitigating medical errors are described. Given the complexity of healthcare work systems and processes, we emphasize the need for increasing partnerships between the health sciences and human factors and systems engineering to improve patient safety. Those partnerships will be able to develop and implement the system redesigns that are necessary to improve healthcare work systems and processes for patient safety.

  3. Patient Safety: The Role of Human Factors and Systems Engineering

    Science.gov (United States)

    Carayon, Pascale; Wood, Kenneth E.

    2011-01-01

    Patient safety is a global challenge that requires knowledge and skills in multiple areas, including human factors and systems engineering. In this chapter, numerous conceptual approaches and methods for analyzing, preventing and mitigating medical errors are described. Given the complexity of healthcare work systems and processes, we emphasize the need for increasing partnerships between the health sciences and human factors and systems engineering to improve patient safety. Those partnerships will be able to develop and implement the system redesigns that are necessary to improve healthcare work systems and processes for patient safety. PMID:20543237

  4. Human factors engineering evaluation of the UTR-10 Reactor

    International Nuclear Information System (INIS)

    Lahti, D.; Nilius, D.; Heithoff, D.; Roche, G.; Sage, S.

    1982-01-01

    This paper is a description of a student design team's review and evaluation of Iowa State University's University Test Reactor (UTR-10). The review was based on how well the control room of the UTR-10 measured up to selected portions of NUREG-0800, chapter 18, Human Factor Engineering/Standard Review Plan Development. The review was conducted by inspecting the reactor and interviewing reactor operators. The control room workspace, instrumentation controls and other equipment were evaluated from a human factors engineering point of view that takes into account both system demands and operator capabilities. Identification, assessment, and suggestion for control room design modifications that correct inadequate or unsuitable items was made

  5. Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar

    Science.gov (United States)

    Botel, Gabriel

    This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive

  6. Increasing Awareness of Insider Information Security Threats in Human Resource Department

    OpenAIRE

    Burcin Cetin Karabat; Cagatay Karabat

    2012-01-01

    An insider threat for companies is defined as a threat caused by malicious user who is an employee company. In recent years, there are number of work on insider threats in information security technologies. These works shows that companies should increasingly and seriously should take into account these threats. Human factors in companies constitute one of the weakest links in information security technology and its products used in human resource (HR) management departments. In the literatur...

  7. Tissue engineering and surgery: from translational studies to human trials

    Directory of Open Access Journals (Sweden)

    Vranckx Jan Jeroen

    2017-06-01

    Full Text Available Tissue engineering was introduced as an innovative and promising field in the mid-1980s. The capacity of cells to migrate and proliferate in growth-inducing medium induced great expectancies on generating custom-shaped bioconstructs for tissue regeneration. Tissue engineering represents a unique multidisciplinary translational forum where the principles of biomaterial engineering, the molecular biology of cells and genes, and the clinical sciences of reconstruction would interact intensively through the combined efforts of scientists, engineers, and clinicians. The anticipated possibilities of cell engineering, matrix development, and growth factor therapies are extensive and would largely expand our clinical reconstructive armamentarium. Application of proangiogenic proteins may stimulate wound repair, restore avascular wound beds, or reverse hypoxia in flaps. Autologous cells procured from biopsies may generate an ‘autologous’ dermal and epidermal laminated cover on extensive burn wounds. Three-dimensional printing may generate ‘custom-made’ preshaped scaffolds – shaped as a nose, an ear, or a mandible – in which these cells can be seeded. The paucity of optimal donor tissues may be solved with off-the-shelf tissues using tissue engineering strategies. However, despite the expectations, the speed of translation of in vitro tissue engineering sciences into clinical reality is very slow due to the intrinsic complexity of human tissues. This review focuses on the transition from translational protocols towards current clinical applications of tissue engineering strategies in surgery.

  8. Evolution of Biotechnology and Information Technology and Its Impact on Human Security

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2015-01-01

    Full Text Available Abstract: The development of post-industrial society initiates profound economic, technological and cultural change in the way of life of all mankind. The revolutionary breakthroughs in the field of new technologies such as biotechnology and information technology are reflected in all spheres of human activity, directly affecting the human security. The article analyzes the consequences of widespread usage biotechnology and information technology in the foreign policy practice on the basis of the human security theory. The detailed description of the main directions of the use of biometric technology in the foreign policy and consular practices is provided, the challenges and threats to information security associated with biometrics are analyzed, arising from widespread biotechnology are the main challenges and threats to as well as human security threats arising at the present stage of development and application of these technologies. Human security threats associated with the use of biotechnology are placed in the broader context of global trends in scientific and technological development. The recommendations are formulated in the field of foreign policy and international cooperation, which would neutralize new threats to international and personal safety arising at the present stage of development of biotechnology. The authors conclude that in order to ensure ethical regulation of new technologies that address issues of human security, it is necessary to organize multi-stakeholder partnerships at national and international level with the participation of states, representatives of civil society, business and the research community.

  9. Human engineering design in medical x-ray system

    International Nuclear Information System (INIS)

    Mori, Sadayoshi

    1981-01-01

    The dimension of control desk, design of controller and indicator are studied in relation with human body dimension of radiological technologist. First, in the design of apparatus, it is reasonable to adopt the cumulative distribution in stead of mean values of human body dimension because the mean values would be cause of inadequacy to the majority of operator. Second, I reported about the fundamental items e.g. the display of controller and indicator recommended from the point of view of human engineering. Up to now the radiological technologists were intended to take a serious view of performance of X-ray apparatus only, but hereafter, we think, it is also important to induce the thought of human engineering in the design of X-ray apparatus. (J.P.N.)

  10. When Should We Care About Sustainability? Applying Human Security as the Decisive Criterion

    Directory of Open Access Journals (Sweden)

    Alexander K. Lautensach

    2012-05-01

    Full Text Available It seems intuitively clear that not all human endeavours warrant equal concern over the extent of their sustainability. This raises the question about what criteria might best serve for their prioritisation. We refute, on empirical and theoretical grounds, the counterclaim that sustainability should be of no concern regardless of the circumstances. Human security can serve as a source of criteria that are both widely shared and can be assessed in a reasonably objective manner. Using established classifications, we explore how four forms of sustainability (environmental, economic, social, and cultural relate to the four pillars of human security (environmental, economic, sociopolitical, and health-related. Our findings, based on probable correlations, suggest that the criteria of human security allow for a reliable discrimination between relatively trivial incidences of unsustainable behavior and those that warrant widely shared serious concern. They also confirm that certain sources of human insecurity, such as poverty or violent conflict, tend to perpetuate unsustainable behavior, a useful consideration for the design of development initiatives. Considering that human security enjoys wide and increasing political support among the international community, it is to be hoped that by publicizing the close correlation between human security and sustainability greater attention will be paid to the latter and to its careful definition.

  11. Towards a policy for human security: psychosocial contributions.

    Science.gov (United States)

    Tullio, Francesco

    2007-01-01

    Inspired by the correspondence between Einstein and Freud in 1936, this paper focuses on the multidimensional aspect of security, exploring its implications within the psychosocial approach. Reflections are therefore centred on the psychological aspects of conflict, on bio-psychic responses to violent solicitation and on ways in which individual emotions are managed and controlled by the State. Some social and economic mechanisms comprising the present global social scenario are explored: the intermesh between economic/industrial organisations and Security Institutions, and the consumerist economic model and its individual/collective consequences, ultimately environmental destruction. As suggested by Einstein, the creation of a supranational organisation would be an essential step towards an effective and economically sustainable international system. This can be achieved through a process that implies the evolution of cultural parameters and the transformation of national institutions. In this sense, the author suggests a decisive role for civil society organisations such as the International Physicians for the Prevention of Nuclear War (IPPNW).

  12. The Application of Islamic Economic Security System for a Better Human Security in Indonesia

    OpenAIRE

    Dewi, Gemala

    2013-01-01

    As the 2010 Indonesian demographic Statistic data predicted that in the year 2020-2030 Indonesia will have overpopulation of young people at the productive age (18-50 years old) in about 69%. So there is a need to find solution on jobs and welfare for those segments of people. Islam as the religion of majority people of Indonesia has a teaching regarding this matter that has been known as Islamic economic security system, by means of zakat, waqf, trading and business manner that could give so...

  13. Development and Validation of Mechanical Engineering Trade Skills Assessment Instrument for Sustainable Job Security in Yobe State

    Science.gov (United States)

    Adamu, Gishua Garba; Dawha, Josphine Musa; Kamar, Tiamiyu Salihu

    2015-01-01

    Mechanical Engineering Trade Skills Assessment Instrument (METSAI) is aimed at determining the extent to which students have acquired practical skills before graduation that will enable them get employment for sustainable job security in Yobe state. The study employed instrumentation research design. The populations of the study were 23 mechanical…

  14. The Security of Russia's Nuclear Arsenal: The Human Factor

    International Nuclear Information System (INIS)

    Ball, D.Y.

    1999-01-01

    Assertions by the Russian military that all of their nuclear weapons are secure against theft and that nuclear units within the military are somehow insulated from the problems plaguing the Russian military should not be accepted uncritically. Accordingly, we should not give unwarranted credence to the pronouncements of military figures like Cal.-Gen. Igor Valynkin, Chief of the Defense Ministry's 12th Main Directorate, which oversees the country's nuclear arsenal. He contends that ''Russian nuclear weapons are under reliable supervision'' and that ''talk about the unreliability of our control over nuclear weapons has only one pragmatic goal--to convince international society that the country is incapable of maintaining nuclear safety and to introduce international oversight over those weapons, as it is done, for example, in Iraq.'' While the comparison to Iraq is preposterous, many analysts might agree with Valynkin's sanguine appraisal of the security of Russia's nuclear weapons. In contrast, I argue that the numerous difficulties confronting the military as a whole should cause concern in the West over the security of the Russian nuclear arsenal

  15. Integrated Approach to Peace & Human Security in the 21st Century

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2016-10-01

    Full Text Available Humanity has made remarkable progress during the past two centuries in advancing peace, democracy, human rights, economic development and social equality. The evolution of human relations has progressed far from the time when physical violence, war and conquest were the predominant form of international relations. Diplomacy has evolved from political negotiations at the conference table to mutually beneficial economic exchange and creative cultural integration. But the ideal of peace and human security for all human beings remains elusive, distant and utopian. Violence and insecurity persist and social harmony is threatened by the competition for political supremacy, markets, jobs and scarce resources. Thousands of nuclear weapons remain armed and on alert. Existential ecological threats increase daily. The roots of war and violence remain intact, even if their most horrendous expressions have receded from view. The permanent abolition of war and achievement of human security for all cannot be attained by narrowly conceived political alliances or collective security agreements. The negative concept of peace as the absence of war needs to be replaced by a positive conception of peace as the essential condition for the fullest development of human potential. The narrow concept of security in military and political terms needs to be replaced by an inclusive conception that views security as an emergent property of effective and harmonious social organization founded on the ultimate value of the human being. Peace and security are fundamental attributes of society as a whole. They can only be achieved by a comprehensive, integrated approach that addresses the roots of violence and disharmony in all forms—political, military, economic, social, cultural and ecological. This will require radical democratization of international institutions, establishment of an effective global legal process, abandonment of outmoded conceptions of national

  16. Education and Training Networks as a Tool for Nuclear Security Human Resource Development and Capacity Building

    International Nuclear Information System (INIS)

    Nikonov, D.

    2014-01-01

    Human Resource Development for Capacity Building for Nuclear Security: • Comprehensive Training Programme Objective: To raise awareness, to fill gaps between the actual performance of personnel and the required competencies and skills and, to build-up qualified instructors/trainers. • Promoting Nuclear Security Education Objective: To support the development of teaching material, faculty expertise and preparedness, and the promotion of nuclear security education in collaboration with the academic and scientific community. Ultimate Goal: To develop capabilities for supporting sustainable implementation of the international legal instruments and IAEA guidelines for nuclear security worldwide, and to foster nuclear security culture. Education priorities for the future: • Incorporate feedback from the first pilot program into future academic activities in nuclear security; • Based on feedback from pilot program: • Revise the NSS12 guidance document; • Update educational materials and textbooks. • Support INSEN members, which consider launching MSc programs at their institutions; • Continue promoting nuclear security education as part of existing degree programs (through certificate or concentration options); • Support the use of new forms of teaching and learning in nuclear security education: • Online e-learning degree programmes and modules; • Learning by experience; • Problem-oriented learning tailored to nuclear security functions

  17. Meta-Analysis of Human Factors Engineering Studies Comparing Individual Differences, Practice Effects and Equipment Design Variations.

    Science.gov (United States)

    1985-02-21

    Approvoid foT public 90Ieleol, 2* . tJni7nited " - . - o . - ’--. * . -... . 1 UNCLASSIFIED S, E CURITY CLASSIFICATION OF THIS PAGE-" REPORT DOCUMENTATION...ACCESSION NO. 11. TITLE (Include Security Classification) . Veta -Analysis of Human Factors Engineering Studies Comparing Individual Differences, Practice...Background C Opportunity D Significance E History III. PHASE I FINAL REPORT A Literature Review B Formal Analysis C Results D Implications for Phase II IV

  18. Status of human factors engineering system design in Europe

    International Nuclear Information System (INIS)

    Ives, G.

    1990-01-01

    A review of the European status of human factors engineering has been carried out covering a wide scope of activities which includes psychology, cognitive science, ergonomics, design, training, procedure writing, operating, artificial intelligence and expert systems. There is an increasing awareness of the part that human factors play in major nuclear power plant accidents. The emphasis of attention in human factors is changing. In some areas there are encouraging signs of progress and development, but in other areas there is still scope for improvement

  19. How do radiologists use the human search engine?

    International Nuclear Information System (INIS)

    Wolfe, Jeremy M.; Evans, Karla K.; Drew, Trafton; Aizenman, Avigael; Josephs, Emilie

    2016-01-01

    Radiologists perform many 'visual search tasks' in which they look for one or more instances of one or more types of target item in a medical image (e.g. cancer screening). To understand and improve how radiologists do such tasks, it must be understood how the human 'search engine' works. This article briefly reviews some of the relevant work into this aspect of medical image perception. Questions include how attention and the eyes are guided in radiologic search? How is global (image-wide) information used in search? How might properties of human vision and human cognition lead to errors in radiologic search? (authors)

  20. Control room design and human engineering in power plants

    International Nuclear Information System (INIS)

    Herbst, L.; Hinz, W.

    1982-01-01

    The concept for modern plant control rooms is primary influenced by: The automation of protection, binary control and closed loop control functions; organization employing functional areas; computer based information processing; human engineered design. Automation reduces the human work load. Employment of functional areas permits optimization of operational sequences. Computer based information processing makes it possible to output information in accordance with operating requirements. Design based on human engineering principles assures the quality of the interaction between the operator and the equipment. The degree to which these conceptional features play a role in design of power plant control rooms depends on the unit rating, the mode of operation and on the requirements respecting safety and availability of the plant. (orig.)

  1. Neo-liberalism, Human Security, and Pan-Africanist Ideals

    African Journals Online (AJOL)

    regaining lost dignity has become the mainspring of most actions ... expressed were the concepts of freedom and common identity. The yearning for the former was ... private capital and entrepreneurship as the engine of economic growth and ... problems created by the processes of social interactions in Africa.8. People of ...

  2. Developments in the Nuclear Safeguards and Security Engineering Degree Program at Tomsk Polytechnic University

    International Nuclear Information System (INIS)

    Boiko, Vladimir I.; Demyanyuk, Dmitry G.; Silaev, Maxim E.; Duncan, Cristen L.; Heinberg, Cynthia L.; Killinger, Mark H.; Goodey, Kent O.; Butler, Gilbert W.

    2009-01-01

    Over the last six years, Tomsk Polytechnic University (TPU) has developed a 5 1/2 year engineering degree program in the field of Material Protection Control and Accounting (MPC and A). In 2009 the first students graduated with this new degree. There were 25 job offers from nuclear fuel cycle enterprises of Russia and Kazakhstan for 17 graduates of the program. Due to the rather wide selection of workplaces, all graduates have obtained positions at nuclear enterprises. The program was developed within the Applied Physics and Engineering Department (APED). The laboratory and methodological base has been created taking into consideration the experience of the similar program at the Moscow Engineering Physics Institute (MEPhI). However, the TPU program has some distinguishing features such as the inclusion of special courses pertaining to fuel enrichment and reprocessing. During the last two years, three MPC and A laboratories have been established at APED. This was made possible due to several factors such as establishment of the State innovative educational program at TPU, assistance of the U.S. Department of Energy through Pacific Northwest National Laboratory and Los Alamos National Laboratory, and the financial support of the Swedish Radiation Safety Authority and some Russian private companies. All three of the MPC and A laboratories are part of the Innovative Educational Center 'Nuclear Technologies and Non-Proliferation,' which deals with many topics including research activities, development of new curricula for experts training and retraining, and training of master's students. In 2008, TPU developed a relationship with the International Atomic Energy Agency (IAEA), which was familiarized with APED's current resources and activities. The IAEA has shown interest in creation of a master's degree educational program in the field of nuclear security at TPU. A future objective is to acquaint nuclear fuel cycle enterprises with new APED capabilities and involve

  3. Computer science security research and human subjects: emerging considerations for research ethics boards.

    Science.gov (United States)

    Buchanan, Elizabeth; Aycock, John; Dexter, Scott; Dittrich, David; Hvizdak, Erin

    2011-06-01

    This paper explores the growing concerns with computer science research, and in particular, computer security research and its relationship with the committees that review human subjects research. It offers cases that review boards are likely to confront, and provides a context for appropriate consideration of such research, as issues of bots, clouds, and worms enter the discourse of human subjects review.

  4. Human factors engineering report for the cold vacuum drying facility

    Energy Technology Data Exchange (ETDEWEB)

    IMKER, F.W.

    1999-06-30

    The purpose of this report is to present the results and findings of the final Human Factors Engineering (HFE) technical analysis and evaluation of the Cold Vacuum Drying Facility (CVDF). Ergonomics issues are also addressed in this report, as appropriate. This report follows up and completes the preliminary work accomplished and reported by the Preliminary HFE Analysis report (SNF-2825, Spent Nuclear Fuel Project Cold Vacuum Drying Facility Human Factors Engineering Analysis: Results and Findings). This analysis avoids redundancy of effort except for ensuring that previously recommended HFE design changes have not affected other parts of the system. Changes in one part of the system may affect other parts of the system where those changes were not applied. The final HFE analysis and evaluation of the CVDF human-machine interactions (HMI) was expanded to include: the physical work environment, human-computer interface (HCI) including workstation and software, operator tasks, tools, maintainability, communications, staffing, training, and the overall ability of humans to accomplish their responsibilities, as appropriate. Key focal areas for this report are the process bay operations, process water conditioning (PWC) skid, tank room, and Central Control Room operations. These key areas contain the system safety-class components and are the foundation for the human factors design basis of the CVDF.

  5. Human factors engineering report for the cold vacuum drying facility

    International Nuclear Information System (INIS)

    IMKER, F.W.

    1999-01-01

    The purpose of this report is to present the results and findings of the final Human Factors Engineering (HFE) technical analysis and evaluation of the Cold Vacuum Drying Facility (CVDF). Ergonomics issues are also addressed in this report, as appropriate. This report follows up and completes the preliminary work accomplished and reported by the Preliminary HFE Analysis report (SNF-2825, Spent Nuclear Fuel Project Cold Vacuum Drying Facility Human Factors Engineering Analysis: Results and Findings). This analysis avoids redundancy of effort except for ensuring that previously recommended HFE design changes have not affected other parts of the system. Changes in one part of the system may affect other parts of the system where those changes were not applied. The final HFE analysis and evaluation of the CVDF human-machine interactions (HMI) was expanded to include: the physical work environment, human-computer interface (HCI) including workstation and software, operator tasks, tools, maintainability, communications, staffing, training, and the overall ability of humans to accomplish their responsibilities, as appropriate. Key focal areas for this report are the process bay operations, process water conditioning (PWC) skid, tank room, and Central Control Room operations. These key areas contain the system safety-class components and are the foundation for the human factors design basis of the CVDF

  6. Site-Specific Genome Engineering in Human Pluripotent Stem Cells.

    Science.gov (United States)

    Merkert, Sylvia; Martin, Ulrich

    2016-06-24

    The possibility to generate patient-specific induced pluripotent stem cells (iPSCs) offers an unprecedented potential of applications in clinical therapy and medical research. Human iPSCs and their differentiated derivatives are tools for diseases modelling, drug discovery, safety pharmacology, and toxicology. Moreover, they allow for the engineering of bioartificial tissue and are promising candidates for cellular therapies. For many of these applications, the ability to genetically modify pluripotent stem cells (PSCs) is indispensable, but efficient site-specific and safe technologies for genetic engineering of PSCs were developed only recently. By now, customized engineered nucleases provide excellent tools for targeted genome editing, opening new perspectives for biomedical research and cellular therapies.

  7. Human Security and Mutual Vulnerability: The Global Political ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    -Cold War era: the search for an analytical framework that will help us understand this turbulent and chaotic period in human history. His lucid and visionary analysis rests on the concept of mutual vulnerability: that in an increasingly ...

  8. International Security Presence in Kosovo and its Human Rights Implications

    OpenAIRE

    Istrefi, Remzije

    2017-01-01

    In this article I will examine the powers and activities of NATO-led Kosovo forces (KFOR) and their impact on human rights protection in Kosovo. Through this examination, I seek to answer the following questions: which KFOR actions affected the human rights of Kosovars? Does KFOR carry out responsibilities and abide by the obligations normally imposed upon nation-states? And is there a solution available when the alleged violator is KFOR? KFOR is responsible for carrying out military tasks an...

  9. Speech freedom and press freedom in human security in Rwanda

    OpenAIRE

    Niyonzima, Oswald

    2014-01-01

    Treball Final de Màster Universitari Internacional en Estudis de Pau, Conflictes i Desenvolupament. Codi: SAA074. Curs: 2013/2014 Freedom of speech and press freedom are key foundations of all human rights as stipulated in human rights declaration of 1948. Denying people the right to free speech is keeping them away from what is happening in this world, thus, hindering them from participating in decision making. While speech freedom and press freedom are key tools to measure if a country ...

  10. DRUMS: a human disease related unique gene mutation search engine.

    Science.gov (United States)

    Li, Zuofeng; Liu, Xingnan; Wen, Jingran; Xu, Ye; Zhao, Xin; Li, Xuan; Liu, Lei; Zhang, Xiaoyan

    2011-10-01

    With the completion of the human genome project and the development of new methods for gene variant detection, the integration of mutation data and its phenotypic consequences has become more important than ever. Among all available resources, locus-specific databases (LSDBs) curate one or more specific genes' mutation data along with high-quality phenotypes. Although some genotype-phenotype data from LSDB have been integrated into central databases little effort has been made to integrate all these data by a search engine approach. In this work, we have developed disease related unique gene mutation search engine (DRUMS), a search engine for human disease related unique gene mutation as a convenient tool for biologists or physicians to retrieve gene variant and related phenotype information. Gene variant and phenotype information were stored in a gene-centred relational database. Moreover, the relationships between mutations and diseases were indexed by the uniform resource identifier from LSDB, or another central database. By querying DRUMS, users can access the most popular mutation databases under one interface. DRUMS could be treated as a domain specific search engine. By using web crawling, indexing, and searching technologies, it provides a competitively efficient interface for searching and retrieving mutation data and their relationships to diseases. The present system is freely accessible at http://www.scbit.org/glif/new/drums/index.html. © 2011 Wiley-Liss, Inc.

  11. Cooperative and Human Aspects of Software Engineering (CHASE 2010)

    DEFF Research Database (Denmark)

    Dittrich, Yvonne; De Souza, Cleidson; Korpela, Mikko

    2010-01-01

    Software is created by people---software engineers---working in varied environments, under various conditions. Thus understanding cooperative and human aspect of software development is crucial to comprehend how methods and tools are used, and thereby improving the creation and maintenance...... research on human and cooperative aspects of software engineering. We aim at providing both a meeting place for the growing community and the possibility for researchers interested in joining the field to present their work in progress and get an overview over the field....... of software. Inspired by the hosting country's concept of co-responsibility -- ubuntu -- we especially invited contributions that address community-based development like open source development and sustainability of ICT eco-systems. The goal of this workshop is to provide a forum for discussing high quality...

  12. Human and organization factors: engineering operating safety into offshore structures

    International Nuclear Information System (INIS)

    Bea, Robert G.

    1998-01-01

    History indicates clearly that the safety of offshore structures is determined primarily by the humans and organizations responsible for these structures during their design, construction, operation, maintenance, and decommissioning. If the safety of offshore structures is to be preserved and improved, then attention of engineers should focus on to how to improve the reliability of the offshore structure 'system,' including the people that come into contact with the structure during its life-cycle. This article reviews and discusss concepts and engineering approaches that can be used in such efforts. Two specific human factor issues are addressed: (1) real-time management of safety during operations, and (2) development of a Safety Management Assessment System to help improve the safety of offshore structures

  13. Computer aided systems human engineering: A hypermedia tool

    Science.gov (United States)

    Boff, Kenneth R.; Monk, Donald L.; Cody, William J.

    1992-01-01

    The Computer Aided Systems Human Engineering (CASHE) system, Version 1.0, is a multimedia ergonomics database on CD-ROM for the Apple Macintosh II computer, being developed for use by human system designers, educators, and researchers. It will initially be available on CD-ROM and will allow users to access ergonomics data and models stored electronically as text, graphics, and audio. The CASHE CD-ROM, Version 1.0 will contain the Boff and Lincoln (1988) Engineering Data Compendium, MIL-STD-1472D and a unique, interactive simulation capability, the Perception and Performance Prototyper. Its features also include a specialized data retrieval, scaling, and analysis capability and the state of the art in information retrieval, browsing, and navigation.

  14. Human Factors Engineering: Current Practices and Development Needs in Finland

    Energy Technology Data Exchange (ETDEWEB)

    Savioja, Paula; Norros, Leena; Liinasuo, Marja; Laarni, Jari [VTT Technical Research Centre of Finland, Finland (Finland)

    2011-08-15

    This paper describes initial findings from a study concerning the practices and development needs of Human Factors Engineering (HFE) in Finland. HFE is increasing in importance as the Radiation and Nuclear Safety Authority Finland (STUK) is renewing the regulatory guidelines and the intention is to include requirements concerning HFE. The motivation for the paper is to discover how HFE is conducted currently in order to envision what should be aimed at when modifying requirements for design practices. In an interview with STUK it was discovered that current HFE practices encompass mainly activities related to control room modifications and as such namely verification and validation of new designs. The adoption of the entire HFE process in design and modification projects requires changes that include better integration of technical and Human Factors Engineering approaches. Boundary objects that mediate between different design disciplines are needed in order to enforce the stronger integration. Concept of operations (CONOPS) is suggested as a such boundary object.

  15. A vulnerability-centric requirements engineering framework : Analyzing security attacks, countermeasures, and requirements based on vulnerabilities

    NARCIS (Netherlands)

    Elahi, G.; Yu, E.; Zannone, N.

    2010-01-01

    Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements

  16. Factoring tradotronic media communication for human security management and social stability in Nigerian communities

    Directory of Open Access Journals (Sweden)

    Ani Kelechi Johnmary

    2014-04-01

    Full Text Available The level of killing and bloodletting in Nigeria is increasing every second, minute, hour, day, month and year. Man, animals, properties etc are increasingly under threat in contemporary Nigerian society. The causes of the massive insecurity of lives and properties remain multi-dimensional. This paper is centered on the need to factor tradotronic media for human security management in Nigeria. It reveals that the dimensions of human insecurity in Nigeria, include but not limited to assassination-based human insecurity, robbery/kidnapping related human insecurity, political-related human insecurity, ethnic-based human insecurity, inter-communal conflict-related human insecurity, religious-motivated human insecurity and multi-dimensional conflict related human insecurity. The paper calles on all lovers of life and human dignity to rise up and defend the survival and existence of every breathing soul around him or her in this sovereign entity, called Nigeria.

  17. The Human Factors Engineering in Process Design Modifications CNAT

    International Nuclear Information System (INIS)

    Foronda Delgado, A.; Almeida Parra, P.; Bote Moreno, J.

    2013-01-01

    This contribution presents the process followed at the Almaraz and Trillo Nuclear Power Plants in order to integrate Human Factors Engineering (HFE) in the Design Modifications. This includes the applicable rules and regulations, the classification criteria used to categorize the modification, the activities that are to be carried out in each case, as well as recent examples where the full HFE program model was applied at Almaraz (Alternate Shutdown Panel) and Trillo (Primary Bleed and Feed).

  18. Rapid Prototyping and the Human Factors Engineering Process

    Science.gov (United States)

    2016-08-29

    conventional systems development techniques. It is not clear, however, exactly how rapid prototyping could be used in relation to conventional human...factors engineering analyses. Therefore, an investigation of the use of the V APS virtual prototyping system was carried out in five organizations. The...results show that a variety of task analysis approaches can be used to initiate rapid prototyping . Overall, it appears that rapid prototyping

  19. Advancing biomaterials of human origin for tissue engineering

    OpenAIRE

    Chen, Fa-Ming; Liu, Xiaohua

    2015-01-01

    Biomaterials have played an increasingly prominent role in the success of biomedical devices and in the development of tissue engineering, which seeks to unlock the regenerative potential innate to human tissues/organs in a state of deterioration and to restore or reestablish normal bodily function. Advances in our understanding of regenerative biomaterials and their roles in new tissue formation can potentially open a new frontier in the fast-growing field of regenerative medicine. Taking in...

  20. Engineering Education Development to Enhance Human Skill in DENSO

    Science.gov (United States)

    Isogai, Emiko; Nuka, Takeji

    Importance of human skills such as communication or instruction capability to their staff members has recently been highlighted in a workplace, due to decreasing opportunity of face-to-face communication between supervisors and their staff, or Instruction capability through OJT (On the Job Training) . Currently, communication skills are being reinforced mainly through OJT at DENSO. Therefore, as part of supplemental support tools, DENSO has established comprehensive engineers training program on off-JT basis for developing human skills, covering from newly employeed enginners up to managerial class since 2003. This paper describes education activities and reports the results.

  1. Control room design and human engineering in power plants

    International Nuclear Information System (INIS)

    Herbst, L.; Hinz, W.

    1981-01-01

    Automation reduces the human work load. Employment of functional areas permits optimization of operational sequences. Computer based information processing makes it possible to output information in accordance with operating requirements. Design based on human engineering principles assures the quality of the interaction between the operator and the equipment. The degree to which these conceptional features play a role in design of power plant control rooms depends on the unit rating, the mode of operation and on the requirements respecting safety and availability of the plant. (orig./RW)

  2. Human factors engineering plan for reviewing nuclear plant modernization programs

    International Nuclear Information System (INIS)

    O'Hara, John; Higgins, James

    2004-12-01

    The Swedish Nuclear Power Inspectorate reviews the human factors engineering (HFE) aspects of nuclear power plants (NPPs) involved in the modernization of the plant systems and control rooms. The purpose of a HFE review is to help ensure personnel and public safety by verifying that accepted HFE practices and guidelines are incorporated into the program and nuclear power plant design. Such a review helps to ensure the HFE aspects of an NPP are developed, designed, and evaluated on the basis of a structured top-down system analysis using accepted HFE principles. The review addresses eleven HFE elements: HFE Program Management, Operating Experience Review, Functional Requirements Analysis and Allocation, Task Analysis, Staffing, Human Reliability Analysis, Human-System Interface Design, Procedure Development, Training Program Development, Human Factors Verification and Validation, and Design Implementation

  3. Human factors engineering plan for reviewing nuclear plant modernization programs

    Energy Technology Data Exchange (ETDEWEB)

    O' Hara, John; Higgins, James [Brookhaven National Laboratory, Upton, NY (United States)

    2004-12-01

    The Swedish Nuclear Power Inspectorate reviews the human factors engineering (HFE) aspects of nuclear power plants (NPPs) involved in the modernization of the plant systems and control rooms. The purpose of a HFE review is to help ensure personnel and public safety by verifying that accepted HFE practices and guidelines are incorporated into the program and nuclear power plant design. Such a review helps to ensure the HFE aspects of an NPP are developed, designed, and evaluated on the basis of a structured top-down system analysis using accepted HFE principles. The review addresses eleven HFE elements: HFE Program Management, Operating Experience Review, Functional Requirements Analysis and Allocation, Task Analysis, Staffing, Human Reliability Analysis, Human-System Interface Design, Procedure Development, Training Program Development, Human Factors Verification and Validation, and Design Implementation.

  4. Human Engineering of Space Vehicle Displays and Controls

    Science.gov (United States)

    Whitmore, Mihriban; Holden, Kritina L.; Boyer, Jennifer; Stephens, John-Paul; Ezer, Neta; Sandor, Aniko

    2010-01-01

    Proper attention to the integration of the human needs in the vehicle displays and controls design process creates a safe and productive environment for crew. Although this integration is critical for all phases of flight, for crew interfaces that are used during dynamic phases (e.g., ascent and entry), the integration is particularly important because of demanding environmental conditions. This panel addresses the process of how human engineering involvement ensures that human-system integration occurs early in the design and development process and continues throughout the lifecycle of a vehicle. This process includes the development of requirements and quantitative metrics to measure design success, research on fundamental design questions, human-in-the-loop evaluations, and iterative design. Processes and results from research on displays and controls; the creation and validation of usability, workload, and consistency metrics; and the design and evaluation of crew interfaces for NASA's Crew Exploration Vehicle are used as case studies.

  5. Advances in biometrics for secure human authentication and recognition

    CERN Document Server

    Kisku, Dakshina Ranjan; Sing, Jamuna Kanta

    2013-01-01

    GENERAL BIOMETRICSSecurity and Reliability Assessment for Biometric Systems; Gayatri MirajkarReview of Human Recognition Based on Retinal Images; Amin DehghaniADVANCED TOPICS IN BIOMETRICSVisual Speech as Behavioral Biometric; Preety Singh, Vijay Laxmi, and Manoj Singh GaurHuman Gait Signature for Biometric Authentication; Vijay JohnHand-Based Biometric for Personal Identification Using Correlation Filter Classifier; Mohammed Saigaa , Abdallah Meraoumia , Salim Chitroub, and Ahmed BouridaneOn Deciding the Dynamic Periocular Boundary for Human Recognition; Sambit Bakshi , Pankaj Kumar Sa, and Banshidhar MajhiRetention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System; Nilanjan Dey, Bijurika Nandi, Poulami Das, Achintya Das, and Sheli Sinha ChaudhuriFacial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis; N. G. Chitaliya and A. I. TrivediCASE STUDIES AND LA...

  6. Human Capital. Corps of Engineers Needs to Update Its Workforce Planning Process to More Effectively Address Its Current and Future Workforce Needs

    Science.gov (United States)

    2008-05-01

    Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia Committee on Homeland Security and...allows flex-time, telecommuting , or alternative work schedules. Page 17 GAO-08-596 Corps of Engineers Table 1: Examples of Human Capital...programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight , policy, and funding

  7. Human Trafficking: A Security Challenge in Nigeria. | Tor-Anyiin ...

    African Journals Online (AJOL)

    This paper examines human trafficking, which is today rated as the third world organized crime after drugs and arms. The concept of the trade, which crosses internal and international borders, has also been discussed. The factors that facilitate the trade like poverty, personal and social are equally identified and discussed.

  8. Understanding complexities in coupled dynamics of human-water and food security

    Science.gov (United States)

    Usmani, M.; Kondal, A.; Lin, L.; Colwell, R. R.; Jutla, A.

    2017-12-01

    Traditional premise of food security is associated with satisfying human hunger by providing sufficient calories to population. Water is the key variable associated with the growth of crops, which is then used as a metric of success for abundance of food across globe. The current framework often negates complex coupled interaction between availability of food nutrients and human well-being (such as productivity, work efficiency, low birth weight, physical and mental growth). Our analysis suggests that 1 in 3 humans suffer from malnutrition across the globe. In last five decades, most of the countries have a decreasing availability trend in at least one of the twenty-three essential food nutrients required for human well-being. We argue that food security can only be achieved if information on use of water for crops and consumption of food must include availability of nutrients for humans. Here, we propose a new concept of "consumptive nutrients" that include constant feedback mechanism between water-human and societal processes- essential for growth, distribution and consumption of food nutrients. Using Ethiopia as a signature rain-fed agricultural region, we will show how decreasing precipitation has led to an increase in crop productivity, but decreased availability of nutrients for humans. This in turn has destabilizing impact on overall regional economy. We will demonstrate why inclusion of nutrients must be a part of discussion for ensuring food security to human population.

  9. An adaptive algorithm for performance assessment of construction project management with respect to resilience engineering and job security

    Directory of Open Access Journals (Sweden)

    P. Hashemi

    2018-01-01

    Full Text Available Construction sites are accident-prone locations and therefore safety management plays an im-portant role in these workplaces. This study presents an adaptive algorithm for performance as-sessment of project management with respect to resilience engineering and job security in a large construction site. The required data are collected using questionnaires in a large construction site. The presented algorithm is composed of radial basis function (RBF, artificial neural networks multi-layer perceptron (ANN-MLP, and statistical tests. The results indicate that preparedness, fault-tolerance, and flexibility are the most effective factors on overall efficiency. Moreover, job security and resilience engineering have similar statistical impacts on overall system efficiency. The results are verified and validated by the proposed algorithm.

  10. Facing global environmental change. Environmental, human, energy, food, health and water security concepts

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); AFES-Press, Mosbach (Germany); Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Cuernavaca, MOR (MX). Centro Regional de Investigaciones Multidiscipinarias (CRIM); United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); Grin, John [Amsterdam Univ. (Netherlands). Amsterdam School for Social Science Research; Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Kameri-Mbote, Patricia [Nairobi Univ. (Kenya). School of Law; International Environmental Law Research Centre, Nairobi (Kenya); Behera, Navnita Chadha [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Tunis-Carthage Univ., Hammam-Chatt (Tunisia); Krummenacher, Heinz (eds.) [swisspeace, Bern (Switzerland). FAST International

    2009-07-01

    This policy-focused, global and multidisciplinary security handbook on Facing Global Environmental Change addresses new security threats of the 21st century posed by climate change, desertification, water stress, population growth and urbanization. These security dangers and concerns lead to migration, crises and conflicts. They are on the agenda of the UN, OECD, OSCE, NATO and EU. In 100 chapters, 132 authors from 49 countries analyze the global debate on environmental, human and gender, energy, food, livelihood, health and water security concepts and policy problems. In 10 parts they discuss the context and the securitization of global environmental change and of extreme natural and societal outcomes. They suggest a new research programme to move from knowledge to action, from reactive to proactive policies and to explore the opportunities of environ-mental cooperation for a new peace policy. (orig.)

  11. Audited credential delegation: a usable security solution for the virtual physiological human toolkit

    Science.gov (United States)

    Haidar, Ali N.; Zasada, Stefan J.; Coveney, Peter V.; Abdallah, Ali E.; Beckles, Bruce; Jones, Mike A. S.

    2011-01-01

    We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username–password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale. PMID:22670214

  12. Audited credential delegation: a usable security solution for the virtual physiological human toolkit.

    Science.gov (United States)

    Haidar, Ali N; Zasada, Stefan J; Coveney, Peter V; Abdallah, Ali E; Beckles, Bruce; Jones, Mike A S

    2011-06-06

    We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username-password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale.

  13. Mechanisms for training security inspectors to enhance human performance

    International Nuclear Information System (INIS)

    Burkhalter, H.E.; Sessions, J.C.

    1988-01-01

    The Department of Energy (DOE) has established qualification standards for protective force personnel employed at nuclear facilities [10 CFR Part 1046 (Federal Register)]. Training mechanisms used at Los Alamos to enhance human performance in meeting DOE standards include, but are not limited to, the following: for cardio-respiratory training, they utilize distance running, interval training, sprint training, pacing, indoor aerobics and circuit training; for muscular strength, free weights, weight machines, light hand weights, grip strength conditioners, and calistenics are employed; for muscular endurance, participants do high repetitions (15 - 40) using dumbbells, flex weights, resistive rubber bands, benches, and calisthenics; for flexibility, each training session devotes specific times to stretch the muscles involved for a particular activity. These training mechanisms with specific protocols can enhance human performance

  14. Human detection and motion analysis at security points

    Science.gov (United States)

    Ozer, I. Burak; Lv, Tiehan; Wolf, Wayne H.

    2003-08-01

    This paper presents a real-time video surveillance system for the recognition of specific human activities. Specifically, the proposed automatic motion analysis is used as an on-line alarm system to detect abnormal situations in a campus environment. A smart multi-camera system developed at Princeton University is extended for use in smart environments in which the camera detects the presence of multiple persons as well as their gestures and their interaction in real-time.

  15. Human Factors Engineering: Current and Emerging Dual-Use Applications

    Science.gov (United States)

    Chandlee, G. O.; Goldsberry, B. S.

    1994-01-01

    Human Factors Engineering is a multidisciplinary endeavor in which information pertaining to human characteristics is used in the development of systems and machines. Six representatives considered to be experts from the public and private sectors were surveyed in an effort to identify the potential dual-use of human factors technology. Each individual was asked to provide a rating as to the dual-use of 85 identified NASA technologies. Results of the survey were as follows: nearly 75 percent of the technologies were identified at least once as high dual-use by one of the six survey respondents, and nearly 25 percent of the identified NASA technologies were identified as high dual-use technologies by a majority of the respondents. The perceived level of dual-use appeared to be independent of the technology category. Successful identification of dual-use technology requires expanded input from industry. As an adjunct, cost-benefit analysis should be conducted to identify the feasibility of the dual-use technology. Concurrent with this effort should be an examination of precedents established by other technologies in other industrial settings. Advances in human factors and systems engineering are critical to reduce risk in any workplace and to enhance industrial competitiveness.

  16. Human factors engineering checklists for application in the SAR process

    Energy Technology Data Exchange (ETDEWEB)

    Overlin, T.K.; Romero, H.A.; Ryan, T.G.

    1995-03-01

    This technical report was produced to assist the preparers and reviewers of the human factors portions of the SAR in completing their assigned tasks regarding analysis and/or review of completed analyses. The checklists, which are the main body of the report, and the subsequent tables, were developed to assist analysts in generating the needed analysis data to complete the human engineering analysis for the SAR. The technical report provides a series of 19 human factors engineering (HFE) checklists which support the safety analyses of the US Department of Energy`s (DOE) reactor and nonreactor facilities and activities. The results generated using these checklists and in the preparation of the concluding analyses provide the technical basis for preparing the human factors chapter, and subsequent inputs to other chapters, required by DOE as a part of the safety analysis reports (SARs). This document is divided into four main sections. The first part explains the origin of the checklists, the sources utilized, and other information pertaining to the purpose and scope of the report. The second part, subdivided into 19 sections, is the checklists themselves. The third section is the glossary which defines terms that could either be unfamiliar or have specific meanings within the context of these checklists. The final section is the subject index in which the glossary terms are referenced back to the specific checklist and page the term is encountered.

  17. Human factors engineering checklists for application in the SAR process

    International Nuclear Information System (INIS)

    Overlin, T.K.; Romero, H.A.; Ryan, T.G.

    1995-03-01

    This technical report was produced to assist the preparers and reviewers of the human factors portions of the SAR in completing their assigned tasks regarding analysis and/or review of completed analyses. The checklists, which are the main body of the report, and the subsequent tables, were developed to assist analysts in generating the needed analysis data to complete the human engineering analysis for the SAR. The technical report provides a series of 19 human factors engineering (HFE) checklists which support the safety analyses of the US Department of Energy's (DOE) reactor and nonreactor facilities and activities. The results generated using these checklists and in the preparation of the concluding analyses provide the technical basis for preparing the human factors chapter, and subsequent inputs to other chapters, required by DOE as a part of the safety analysis reports (SARs). This document is divided into four main sections. The first part explains the origin of the checklists, the sources utilized, and other information pertaining to the purpose and scope of the report. The second part, subdivided into 19 sections, is the checklists themselves. The third section is the glossary which defines terms that could either be unfamiliar or have specific meanings within the context of these checklists. The final section is the subject index in which the glossary terms are referenced back to the specific checklist and page the term is encountered

  18. Mechanical stimulation improves tissue-engineered human skeletal muscle

    Science.gov (United States)

    Powell, Courtney A.; Smiley, Beth L.; Mills, John; Vandenburgh, Herman H.

    2002-01-01

    Human bioartificial muscles (HBAMs) are tissue engineered by suspending muscle cells in collagen/MATRIGEL, casting in a silicone mold containing end attachment sites, and allowing the cells to differentiate for 8 to 16 days. The resulting HBAMs are representative of skeletal muscle in that they contain parallel arrays of postmitotic myofibers; however, they differ in many other morphological characteristics. To engineer improved HBAMs, i.e., more in vivo-like, we developed Mechanical Cell Stimulator (MCS) hardware to apply in vivo-like forces directly to the engineered tissue. A sensitive force transducer attached to the HBAM measured real-time, internally generated, as well as externally applied, forces. The muscle cells generated increasing internal forces during formation which were inhibitable with a cytoskeleton depolymerizer. Repetitive stretch/relaxation for 8 days increased the HBAM elasticity two- to threefold, mean myofiber diameter 12%, and myofiber area percent 40%. This system allows engineering of improved skeletal muscle analogs as well as a nondestructive method to determine passive force and viscoelastic properties of the resulting tissue.

  19. CRISPR Genome Engineering for Human Pluripotent Stem Cell Research.

    Science.gov (United States)

    Chaterji, Somali; Ahn, Eun Hyun; Kim, Deok-Ho

    2017-01-01

    The emergence of targeted and efficient genome editing technologies, such as repurposed bacterial programmable nucleases (e.g., CRISPR-Cas systems), has abetted the development of cell engineering approaches. Lessons learned from the development of RNA-interference (RNA-i) therapies can spur the translation of genome editing, such as those enabling the translation of human pluripotent stem cell engineering. In this review, we discuss the opportunities and the challenges of repurposing bacterial nucleases for genome editing, while appreciating their roles, primarily at the epigenomic granularity. First, we discuss the evolution of high-precision, genome editing technologies, highlighting CRISPR-Cas9. They exist in the form of programmable nucleases, engineered with sequence-specific localizing domains, and with the ability to revolutionize human stem cell technologies through precision targeting with greater on-target activities. Next, we highlight the major challenges that need to be met prior to bench-to-bedside translation, often learning from the path-to-clinic of complementary technologies, such as RNA-i. Finally, we suggest potential bioinformatics developments and CRISPR delivery vehicles that can be deployed to circumvent some of the challenges confronting genome editing technologies en route to the clinic.

  20. HOW DO RADIOLOGISTS USE THE HUMAN SEARCH ENGINE?

    Science.gov (United States)

    Wolfe, Jeremy M; Evans, Karla K; Drew, Trafton; Aizenman, Avigael; Josephs, Emilie

    2016-06-01

    Radiologists perform many 'visual search tasks' in which they look for one or more instances of one or more types of target item in a medical image (e.g. cancer screening). To understand and improve how radiologists do such tasks, it must be understood how the human 'search engine' works. This article briefly reviews some of the relevant work into this aspect of medical image perception. Questions include how attention and the eyes are guided in radiologic search? How is global (image-wide) information used in search? How might properties of human vision and human cognition lead to errors in radiologic search? © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  1. The Potential of Human Rights Education for Conflict Prevention and Security

    Science.gov (United States)

    Davies, Lynn

    2010-01-01

    This paper examines the contribution of human rights education (HRE) to conflict prevention and to the promotion of security. It outlines the difficulties in evaluating the long-term impact of HRE, but then proposes five benefits of a rights-based approach to education--rights as secular, man-made, requiring transparency, enabling freedom from…

  2. The European Union’s Human Security Doctrine: A Critical Analysis

    Science.gov (United States)

    2009-03-01

    Symbolism: Europe Takes on Human Security,” 92. 91 Ayn Rand, The Virtue of Selfishness: A New Concept of Egoism (New York: Signet Press, 1964). 92 Bailes...New Concept of Egoism . New York: Signet Press, 1964. Report of the International Commission on Intervention and State Sovereignty. The Responsibility

  3. Human Security in the Context of Sudan's State Crisis: The Case of ...

    African Journals Online (AJOL)

    ... lost more than 5 million citizens in civil wars. A violent confl ict erupted in 2003, with more than 250 000 civilians killed and more than 2 million people displaced. This article traces and examines the genesis and magnitude of human security challenges in the Darfur region of the Sudan. Africa Insight Vol. 37 (4) 2008 pp.

  4. Human Security in the Asia-Pacific: In Australia’s National Interests?

    Science.gov (United States)

    2011-12-16

    opportunities for the disadvantaged. Further, overfishing and intense competition reduces legitimate income for traditional seafaring communities and...international community through the rule of law. In the second way, the purpose of human security is essentially humanitarian. Viewed through this prism, human...terrorism and Sudden Acute Respiratory Syndrome generated fear within the community —one through fear of violence and the other fear of illness

  5. Factoring tradotronic media communication for human security management and social stability in Nigerian communities

    OpenAIRE

    Ani Kelechi Johnmary

    2014-01-01

    The level of killing and bloodletting in Nigeria is increasing every second, minute, hour, day, month and year. Man, animals, properties etc are increasingly under threat in contemporary Nigerian society. The causes of the massive insecurity of lives and properties remain multi-dimensional. This paper is centered on the need to factor tradotronic media for human security management in Nigeria. It reveals that the dimensions of human insecurity in Nigeria, include but not limited to assassinat...

  6. EFFECTUAL HUMAN AUTHENTICATION FOR CRITICAL SECURITY APPLICATIONS USING RETINAL IMAGES

    Directory of Open Access Journals (Sweden)

    L. Latha

    2010-11-01

    Full Text Available A robust method of human authentication based on the retinal blood vessel pattern is presented in this paper. This method entails a segmentation process to identify retinal blood vessel pattern, template generation consisting of the bifurcation points in the retina and matching of the intersection points in the template patterns. The number of matched blood vessel intersection points between the two patterns compared is used as a measure of similarity. As Liveness detection is a highly desirable anti-spoofing measure in biometric authentication, it is ensured while acquiring retinal images in realtime. The validity of our approach is verified with experimental results obtained from 603 comparisons made using 303 retinal images from three different publicly available databases, namely DRIVE, VARIA and STARE. We found that the proposed retinal recognition method gives 100%, 96.3% and 91.1% recognition rates respectively for the above databases. To the best of our knowledge, this is the first work that uses a large number of retinal images from different retinal databases for the authentication purpose.

  7. Human Pluripotent Stem Cells to Engineer Blood Vessels.

    Science.gov (United States)

    Chan, Xin Yi; Elliott, Morgan B; Macklin, Bria; Gerecht, Sharon

    2018-01-01

    Development of pluripotent stem cells (PSCs) is a remarkable scientific advancement that allows scientists to harness the power of regenerative medicine for potential treatment of disease using unaffected cells. PSCs provide a unique opportunity to study and combat cardiovascular diseases, which continue to claim the lives of thousands each day. Here, we discuss the differentiation of PSCs into vascular cells, investigation of the functional capabilities of the derived cells, and their utilization to engineer microvascular beds or vascular grafts for clinical application. Graphical Abstract Human iPSCs generated from patients are differentiated toward ECs and perivascular cells for use in disease modeling, microvascular bed development, or vascular graft fabrication.

  8. Human-Machine Systems concepts applied to Control Engineering Education

    OpenAIRE

    Marangé , Pascale; Gellot , François; Riera , Bernard

    2008-01-01

    International audience; In this paper, we interest us to Human-Machine Systems (HMS) concepts applied to Education. It is shown how the HMS framework enables to propose original solution in matter of education in the field of control engineering. We focus on practical courses on control of manufacturing systems. The proposed solution is based on an original use of real and large-scale systems instead of simulation. The main idea is to enable the student, whatever his/her level to control the ...

  9. `Human nature': Chemical engineering students' ideas about human relationships with the natural world

    Science.gov (United States)

    Goldman, Daphne; Ben-Zvi Assaraf, Orit; Shemesh, Julia

    2014-05-01

    While importance of environmental ethics, as a component of sustainable development, in preparing engineers is widely acknowledged, little research has addressed chemical engineers' environmental concerns. This study aimed to address this void by exploring chemical engineering students' values regarding human-nature relationships. The study was conducted with 247 3rd-4th year chemical engineering students in Israeli Universities. It employed the New Ecological Paradigm (NEP)-questionnaire to which students added written explanations. Quantitative analysis of NEP-scale results shows that the students demonstrated moderately ecocentric orientation. Explanations to the NEP-items reveal diverse, ambivalent ideas regarding the notions embodied in the NEP, strong scientific orientation and reliance on technology for addressing environmental challenges. Endorsing sustainability implies that today's engineers be equipped with an ecological perspective. The capacity of Higher Education to enable engineers to develop dispositions about human-nature interrelationships requires adaptation of curricula towards multidisciplinary, integrative learning addressing social-political-economic-ethical perspectives, and implementing critical-thinking within the socio-scientific issues pedagogical approach.

  10. Securing Human Rights on the Post-Soviet Space

    Directory of Open Access Journals (Sweden)

    Rustam A. Kasyanov

    2015-01-01

    Full Text Available Abstract: A lot of profound political, economic, social, cultural and legislative modifications have happened on the post-Soviet space since the disintegration of the USSR. The term “post-Soviet space” should not be considered as the geographical boundaries of the fifteen former Soviet republics. The conception of the “post-Soviet space” has a more profound meaning as it reflects the common historical and cultural heritage as well as close economic relations, moreover, friendship between the citizens of the new independent States. The most developed sphere in the interstate relations nowadays is economics. The most prime example is Eurasian Economic Union (EEU, the youngest integration institution in the world which unites five countries willing to construe their relationship on a stronger basis than the proposed format of cooperation within the Commonwealth of the Independent States. In the modern world the economic and financial interests are determining, their ensuring makes the governments change foreign and domestic policies, start and terminate trade wars, desperately fight for the respect of their legal rights or, on the contrary, voluntarily give up on some parts of their sovereignty in the framework of integration development. The experience of the European Union demonstrates that the construction of the unified internal market within which freely move persons, goods, services and capitals is a necessary but not the only attribute of a successful integration project. At a certain moment the complex of economic and financial interests should be supplied with the interests of a concrete person. A strict observation of rights and freedoms is becoming a factor that predetermines a possibility of a conversion to the higher forms of integration. In this article is analyzed the problem of human rights defense in the main organizations functioning on the post-Soviet space - Eurasian Economic Union and Commonwealth of the Independent

  11. Human centric security and privacy for the IoT using formal techniques

    OpenAIRE

    Kammueller, Florian

    2018-01-01

    In this paper, we summarize a new approach to make security and privacy issues in the Internet of Things (IoT) more transparent for vulnerable users. As a pilot project, we investigate monitoring of Alzheimer’s patients for a low-cost early warning system based on bio-markers supported with smart technologies. To provide trustworthy and secure IoT infrastructures, we employ formal methods and techniques that allow specification of IoT scenarios with human actors, refinement and analysis of at...

  12. An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

    Directory of Open Access Journals (Sweden)

    Young-Sik Jeong

    2014-01-01

    Full Text Available Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. The m-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application of m-IPS to the Internet of things (IoT, which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.

  13. Knowledge-based personalized search engine for the Web-based Human Musculoskeletal System Resources (HMSR) in biomechanics.

    Science.gov (United States)

    Dao, Tien Tuan; Hoang, Tuan Nha; Ta, Xuan Hien; Tho, Marie Christine Ho Ba

    2013-02-01

    Human musculoskeletal system resources of the human body are valuable for the learning and medical purposes. Internet-based information from conventional search engines such as Google or Yahoo cannot response to the need of useful, accurate, reliable and good-quality human musculoskeletal resources related to medical processes, pathological knowledge and practical expertise. In this present work, an advanced knowledge-based personalized search engine was developed. Our search engine was based on a client-server multi-layer multi-agent architecture and the principle of semantic web services to acquire dynamically accurate and reliable HMSR information by a semantic processing and visualization approach. A security-enhanced mechanism was applied to protect the medical information. A multi-agent crawler was implemented to develop a content-based database of HMSR information. A new semantic-based PageRank score with related mathematical formulas were also defined and implemented. As the results, semantic web service descriptions were presented in OWL, WSDL and OWL-S formats. Operational scenarios with related web-based interfaces for personal computers and mobile devices were presented and analyzed. Functional comparison between our knowledge-based search engine, a conventional search engine and a semantic search engine showed the originality and the robustness of our knowledge-based personalized search engine. In fact, our knowledge-based personalized search engine allows different users such as orthopedic patient and experts or healthcare system managers or medical students to access remotely into useful, accurate, reliable and good-quality HMSR information for their learning and medical purposes. Copyright © 2012 Elsevier Inc. All rights reserved.

  14. Zephyr: A secure Internet-based process to streamline engineering procurements using the World Wide Web

    Energy Technology Data Exchange (ETDEWEB)

    Jordan, C.W.; Cavitt, R.E.; Niven, W.A.; Warren, F.E.; Taylor, S.S.; Sharick, T.M.; Vickers, D.L.; Mitschkowetz, N.; Weaver, R.L.

    1996-08-13

    Lawrence Livermore National Laboratory (LLNL) is piloting an Internet- based paperless process called `Zephyr` to streamline engineering procurements. Major benefits have accrued by using Zephyr in reducing procurement time, speeding the engineering development cycle, facilitating industrial collaboration, and reducing overall costs. Programs at LLNL are benefiting by the efficiencies introduced since implementing Zephyr`s engineering and commerce on the Internet.

  15. Human Factors Engineering Review Model for advanced nuclear power reactors

    International Nuclear Information System (INIS)

    O'Hara, J.; Higgins, J.; Goodman, C.; Galletti, G.: Eckenrode, R.

    1993-01-01

    One of the major issues to emerge from the initial design reviews under the certification process was that detailed human-systems interface (HSI) design information was not available for staff review. To address the lack of design detail issue. The Nuclear Regulatory Commission (NRC) is performing the design certification reviews based on a design process plan which describes the human factors engineering (HFE) program elements that are necessary and sufficient to develop an acceptable detailed design specification. Since the review of a design process is unprecedented in the nuclear industry. The criteria for review are not addressed by current regulations or guidance documents and. therefore, had to be developed. Thus, an HFE Program Review Model was developed. This paper will describe the model's rationale, scope, objectives, development, general characteristics. and application

  16. Human factors in remote control engineering development activities

    International Nuclear Information System (INIS)

    Clarke, M.M.; Hamel, W.R.; Draper, J.V.

    1983-01-01

    Human factors engineering, which is an integral part of the advanced remote control development activities at the Oak Ridge National Laboratory, is described. First, work at the Remote Systems Development Facility (RSDF) has shown that operators can perform a wide variety of tasks, some of which were not specifically designed for remote systems, with a dextrous electronic force-reflecting servomanipulator and good television remote viewing capabilities. Second, the data collected during mock-up remote maintenance experiments at the RSDF have been analyzed to provide guidelines for the design of human interfaces with an integrated advanced remote maintenance system currently under development. Guidelines have been provided for task allocation between operators, remote viewing systems, and operator controls. 6 references, 5 figures, 2 tables

  17. Genetic engineering in nonhuman primates for human disease modeling.

    Science.gov (United States)

    Sato, Kenya; Sasaki, Erika

    2018-02-01

    Nonhuman primate (NHP) experimental models have contributed greatly to human health research by assessing the safety and efficacy of newly developed drugs, due to their physiological and anatomical similarities to humans. To generate NHP disease models, drug-inducible methods, and surgical treatment methods have been employed. Recent developments in genetic and developmental engineering in NHPs offer new options for producing genetically modified disease models. Moreover, in recent years, genome-editing technology has emerged to further promote this trend and the generation of disease model NHPs has entered a new era. In this review, we summarize the generation of conventional disease model NHPs and discuss new solutions to the problem of mosaicism in genome-editing technology.

  18. Case Study Application of the Biodiversity Security Index to Ranking Feasibility Studies for Ecosystem Restoration Projects of the U.S. Army Corps of Engineers

    Science.gov (United States)

    2016-04-01

    ER D C/ EL C R- 16 -1 Ecosystem Management and Restoration Research Program Case Study Application of the Biodiversity Security Index... Biodiversity Security Index to Ranking Feasibility Studies for Ecosystem Restoration Projects of the U.S. Army Corps of Engineers Richard A. Cole... Biodiversity Security Index (BSI) was applied to 23 project sites ranked for restoration feasibility study annual funding by the U. S. Army Corps of

  19. Advancing biomaterials of human origin for tissue engineering

    Science.gov (United States)

    Chen, Fa-Ming; Liu, Xiaohua

    2015-01-01

    Biomaterials have played an increasingly prominent role in the success of biomedical devices and in the development of tissue engineering, which seeks to unlock the regenerative potential innate to human tissues/organs in a state of deterioration and to restore or reestablish normal bodily function. Advances in our understanding of regenerative biomaterials and their roles in new tissue formation can potentially open a new frontier in the fast-growing field of regenerative medicine. Taking inspiration from the role and multi-component construction of native extracellular matrices (ECMs) for cell accommodation, the synthetic biomaterials produced today routinely incorporate biologically active components to define an artificial in vivo milieu with complex and dynamic interactions that foster and regulate stem cells, similar to the events occurring in a natural cellular microenvironment. The range and degree of biomaterial sophistication have also dramatically increased as more knowledge has accumulated through materials science, matrix biology and tissue engineering. However, achieving clinical translation and commercial success requires regenerative biomaterials to be not only efficacious and safe but also cost-effective and convenient for use and production. Utilizing biomaterials of human origin as building blocks for therapeutic purposes has provided a facilitated approach that closely mimics the critical aspects of natural tissue with regard to its physical and chemical properties for the orchestration of wound healing and tissue regeneration. In addition to directly using tissue transfers and transplants for repair, new applications of human-derived biomaterials are now focusing on the use of naturally occurring biomacromolecules, decellularized ECM scaffolds and autologous preparations rich in growth factors/non-expanded stem cells to either target acceleration/magnification of the body's own repair capacity or use nature's paradigms to create new tissues for

  20. Control room human engineering influences on operator performance

    International Nuclear Information System (INIS)

    Finlayson, F.C.

    1977-01-01

    Three general groups of factors influence operator performance in fulfilling their responsibilities in the control room: (1) control room and control system design, informational data displays (operator inputs) as well as control board design (for operator output); (2) operator characteristics, including those skills, mental, physical, and emotional qualities which are functions of operator selection, training, and motivation; (3) job performance guides, the prescribed operating procedures for normal and emergency operations. This paper presents some of the major results of an evaluation of the effect of human engineering on operator performance in the control room. Primary attention is given to discussion of control room and control system design influence on the operator. Brief observations on the influences of operator characteristics and job performance guides (operating procedures) on performance in the control room are also given. Under the objectives of the study, special emphasis was placed on the evaluation of the control room-operator relationships for severe emergency conditions in the power plant. Consequently, this presentation is restricted largely to material related to emergency conditions in the control room, though it is recognized that human engineering of control systems is of equal (or greater) importance for many other aspects of plant operation

  1. 2015 Space Human Factors Engineering Standing Review Panel

    Science.gov (United States)

    Steinberg, Susan

    2015-01-01

    The 2015 Space Human Factors Engineering (SHFE) Standing Review Panel (from here on referred to as the SRP) met for a site visit in Houston, TX on December 2 - 3, 2015. The SRP reviewed the updated research plans for the Risk of Inadequate Design of Human and Automation/Robotic Integration (HARI Risk), the Risk of Inadequate Human-Computer Interaction (HCI Risk), and the Risk of Inadequate Mission, Process and Task Design (MPTask Risk). The SRP also received a status update on the Risk of Incompatible Vehicle/Habitat Design (Hab Risk) and the Risk of Performance Errors Due to Training Deficiencies (Train Risk). The SRP is pleased with the progress and responsiveness of the SHFE team. The presentations were much improved this year. The SRP is also pleased with the human-centered design approach. Below are some of the more extensive comments from the SRP. We have also made comments in each section concerning gaps/tasks in each. The comments below reflect more significant changes that impact more than just one particular section.

  2. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  3. Science, Technology, Engineering, and Mathematics (STEM) Education Reform to Enhance Security of the Global Cyberspace

    Science.gov (United States)

    2014-05-01

    towards cloud computing technologies and capabilities demand needs for developing new tools that work in ensemble to handle security challenges. A...programs with the schools and/or hire from their pool of students. Therefore, no real STEM standards exist at the tertiary and beyond levels of education ...successful in cyber operations and network security related jobs much early on into the new STEM education model pipeline. Subjects such as computer

  4. The Humanistic Side of Engineering: Considering Social Science and Humanities Dimensions of Engineering in Education and Research

    OpenAIRE

    Hynes, Morgan; Swenson, Jessica

    2013-01-01

    Mathematics and science knowledge/skills are most commonly associated with engineering’s pre-requisite knowledge. Our goals in this paper are to argue for a more systematic inclusion of social science and humanities knowledge in the introduction of engineering to K-12 students. As part of this argument, we present a construct for framing the humanistic side of engineering with illustrative examples of what appealing to the humanistic side of engineering can look like in a classroom setting, a...

  5. The Humanistic Side of Engineering: Considering Social Science and Humanities Dimensions of Engineering in Education and Research

    Science.gov (United States)

    Hynes, Morgan; Swenson, Jessica

    2013-01-01

    Mathematics and science knowledge/skills are most commonly associated with engineering's pre-requisite knowledge. Our goals in this paper are to argue for a more systematic inclusion of social science and humanities knowledge in the introduction of engineering to K-12 students. As part of this argument, we present a construct for framing the…

  6. The Urban Crisis in Sub-Saharan Africa: A Threat to Human Security and Sustainable Development

    Directory of Open Access Journals (Sweden)

    Mediel Hove

    2013-03-01

    Full Text Available Urban centres have existed and have been evolving for many centuries across the world. However, the accelerated growth of urbanisation is a relatively recent phenomenon. The enormous size of urban populations and more significantly, the rapidity with which urban areas have been and are growing in many developing countries have severe social, economic and physical repercussions. This paper argues that the accelerated growth of urbanisation has amplified the demand for key services. However, the provision of shelter and basic services such as water and sanitation, education, public health, employment and transport has not kept pace with this increasing demand. Furthermore, accelerated and poorly managed urbanisation has resulted in various types of atmospheric, land and water pollution thereby jeopardising human security. This paper offers the conclusion that the increased environmental, social and economic problems associated with rapid urbanisation pose a threat to sustainable development, human security and, crucially, peace.

  7. Human trafficking in Southeast Asia and U.S. national security

    OpenAIRE

    Snoke, Joshua H.

    2015-01-01

    Approved for public release; distribution is unlimited The United States government finds human trafficking to be an important subject and is placing increasing focus on the issue. The Southeast Asian portion of the Western Pacific encompasses a substantial portion of global trafficking, much of which has a final destination in the United States. This thesis asks the following question: How does trafficking in persons (TIP) affect U.S. national security interests and regional stability in ...

  8. Doing Justice to Human Security: A Textbook in Tune with its Time

    Directory of Open Access Journals (Sweden)

    Deane Edward Neubauer

    2013-01-01

    Full Text Available I begin this brief review of this important volume with the confession that I have not personally pursued a teaching style that has employed a self-acclaimed textbook for many, many years, preferring to construct courses around monographs, articles and other visual materials. However, were I provided the opportunity to teach a course at the upper division undergraduate level or early gradate level in the subject of human security, this would certainly be the book I would choose (with the caveat introduced below. Alex and Sabina Lautensach have given careful and thoughtful consideration to every aspect of the text: the preface and introduction, written by the editors, lay out both the logic of the text and frame the subject matter that will locate the reader firmly in the midst of the vast challenges that consti­tute the issue of human security. They do so by em­phasizing both the multiple dimensions along which the issue of human security can be located and the inseparable nature of these as they interact with each other in complex ways. In many respects this strikes me as one of the most important contributions to the text—its steady insistence that human security as a construct is in a discursive state of constant emer­gence, such that in some important ways all its varied dimensions insistently co-vary. To make such a claim is in itself daunting—to demonstrate its validity and mutual engagements through the complex subject matters of its 20 chapters, is a tour de force. Their conclusion is sufficiently rich to stand alone as an illustrative text in other course materials.

  9. The persuasion and security awareness experiment: reducing the success of social engineering attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    Objectives: The aim of the current study is to explore to what extent an intervention reduces the effects of social engineering (e.g. the obtaining of access by persuasion) in an office environment. In particular, we study the effect of authority during a `social engineering' attack. Methods: 31

  10. The Praxis of Social Enterprise and Human Security: An Applied Research Agenda

    Directory of Open Access Journals (Sweden)

    Malcolm David Brown

    2014-01-01

    Full Text Available The growth of social enterprise within development NGO work might lead one to suspect it has been irredeemably corrupted by neo-liberal capitalism. However, using the tools of capitalism is not the same as subscribing to the values of capitalism. This paper is situated at the intersection of five fields: human security, international development, social enterprise, social franchising, and left-wing anti-capitalist thought. It examines the relevance of social en­terprise to human security and to development, the relationship between social enterprise and the anti-capitalist values of the left, and it then focuses on social franchising—a subset of social enterprise that highlights the importance of cooperation—suggesting that it may be a useful methodology for NGOs carrying out educational work in parts of the developing world. It syn­thesises and extends ideas that I have presented elsewhere [1-3], it draws on ethnographic fieldwork on the Thai-Burma border, and it puts forward an agenda for further applied research that is rooted in a sociological analysis of civil society and contributes to the human security paradigm.

  11. Policy for securing human resources in the nuclear industry of Japan

    International Nuclear Information System (INIS)

    Takeuchi, S.

    1993-01-01

    The shortage of human resources in the field of nuclear industry in Japan is due to: structural difficulty resulting from the prevailing labor shortage in Japan, difficulties from the ever-intensifying adverse wind against nuclear power, and difficulties specific to R and D organizations. A practical plan is proposed for securing qualified personnel: approach to be directly made on campuses; effective/advanced management of human resources; better treatment and fringe benefit; promoting the nuclear industry attractiveness; expanding the scope of basic and fundamental researches; regaining the public confidence; closer cooperation between the government and the nuclear power groups. 6 figs

  12. Human (in)security at the livestock-crop-wildlife nexus

    DEFF Research Database (Denmark)

    Bond, Jennifer Lauren

    Conflicts in relation to natural resources occur throughout the world in a range of contexts, both rural and urban, and across a spectrum of non-violent conflict of interest to violence. These conflicts may be between specific user groups such as agriculturalists and pastoralists or humans...... including agro-pastoral conflicts, cattle rustling and human-wildlife conflicts. The five articles of the thesis address the research questions through a human security lens drawing on quantitative and qualitative data. Analysis showed that there were several factors related to insecurity, weak governance......, natural resource management and cultural practices which cut across each of the gropastoral, cattle rustling and human-wildlife conflicts focussed on in this study. Further analysis built on these cross-cutting issues to identify the hidden impacts of these interrelated forms of insecurity on people which...

  13. reCAPTCHA: human-based character recognition via Web security measures.

    Science.gov (United States)

    von Ahn, Luis; Maurer, Benjamin; McMillen, Colin; Abraham, David; Blum, Manuel

    2008-09-12

    CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) are widespread security measures on the World Wide Web that prevent automated programs from abusing online services. They do so by asking humans to perform a task that computers cannot yet perform, such as deciphering distorted characters. Our research explored whether such human effort can be channeled into a useful purpose: helping to digitize old printed material by asking users to decipher scanned words from books that computerized optical character recognition failed to recognize. We showed that this method can transcribe text with a word accuracy exceeding 99%, matching the guarantee of professional human transcribers. Our apparatus is deployed in more than 40,000 Web sites and has transcribed over 440 million words.

  14. Climate change: The need for a human rights agenda within a framework of shared human security

    OpenAIRE

    Gasper, Des

    2012-01-01

    textabstractThis edited volume publishes as a special issue of the quarterly social science journal Social Research, a collection of articles on Human Rights and the Global Economy. The topics addressed are Human Rights and Economy Policy; Global Poverty and the Obligations of Rich Countries; Human Rights, Climate Change and Global Justice; and Corporations and Human Rights Obligations. This issue contains the edited proceedings of the November 2011 conference at the New School, where experts...

  15. Climate change: The need for a human rights agenda within a framework of shared human security

    NARCIS (Netherlands)

    D.R. Gasper (Des)

    2012-01-01

    textabstractThis edited volume publishes as a special issue of the quarterly social science journal Social Research, a collection of articles on Human Rights and the Global Economy. The topics addressed are Human Rights and Economy Policy; Global Poverty and the Obligations of Rich Countries; Human

  16. Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device

    Directory of Open Access Journals (Sweden)

    Hyun-Woo Kim

    2014-01-01

    Full Text Available Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties.

  17. Time pattern locking scheme for secure multimedia contents in human-centric device.

    Science.gov (United States)

    Kim, Hyun-Woo; Kim, Jun-Ho; Park, Jong Hyuk; Jeong, Young-Sik

    2014-01-01

    Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties.

  18. L-Band Digital Aeronautical Communications System Engineering - Initial Safety and Security Risk Assessment and Mitigation

    Science.gov (United States)

    Zelkin, Natalie; Henriksen, Stephen

    2011-01-01

    This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed L-band (960 to 1164 MHz) terrestrial en route communications system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents a preliminary safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the L-band communication system after the technology is chosen and system rollout timing is determined. The security risk analysis resulted in identifying main security threats to the proposed system as well as noting additional threats recommended for a future security analysis conducted at a later stage in the system development process. The document discusses various security controls, including those suggested in the COCR Version 2.0.

  19. Defense Horizons. The Science and Engineering Workforce and National Security. April 2004, Number 39

    National Research Council Canada - National Science Library

    Marshall, Michael

    2004-01-01

    .... Especially worrisome are the following: (1) a general lack of interest among American-born youth in pursuing education in the physical sciences, mathematics, environmental sciences, and engineering at the undergraduate and graduate levels; (2...

  20. Automating the Human Factors Engineering and Evaluation Processes

    International Nuclear Information System (INIS)

    Mastromonico, C.

    2002-01-01

    The Westinghouse Savannah River Company (WSRC) has developed a software tool for automating the Human Factors Engineering (HFE) design review, analysis, and evaluation processes. The tool provides a consistent, cost effective, graded, user-friendly approach for evaluating process control system Human System Interface (HSI) specifications, designs, and existing implementations. The initial set of HFE design guidelines, used in the tool, was obtained from NUREG- 0700. Each guideline was analyzed and classified according to its significance (general concept vs. supporting detail), the HSI technology (computer based vs. non-computer based), and the HSI safety function (safety vs. non-safety). Approximately 10 percent of the guidelines were determined to be redundant or obsolete and were discarded. The remaining guidelines were arranged in a Microsoft Access relational database, and a Microsoft Visual Basic user interface was provided to facilitate the HFE design review. The tool also provides the capability to add new criteria to accommodate advances in HSI technology and incorporate lessons learned. Summary reports produced by the tool can be easily ported to Microsoft Word and other popular PC office applications. An IBM compatible PC with Microsoft Windows 95 or higher is required to run the application

  1. A Secure Alignment Algorithm for Mapping Short Reads to Human Genome.

    Science.gov (United States)

    Zhao, Yongan; Wang, Xiaofeng; Tang, Haixu

    2018-05-09

    The elastic and inexpensive computing resources such as clouds have been recognized as a useful solution to analyzing massive human genomic data (e.g., acquired by using next-generation sequencers) in biomedical researches. However, outsourcing human genome computation to public or commercial clouds was hindered due to privacy concerns: even a small number of human genome sequences contain sufficient information for identifying the donor of the genomic data. This issue cannot be directly addressed by existing security and cryptographic techniques (such as homomorphic encryption), because they are too heavyweight to carry out practical genome computation tasks on massive data. In this article, we present a secure algorithm to accomplish the read mapping, one of the most basic tasks in human genomic data analysis based on a hybrid cloud computing model. Comparing with the existing approaches, our algorithm delegates most computation to the public cloud, while only performing encryption and decryption on the private cloud, and thus makes the maximum use of the computing resource of the public cloud. Furthermore, our algorithm reports similar results as the nonsecure read mapping algorithms, including the alignment between reads and the reference genome, which can be directly used in the downstream analysis such as the inference of genomic variations. We implemented the algorithm in C++ and Python on a hybrid cloud system, in which the public cloud uses an Apache Spark system.

  2. Human factor engineering analysis for computerized human machine interface design issues

    International Nuclear Information System (INIS)

    Wang Zhifang; Gu Pengfei; Zhang Jianbo

    2010-01-01

    The application of digital I and C technology in nuclear power plants is a significant improvement in terms of functional performances and flexibility, and it also poses a challenge to operation safety. Most of the new NPPs under construction are adopting advanced control room design which utilizes the computerized human machine interface (HMI) as the main operating means. Thus, it greatly changes the way the operators interact with the plant. This paper introduces the main challenges brought out by computerized technology on the human factor engineering aspect and addresses the main issues to be dealt with in the computerized HMI design process. Based on a operator task-resources-cognitive model, it states that the root cause of human errors is the mismatch between resources demand and their supply. And a task-oriented HMI design principle is discussed. (authors)

  3. THE RESPONSIBILITY OF PROTECTING (R2P HUMAN RIGHTS AND SECURITY COUNCIL

    Directory of Open Access Journals (Sweden)

    ULDARICIO FIGUEROA PLÁ

    2017-12-01

    Full Text Available The adoption in 1948 of the Convention on the Prevention and Punishment of the Crime of Genocide seemed to open a new era in the international scenario in which these kind of practices apparently are left in the historic past. Reality has shown us that this international instrument was not enough to face arbitrary measures of some Governments. Nevertheless, genocide actions continuing to be performed, and in order to decrease human suffering, “humanitarian intervention” was thought as a response to the ineffectiveness of the Security Council which also brought along arbitrary actions in its invocation, discrediting it. Before the reiterated calls of the Secretary General of the United Nations to prevent and detain massive violations to human rights, an effort has been made in order to standardizing a type of interventions that can respond to massive violations of human rights. This has been called Responsibility to Protect.

  4. Development of transport mechanical engineering as the condition of maintenance of social and economic security of region

    Directory of Open Access Journals (Sweden)

    Vsevolod Petrovich Babushkin

    2012-12-01

    Full Text Available In the article, the transport role in the decision of problems of innovative and scientifically-technological development of territory is defined. Dependence of quality, completeness and timeliness of granting of transport services on replenishment and updating of park of locomotives, cars, i.e. from a level of development of domestic transport mechanical engineering is shown. The basic problems of development given branches –low competitiveness of made production are revealed. The basic accent in the course of such analysis is made on research of competitive possibilities of the enterprises of railway mechanical engineering of Sverdlovsk area. Such enterprises play the increasing role, become points of development of region’s economy and maintenance of its social and economic safety. The cooperation communications, which have developed in an industrial complex of Sverdlovsk area on the basis of development of modern manufacture on building of electric locomotives, have allowed to generate in region cluster railway mechanical engineering. The structure cluster is shown, development prospects, the estimation of its influence on the economy of Sverdlovsk area and maintenance of its social and economic security is given

  5. Reverse engineering human neurodegenerative disease using pluripotent stem cell technology.

    Science.gov (United States)

    Liu, Ying; Deng, Wenbin

    2016-05-01

    With the technology of reprogramming somatic cells by introducing defined transcription factors that enables the generation of "induced pluripotent stem cells (iPSCs)" with pluripotency comparable to that of embryonic stem cells (ESCs), it has become possible to use this technology to produce various cells and tissues that have been difficult to obtain from living bodies. This advancement is bringing forth rapid progress in iPSC-based disease modeling, drug screening, and regenerative medicine. More and more studies have demonstrated that phenotypes of adult-onset neurodegenerative disorders could be rather faithfully recapitulated in iPSC-derived neural cell cultures. Moreover, despite the adult-onset nature of the diseases, pathogenic phenotypes and cellular abnormalities often exist in early developmental stages, providing new "windows of opportunity" for understanding mechanisms underlying neurodegenerative disorders and for discovering new medicines. The cell reprogramming technology enables a reverse engineering approach for modeling the cellular degenerative phenotypes of a wide range of human disorders. An excellent example is the study of the human neurodegenerative disease amyotrophic lateral sclerosis (ALS) using iPSCs. ALS is a progressive neurodegenerative disease characterized by the loss of upper and lower motor neurons (MNs), culminating in muscle wasting and death from respiratory failure. The iPSC approach provides innovative cell culture platforms to serve as ALS patient-derived model systems. Researchers have converted iPSCs derived from ALS patients into MNs and various types of glial cells, all of which are involved in ALS, to study the disease. The iPSC technology could be used to determine the role of specific genetic factors to track down what's wrong in the neurodegenerative disease process in the "disease-in-a-dish" model. Meanwhile, parallel experiments of targeting the same specific genes in human ESCs could also be performed to control

  6. An Integrated Neuroscience and Engineering Approach to Classifying Human Brain-States

    Science.gov (United States)

    2015-12-22

    AFRL-AFOSR-VA-TR-2016-0037 An Integrated Neuroscience and Engineering Approach to Classifying Human Brain-States Adrian Lee UNIVERSITY OF WASHINGTON...to 14-09-2015 4. TITLE AND SUBTITLE An Integrated Neuroscience and Engineering Approach to Classifying Human Brain- States 5a.  CONTRACT NUMBER 5b...specific cognitive states remains elusive, owing perhaps to limited crosstalk between the fields of neuroscience and engineering. Here, we report a

  7. Preventing healthcare-associated infections through human factors engineering.

    Science.gov (United States)

    Jacob, Jesse T; Herwaldt, Loreen A; Durso, Francis T

    2018-05-24

    Human factors engineering (HFE) approaches are increasingly being used in healthcare, but have been applied in relatively limited ways to infection prevention and control (IPC). Previous studies have focused on using selected HFE tools, but newer literature supports a system-based HFE approach to IPC. Cross-contamination and the existence of workarounds suggest that healthcare workers need better support to reduce and simplify steps in delivering care. Simplifying workflow can lead to better understanding of why a process fails and allow for improvements to reduce errors and increase efficiency. Hand hygiene can be improved using visual cues and nudges based on room layout. Using personal protective equipment appropriately appears simple, but exists in a complex interaction with workload, behavior, emotion, and environmental variables including product placement. HFE can help prevent the pathogen transmission through improving environmental cleaning and appropriate use of medical devices. Emerging evidence suggests that HFE can be applied in IPC to reduce healthcare-associated infections. HFE and IPC collaboration can help improve many of the basic best practices including use of hand hygiene and personal protective equipment by healthcare workers during patient care.

  8. Aspects of computer control from the human engineering standpoint

    International Nuclear Information System (INIS)

    Huang, T.V.

    1979-03-01

    A Computer Control System includes data acquisition, information display and output control signals. In order to design such a system effectively we must first determine the required operational mode: automatic control (closed loop), computer assisted (open loop), or hybrid control. The choice of operating mode will depend on the nature of the plant, the complexity of the operation, the funds available, and the technical expertise of the operating staff, among many other factors. Once the mode has been selected, consideration must be given to the method (man/machine interface) by which the operator interacts with this system. The human engineering factors are of prime importance to achieving high operating efficiency and very careful attention must be given to this aspect of the work, if full operator acceptance is to be achieved. This paper will discuss these topics and will draw on experience gained in setting up the computer control system in Main Control Center for Stanford University's Accelerator Center (a high energy physics research facility)

  9. Engineering and economics of lighting for closed circuit television (CCTV) security alarm assessment

    International Nuclear Information System (INIS)

    Faucett, R.E.; Schow, F.L.

    1979-01-01

    The study examines the economics and applicability of low and high pressure sodium sources in both streetlight and floodlight luminaires for CCTV illumination of high-security areas. In addition the signal outputs of several popular CCTV camera tube types operated in the presence of common lighting sources are calculated. These calculations take into consideration the spectral response of the camera tubes and the spectral output of the light sources. The results are presented in terms of dollars per unit camera signal strength and also camera signal strength per connected watt of electrical load

  10. Relationship between Security and Human Rights in Counter-Terrorism: A Case of Introducing Body Scanners in Civil Aviation

    Directory of Open Access Journals (Sweden)

    Prezelj Iztok

    2015-12-01

    Full Text Available Changes in security environment after the end of Cold War and 9/11 have strongly affected our security concepts and paradigms. In the field of counter-terrorism, a serious conceptual and practical debate on the relationship between security and human rights and freedoms has begun. The goal of this paper is to reflect on this complex relationship at the conceptual level and introduce the empirical debate on this relationship in the field of civil aviation (case of introducing body scanners. The paper’s results show that the concept of human security usefully integrates the care for human rights and security of individuals. The debate on the potential introduction of body scanners on the European airports was actually a debate on the ways of providing individual human security on the airports with simultaneous concern for other human rights. The output of this debate was a compromise: body scanners can be used at the discretion of individual airports and member states, but are not an obligatory measure on all European airports.

  11. Discussion on verification criterion and method of human factors engineering for nuclear power plant controller

    International Nuclear Information System (INIS)

    Yang Hualong; Liu Yanzi; Jia Ming; Huang Weijun

    2014-01-01

    In order to prevent or reduce human error and ensure the safe operation of nuclear power plants, control device should be verified from the perspective of human factors engineering (HFE). The domestic and international human factors engineering guidelines about nuclear power plant controller were considered, the verification criterion and method of human factors engineering for nuclear power plant controller were discussed and the application examples were provided for reference in this paper. The results show that the appropriate verification criterion and method should be selected to ensure the objectivity and accuracy of the conclusion. (authors)

  12. Genetically Engineered Crops and Certified Organic Agriculture for Improving Nutrition Security in Africa and South Asia.

    Science.gov (United States)

    Pray, Carl; Ledermann, Samuel

    2016-01-01

    In Africa and South Asia, where nutrition insecurity is severe, two of the most prominent production technologies are genetically modified (GM) crops and certified organic agriculture. We analyze the potential impact pathways from agricultural production to nutrition. Our review of data and the literature reveals increasing farm-level income from cash crop production as the main pathway by which organic agriculture and GM agriculture improve nutrition. Potential secondary pathways include reduced prices of important food crops like maize due to GM maize production and increased food production using organic technology. Potential tertiary pathways are improvements in health due to reduced insecticide use. Challenges to the technologies achieving their impact include the politics of GM agriculture and the certification costs of organic agriculture. Given the importance of agricultural production in addressing nutrition security, accentuated by the post-2015 sustainable development agenda, the chapter concludes by stressing the importance of private and public sector research in improving the productivity and adoption of both GM and organic crops. In addition, the chapter reminds readers that increased farm income and productivity require complementary investments in health, education, food access and women's empowerment to actually improve nutrition security. © 2016 S. Karger AG, Basel.

  13. Experiences in the application of human factors engineering to human-system interface modernization

    International Nuclear Information System (INIS)

    Trueba Alonso, Pedro; Illobre, Luis Fernandez; Ortega Pascual, Fernando

    2014-01-01

    Almost all the existing Nuclear Power Plants (NPPs) include plans to modernize their existing Instrumentation and Control (I and C) systems and associated Human System Interfaces (HSIs), due to obsolescence problems. Tecnatom, S.A. has been participating in modernization programs in NPPs to help them to plan, specify, design and implement the modernization of control rooms and associated I and C and HSIs. The application of Human Factors Engineering (HFE) in modernization programs is nowadays unavoidable. This is because is becoming a regulatory requirement, and also because it is needed to ensure that any plant modification, involving the modernization of I and C and HSI, is well designed to improve overall plant operations, reliability, and safety. This paper shows some experiences obtained during the application of HFE to the modernization of these HSIs. The experience applying HFE in modernizations and design modifications show a positive effect, improving the associated HSIs, with the acceptability of the final user. (authors)

  14. Experiences in the application of human factors engineering to human-system interface modernization

    International Nuclear Information System (INIS)

    Trueba Alonso, Pedro; Fernandez Illobre, Luis; Ortega Pascual, Fernando

    2015-01-01

    Almost all the existing Nuclear Power Plants (NPPs) include plans to modernize their existing Instrumentation and Control (I and C) systems and associated Human System Interfaces (HSIs), due to obsolescence problems. Tecnatom, S.A. has been participating in modernization programs in NPPs to help them to plan, specify, design and implement the modernization of control rooms and associated I and C and HSIs. The application of Human Factors Engineering (HFE) in modernization programs is nowadays unavoidable. This is because is becoming a regulatory requirement, and also because it is needed to ensure that any plant modification, involving the modernization of I and C and HSI, is well designed to improve overall plant operations, reliability, and safety. This paper shows some experiences obtained during the application of HFE to the modernization of these HSIs. The experience applying HFE in modernizations and design modifications show a positive effect, improving the associated HSIs, with the acceptability of the final user.

  15. Unifying Human Centered Design and Systems Engineering for Human Systems Integration

    Science.gov (United States)

    Boy, Guy A.; McGovernNarkevicius, Jennifer

    2013-01-01

    Despite the holistic approach of systems engineering (SE), systems still fail, and sometimes spectacularly. Requirements, solutions and the world constantly evolve and are very difficult to keep current. SE requires more flexibility and new approaches to SE have to be developed to include creativity as an integral part and where the functions of people and technology are appropriately allocated within our highly interconnected complex organizations. Instead of disregarding complexity because it is too difficult to handle, we should take advantage of it, discovering behavioral attractors and the emerging properties that it generates. Human-centered design (HCD) provides the creativity factor that SE lacks. It promotes modeling and simulation from the early stages of design and throughout the life cycle of a product. Unifying HCD and SE will shape appropriate human-systems integration (HSI) and produce successful systems.

  16. Experiences in the application of human factors engineering to human-system interface modernization

    Energy Technology Data Exchange (ETDEWEB)

    Trueba Alonso, Pedro; Fernandez Illobre, Luis; Ortega Pascual, Fernando [Tecnatom S.A., San Sebastian de los Reyes (Spain). Simulation and Control Rooms Div.

    2015-07-15

    Almost all the existing Nuclear Power Plants (NPPs) include plans to modernize their existing Instrumentation and Control (I and C) systems and associated Human System Interfaces (HSIs), due to obsolescence problems. Tecnatom, S.A. has been participating in modernization programs in NPPs to help them to plan, specify, design and implement the modernization of control rooms and associated I and C and HSIs. The application of Human Factors Engineering (HFE) in modernization programs is nowadays unavoidable. This is because is becoming a regulatory requirement, and also because it is needed to ensure that any plant modification, involving the modernization of I and C and HSI, is well designed to improve overall plant operations, reliability, and safety. This paper shows some experiences obtained during the application of HFE to the modernization of these HSIs. The experience applying HFE in modernizations and design modifications show a positive effect, improving the associated HSIs, with the acceptability of the final user.

  17. Yes we can! The Raffles Dialogue on Human Wellbeing and Security

    Directory of Open Access Journals (Sweden)

    Dr. Tikki Pang

    2015-08-01

    Full Text Available The future of human wellbeing and security depends on our ability to deal with the multiple effects of globalisation and on adoption of a new paradigm and philosophy for living and for health that emphasises people's wellbeing and social justice. Such was the topic of the inaugural Raffles Dialogue on Human Wellbeing and Security held in Singapore on Feb 2–3, 2015. Participants agreed that, to achieve these goals, four conditions must be met. First, equity must be integral to the implementation of technology. Second, there is an urgent need for innovations within our global institutions to make them “fit for purpose” in a rapidly changing world. Third, we must find the right balance between the roles of government and markets so that all those in need can access affordable medicine and health care. Finally, we must realise that we live in a small and interdependent “global village”, where Asian countries need to assume greater leadership of our global village councils. This is the great imperative of our times.

  18. Operations research, engineering, and cyber security trends in applied mathematics and technology

    CERN Document Server

    Rassias, Themistocles

    2017-01-01

    Mathematical methods and theories with interdisciplinary applications are presented in this book. The eighteen contributions presented in this Work have been written by eminent scientists; a few papers are based on talks which took place at the International Conference at the Hellenic Artillery School in May 2015. Each paper evaluates possible solutions to long-standing problems such as the solvability of the direct electromagnetic scattering problem, geometric approaches to cyber security, ellipsoid targeting with overlap, non-equilibrium solutions of dynamic networks, measuring ballistic dispersion, elliptic regularity theory for the numerical solution of variational problems, approximation theory for polynomials on the real line and the unit circle, complementarity and variational inequalities in electronics, new two-slope parameterized achievement scalarizing functions for nonlinear multiobjective optimization, and strong and weak convexity of closed sets in a Hilbert space. Graduate students, scientists,...

  19. A dual-mode secure UHF RFID tag with a crypto engine in 0.13-μm CMOS

    Science.gov (United States)

    Tao, Yang; Linghao, Zhu; Xi, Tan; Junyu, Wang; Lirong, Zheng; Hao, Min

    2016-07-01

    An ultra-high-frequency (UHF) radio frequency identification (RFID) secure tag chip with a non-crypto mode and a crypto mode is presented. During the supply chain management, the tag works in the non-crypto mode in which the on-chip crypto engine is not enabled and the tag chip has a sensitivity of -12.8 dBm for long range communication. At the point of sales (POS), the tag will be switched to the crypto mode in order to protect the privacy of customers. In the crypto mode, an advanced encryption standard (AES) crypto engine is enabled and the sensitivity of the tag chip is switched to +2 dBm for short range communication, which is a method of physical protection. The tag chip is implemented and verified in a standard 0.13-μm CMOS process. Project supported by the National Science & Technology Pillar Program of China (No. 2015BAK36B01).

  20. The Contribution of the Spanish Guardia Civil to the Peace and Stability Operations Within the Human Security Framework

    Science.gov (United States)

    2010-03-08

    1999.- U.N. Civilian Police component in Kosovo (UNMIK.) 2000.- Oficina del Programa de Irak (no es especificamente una misi6n de paz) 2000.- Special...community security, and political security. Nevertheless, it is worth pointing out that the establishment and the inclusion of an agenda based on the human...model the pattern set in France by the Gendarmerie and in Catalonia by the existing Mossos de Escuadra. The Dulce of Ahumada personally shaped this new

  1. Work, Productivity, and Human Performance: Practical Case Studies in Ergonomics, Human Factors and Human Engineering.

    Science.gov (United States)

    Fraser, T. M.; Pityn, P. J.

    This book contains 12 case histories, each based on a real-life problem, that show how a manager can use common sense, knowledge, and interpersonal skills to solve problems in human performance at work. Each case study describes a worker's problem and provides background information and an assignment; solutions are suggested. The following cases…

  2. A system engineer's Perspective on Human Errors For a more Effective Management of Human Factors in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Yong-Hee; Jang, Tong-Il; Lee, Soo-Kil

    2007-01-01

    The management of human factors in nuclear power plants (NPPs) has become one of the burden factors during their operating period after the design and construction period. Almost every study on the major accidents emphasizes the prominent importance of the human errors. Regardless of the regulatory requirements such as Periodic Safety Review, the management of human factors would be a main issue to reduce the human errors and to enhance the performance of plants. However, it is not easy to find out a more effective perspective on human errors to establish the engineering implementation plan for preventing them. This paper describes a system engineer's perspectives on human errors and discusses its application to the recent study on the human error events in Korean NPPs

  3. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  4. Global Water Cycle Diagrams Minimize Human Influence and Over-represent Water Security

    Science.gov (United States)

    Abbott, B. W.; Bishop, K.; Zarnetske, J. P.; Minaudo, C.; Chapin, F. S., III; Plont, S.; Marçais, J.; Ellison, D.; Roy Chowdhury, S.; Kolbe, T.; Ursache, O.; Hampton, T. B.; GU, S.; Chapin, M.; Krause, S.; Henderson, K. D.; Hannah, D. M.; Pinay, G.

    2017-12-01

    The diagram of the global water cycle is the central icon of hydrology, and for many people, the point of entry to thinking about key scientific concepts such as conservation of mass, teleconnections, and human dependence on ecological systems. Because humans now dominate critical components of the hydrosphere, improving our understanding of the global water cycle has graduated from an academic exercise to an urgent priority. To assess how the water cycle is conceptualized by researchers and the general public, we analyzed 455 water cycle diagrams from textbooks, scientific articles, and online image searches performed in different languages. Only 15% of diagrams integrated human activity into the water cycle and 77% showed no sign of humans whatsoever, although representation of humans varied substantially by region (lowest in China, N. America, and Australia; highest in Western Europe). The abundance and accessibility of freshwater resources were overrepresented, with 98% of diagrams omitting water pollution and climate change, and over 90% of diagrams making no distinction for saline groundwater and lakes. Oceanic aspects of the water cycle (i.e. ocean size, circulation, and precipitation) and related teleconnections were nearly always underrepresented. These patterns held across disciplinary boundaries and through time. We explore the historical and contemporary reasons for some of these biases and present a revised version of the global water cycle based on research from natural and social sciences. We conclude that current depictions of the global water cycle convey a false sense of water security and that reintegrating humans into water cycle diagrams is an important first step towards understanding and sustaining the hydrosocial cycle.

  5. Information Presentation: Human Research Program - Space Human Factors and Habitability, Space Human Factors Engineering Project

    Science.gov (United States)

    Holden, Kristina L.; Sandor, Aniko; Thompson, Shelby G.; Kaiser, Mary K.; McCann, Robert S.; Begault, D. R.; Adelstein, B. D.; Beutter, B. R.; Wenzel, E. M.; Godfroy, M.; hide

    2010-01-01

    The goal of the Information Presentation Directed Research Project (DRP) is to address design questions related to the presentation of information to the crew. The major areas of work, or subtasks, within this DRP are: 1) Displays, 2) Controls, 3) Electronic Procedures and Fault Management, and 4) Human Performance Modeling. This DRP is a collaborative effort between researchers atJohnson Space Center and Ames Research Center. T

  6. Bridging future needs to todays companies' capabilities. competences of the new (human) engineer.

    NARCIS (Netherlands)

    Dr.Ir. Hay Geraedts; Dr. Ir. ing. C. Blokhuizen; Ir. M. Rutten; Ir. P. Leijten

    2001-01-01

    The Fontys University of professional Education, department of Mechanical Engineering, has started development of a new curriculum during the year 2000-2001, Human Mechanical Engineering (HME). Next to immersion of our students in actual technology practices, we aim to include for our students new

  7. A Systems Engineering Approach to Address Human Capital Management Issues in the Shipbuilding Industry

    National Research Council Canada - National Science Library

    Todd, Hal M; Parten, Douglas S

    2008-01-01

    .... This study investigated current DoD Human Capital Management (HCM) strategies for attracting, developing, retaining, and managing competencies and intellectual resources for science and engineering talent within the shipbuilding industry...

  8. 24/7 security system: 60-FPS color EMCCD camera with integral human recognition

    Science.gov (United States)

    Vogelsong, T. L.; Boult, T. E.; Gardner, D. W.; Woodworth, R.; Johnson, R. C.; Heflin, B.

    2007-04-01

    An advanced surveillance/security system is being developed for unattended 24/7 image acquisition and automated detection, discrimination, and tracking of humans and vehicles. The low-light video camera incorporates an electron multiplying CCD sensor with a programmable on-chip gain of up to 1000:1, providing effective noise levels of less than 1 electron. The EMCCD camera operates in full color mode under sunlit and moonlit conditions, and monochrome under quarter-moonlight to overcast starlight illumination. Sixty frame per second operation and progressive scanning minimizes motion artifacts. The acquired image sequences are processed with FPGA-compatible real-time algorithms, to detect/localize/track targets and reject non-targets due to clutter under a broad range of illumination conditions and viewing angles. The object detectors that are used are trained from actual image data. Detectors have been developed and demonstrated for faces, upright humans, crawling humans, large animals, cars and trucks. Detection and tracking of targets too small for template-based detection is achieved. For face and vehicle targets the results of the detection are passed to secondary processing to extract recognition templates, which are then compared with a database for identification. When combined with pan-tilt-zoom (PTZ) optics, the resulting system provides a reliable wide-area 24/7 surveillance system that avoids the high life-cycle cost of infrared cameras and image intensifiers.

  9. An overview of NASA ISS human engineering and habitability: past, present, and future.

    Science.gov (United States)

    Fitts, D; Architecture, B

    2000-09-01

    The International Space Station (ISS) is the first major NASA project to provide human engineering an equal system engineering an equal system engineering status to other disciplines. The incorporation and verification of hundreds of human engineering requirements applied across-the-board to the ISS has provided for a notably more habitable environment to support long duration spaceflight missions than might otherwise have been the case. As the ISS begins to be inhabited and become operational, much work remains in monitoring the effectiveness of the Station's built environment in supporting the range of activities required of a long-duration vehicle. With international partner participation, NASA's ISS Operational Habitability Assessment intends to carry human engineering and habitability considerations into the next phase of the ISS Program with constant attention to opportunities for cost-effective improvements that need to be and can be made to the on-orbit facility. Too, during its operations the ISS must be effectively used as an on-orbit laboratory to promote and expand human engineering/habitability awareness and knowledge to support the international space faring community with the data needed to develop future space vehicles for long-duration missions. As future space mission duration increases, the rise in importance of habitation issues make it imperative that lessons are captured from the experience of human engineering's incorporation into the ISS Program and applied to future NASA programmatic processes.

  10. Linking human health, climate change, and food security through ecological-based sanitation systems

    Science.gov (United States)

    Ryals, R.; Kramer, S.; Porder, S.; Andersen, G. L.

    2015-12-01

    Ensuring access to clean, safe sanitation for the world's population remains a challenging, yet critical, global sustainability goal. Ecological-based sanitation (EcoSan) technology is a promising strategy for improving sanitation, particularly in areas where financial resources and infrastructure are limiting. The composting of human waste and its use as an agricultural soil amendment can tackle three important challenges in developing countries - providing improved sanitation for vulnerable communities, reducing the spread of intestinal-born pathogens, and returning nutrients and organic matter to degraded agricultural soils. The extent of these benefits and potential tradeoffs are not well known, but have important implications for the widespread adoption of this strategy to promote healthy communities and enhance food security. We quantified the effects of EcoSan on the climate and human health in partnership with Sustainable Organic Integrated Livelihoods (SOIL) in Haiti. We measured greenhouse gas emissions (nitrous oxide, methane, and carbon dioxide) from compost piles that ranged in age from 0 to 14 months (i.e. finished) from two compost facilities managed with or without cement lining. We also measured emissions from a government-operated waste treatment pond and a grass field where waste has been illegally dumped. The highest methane emissions were observed from the anaerobic waste pond, whereas the dump site and compost piles had higher nitrous oxide emissions. Net greenhouse gases (CO2-equivalents) from unlined compost piles were 8x lower than lined compost piles and 20 and 30x lower than the dump and waste pond, respectively. We screened finished compost for fecal pathogens using bacterial 16S sequencing. Bacterial pathogens were eliminated regardless of the type of composting process. Pilot trials indicate that the application of compost to crops has a large potential for increasing food production. This research suggests that EcoSan systems are

  11. Human factors engineering in the design of colour-graphic displays

    International Nuclear Information System (INIS)

    Fenton, E.F.

    1985-01-01

    The operator interface for Ontario Hydro's Darlington Nuclear Generating Station will rely extensively on the use of coloured graphic display formats. These are used for the presentation of both control and monitoring information. The displays are organized in a hierarchical relationship and a simple interactive selection method using light pens has been implemented. The application of human factors engineering principles has been a major factor in all aspects of the design. This paper describes the system and the human factors engineering function

  12. Iris Cryptography for Security Purpose

    Science.gov (United States)

    Ajith, Srighakollapu; Balaji Ganesh Kumar, M.; Latha, S.; Samiappan, Dhanalakshmi; Muthu, P.

    2018-04-01

    In today's world, the security became the major issue to every human being. A major issue is hacking as hackers are everywhere, as the technology was developed still there are many issues where the technology fails to meet the security. Engineers, scientists were discovering the new products for security purpose as biometrics sensors like face recognition, pattern recognition, gesture recognition, voice authentication etcetera. But these devices fail to reach the expected results. In this work, we are going to present an approach to generate a unique secure key using the iris template. Here the iris templates are processed using the well-defined processing techniques. Using the encryption and decryption process they are stored, traversed and utilized. As of the work, we can conclude that the iris cryptography gives us the expected results for securing the data from eavesdroppers.

  13. Analyzing Cyber Security Threats on Cyber-Physical Systems Using Model-Based Systems Engineering

    Science.gov (United States)

    Kerzhner, Aleksandr; Pomerantz, Marc; Tan, Kymie; Campuzano, Brian; Dinkel, Kevin; Pecharich, Jeremy; Nguyen, Viet; Steele, Robert; Johnson, Bryan

    2015-01-01

    The spectre of cyber attacks on aerospace systems can no longer be ignored given that many of the components and vulnerabilities that have been successfully exploited by the adversary on other infrastructures are the same as those deployed and used within the aerospace environment. An important consideration with respect to the mission/safety critical infrastructure supporting space operations is that an appropriate defensive response to an attack invariably involves the need for high precision and accuracy, because an incorrect response can trigger unacceptable losses involving lives and/or significant financial damage. A highly precise defensive response, considering the typical complexity of aerospace environments, requires a detailed and well-founded understanding of the underlying system where the goal of the defensive response is to preserve critical mission objectives in the presence of adversarial activity. In this paper, a structured approach for modeling aerospace systems is described. The approach includes physical elements, network topology, software applications, system functions, and usage scenarios. We leverage Model-Based Systems Engineering methodology by utilizing the Object Management Group's Systems Modeling Language to represent the system being analyzed and also utilize model transformations to change relevant aspects of the model into specialized analyses. A novel visualization approach is utilized to visualize the entire model as a three-dimensional graph, allowing easier interaction with subject matter experts. The model provides a unifying structure for analyzing the impact of a particular attack or a particular type of attack. Two different example analysis types are demonstrated in this paper: a graph-based propagation analysis based on edge labels, and a graph-based propagation analysis based on node labels.

  14. A HUMAN FACTORS ENGINEERING PROCESS TO SUPPORT HUMAN-SYSTEM INTERFACE DESIGN IN CONTROL ROOM MODERNIZATION

    Energy Technology Data Exchange (ETDEWEB)

    Kovesdi, C.; Joe, J.; Boring, R.

    2017-05-01

    The primary objective of the United States (U.S.) Department of Energy (DOE) Light Water Reactor Sustainability (LWRS) program is to sustain operation of the existing commercial nuclear power plants (NPPs) through a multi-pathway approach in conducting research and development (R&D). The Advanced Instrumentation, Information, and Control (II&C) System Technologies pathway conducts targeted R&D to address aging and reliability concerns with legacy instrumentation and control (I&C) and other information systems in existing U.S. NPPs. Control room modernization is an important part following this pathway, and human factors experts at Idaho National Laboratory (INL) have been involved in conducting R&D to support migration of new digital main control room (MCR) technologies from legacy analog and legacy digital I&C. This paper describes a human factors engineering (HFE) process that supports human-system interface (HSI) design in MCR modernization activities, particularly with migration of old digital to new digital I&C. The process described in this work is an expansion from the LWRS Report INL/EXT-16-38576, and is a requirements-driven approach that aligns with NUREG-0711 requirements. The work described builds upon the existing literature by adding more detail around key tasks and decisions to make when transitioning from HSI Design into Verification and Validation (V&V). The overall objective of this process is to inform HSI design and elicit specific, measurable, and achievable human factors criteria for new digital technologies. Upon following this process, utilities should have greater confidence with transitioning from HSI design into V&V.

  15. A global assessment of wildfire risks to human and environmental water security

    Science.gov (United States)

    Robinne, François-Nicolas; Parisien, Marc-André; Flannigan, Mike; Miller, Carol; Bladon, Kevin D.

    2017-04-01

    Extreme wildfire events extensively affect hydrosystem stability and generate an important threat to the reliability of the water supply for human and natural communities. While actively studied at the watershed scale, the development of a global vision of wildfire risk to water security has only been undertaken recently, pointing at potential water security concerns in an era of global changes. In order to address this concern, we propose a global-scale analysis of the wildfire risk to surface water supplies based on the Driving forces-Pressures-States-Impacts-Responses (DPSIR) framework. This framework relies on the cause-and-effect relationships existing between the five categories of the DPSIR chain. Based on the literature, we gathered an extensive set of spatial indicators relevant to fire-induced hydrological hazards and water consumption patterns by human and natural communities. Each indicator was assigned a DPSIR category. Then, we collapsed the information in each category using a principal component analysis in order to extract the most relevant pixel-based information provided by each spatial indicator. Finally, we compiled our five categories using an additive indexation process to produce a spatially-explicit index of the wildfire-water risk (WWR). For comparison purposes, we aggregated index scores by global hydrological regions, or hydrobelts, for analysis. Overall, our results show a distinct pattern of medium-to-high risk levels in areas where sizeable wildfire activity, water resources, and water consumption are concomitant, which mainly encompasses temperate and sub-tropical zones. A closer look at hydrobelts reveals differences in the factors driving the risk, with fire activity being the primary factor of risk in the circumboreal forest, and freshwater resource density being prevalent in tropical areas. We also identified major urban areas across the world whose source waters should be protected from extreme fire events, particularly when

  16. Information and Knowledge Management in the Scope of the Information Security practices: the human factor within Organizations

    Directory of Open Access Journals (Sweden)

    Luciana Emirena Santos Carneiro

    2013-08-01

    Full Text Available The security of informational assets has always been a corporate requirement. These assets can be scaled in three main spheres, namely, people, organizational processes and technologies. The internet, the web, the broadcast of networks, and the growing presence of technology both in people's lives and in organizational contexts have caused profound transformations in the intrinsic processes that constitute personal and organizational routines. On the one hand, these changes provided by the technological progress have fostered competitiveness and decentralization; on the other hand, they require better management, control, security and protection for information and knowledge. This article presents the results of an investigation within information security realm, focusing on the human aspects of knowledge and information management related to security practices. Using a quality-quantitative approach, we identify behavioral actions and profiles of employees of a company in the field of healthcare, which reveal some connections with information security failures. We conclude that the human element is a relevant variable, even a critical one, for the management of information security in organizations.

  17. Institute of Industrial Engineers Asian Conference 2013

    CERN Document Server

    Tsao, Yu-Chung; Lin, Shi-Woei

    2013-01-01

    This book is based on the research papers presented during The Institute of Industrial Engineers Asian Conference 2013 held at Taipei in July 2013. It presents information on the most recent and relevant research, theories and practices in industrial and systems engineering. Key topics include: Engineering and Technology Management Engineering Economy and Cost Analysis Engineering Education and Training Facilities Planning and Management Global Manufacturing and Management Human Factors Industrial & Systems Engineering Education Information Processing and Engineering Intelligent Systems Manufacturing Systems Operations Research Production Planning and Control Project Management Quality Control and Management Reliability and Maintenance Engineering Safety, Security and Risk Management Supply Chain Management Systems Modeling and Simulation Large scale complex systems.

  18. Cooperative and Human Aspects of Software Engineering (CHASE 2008)

    DEFF Research Database (Denmark)

    2008-01-01

    ethnographic research to experiments. Moreover, the background of attendees reflects the diversity of researchers in this domain, ranging from sociology to psychology, from informatics to software engineering. CHASE 1008 met its goals in presenting high-quality research and building community through a mixture...... of presentations, discussions, posters, and social activities....

  19. human genetic engineering and social justice in south africa

    African Journals Online (AJOL)

    resources, are also acutely visible in the health-care sector. Genetic ... engineering (GE)2 from a South African perspective might not, initially, seem like an obvious ... prevalence of so-called genetic tourism, where couples from developed countries travel to countries in the developing world to undergo in vitro fertilisation ...

  20. Human aspects, gamification, and social media in collaborative software engineering

    NARCIS (Netherlands)

    Vasilescu, B.N.

    2014-01-01

    Software engineering is inherently a collaborative venture. In open-source software (OSS) development, such collaborations almost always span geographies and cultures. Because of the decentralised and self-directed nature of OSS as well as the social diversity inherent to OSS communities, the

  1. Human prenatal progenitors for pediatric cardiovascular tissue engineering

    NARCIS (Netherlands)

    Schmidt, D.

    2007-01-01

    Pediatric cardiovascular tissue engineering is a promising strategy to overcome the lack of autologous, growing replacements for the early repair of congenital malformations in order to prevent secondary damage to the immature heart. Therefore, cells should be harvested during pregnancy as soon as

  2. Engineering Trade-off Considerations Regarding Design-for-Security, Design-for-Verification, and Design-for-Test

    Science.gov (United States)

    Berg, Melanie; Label, Kenneth

    2018-01-01

    The United States government has identified that application specific integrated circuit (ASIC) and field programmable gate array (FPGA) hardware are at risk from a variety of adversary attacks. This finding affects system security and trust. Consequently, processes are being developed for system mitigation and countermeasure application. The scope of this tutorial pertains to potential vulnerabilities and countermeasures within the ASIC/FPGA design cycle. The presentation demonstrates how design practices can affect the risk for the adversary to: change circuitry, steal intellectual property, and listen to data operations. An important portion of the design cycle is assuring the design is working as specified or as expected. This is accomplished by exhaustive testing of the target design. Alternatively, it has been shown that well established schemes for test coverage enhancement (design-for-verification (DFV) and design-for-test (DFT)) can create conduits for adversary accessibility. As a result, it is essential to perform a trade between robust test coverage versus reliable design implementation. The goal of this tutorial is to explain the evolution of design practices; review adversary accessibility points due to DFV and DFT circuitry insertion (back door circuitry); and to describe common engineering trade-off considerations for test versus adversary threats.

  3. Employment Security of Nurses: Baseline for a Strategic Human Resource Direction

    Directory of Open Access Journals (Sweden)

    Dr. Renante A. Egcas

    2017-11-01

    Full Text Available This study is anchored on Herzberg’s Two-Factor Theory which suggests that satisfaction of employees is related to motivation (e.g. achievement, recognition, advancement, growth, and responsibility and dissatisfaction is related to hygiene factors (e.g. company policy and administration, supervision, interpersonal relationships, working conditions, pay, status, and job security. This study aimed to determine the level and predictors of employment security of nurses in both private and government hospitals in Negros Occidental, Philippines. The level of employment security was categorized into economic security, professional security, personal security, and workplace security. Specifically, this study examined the nurserespondents’ profile in terms of types of hospital employed to, sex, civil status, number of dependents, educational attainment, rank, employment status, salary grade, net income, and length of service. This study also determined the significant differences on the level of employment security of nurses when assessed at different categories and when the respondents are grouped according to their profile. This is a descriptive study which surveyed and interviewed nurses (n=318 from 18 government hospitals, 3 infirmaries and 4 private hospitals which signified intention to participate in the study. The study used the stratified random sampling to insure representativeness of the nurse-respondents.Results revealed that the nurse-respondents expressed moderate security in economic aspect, low security in professional aspect, high security in personal aspect and moderate security in workplace aspect. Highly significant differences were noted between professional security and workplace security. Results also revealed that types of hospital, civil status, rank, employment status are predictors of employment security of the nurse-respondents. Hence, the results implied that fast turnover and migration of Philippine nurses are not mainly

  4. Study on Human-structure Dynamic Interaction in Civil Engineering

    Science.gov (United States)

    Gao, Feng; Cao, Li Lin; Li, Xing Hua

    2018-06-01

    The research of human-structure dynamic interaction are reviewed. Firstly, the influence of the crowd load on structural dynamic characteristics is introduced and the advantages and disadvantages of different crowd load models are analyzed. Then, discussing the influence of structural vibration on the human-induced load, especially the influence of different stiffness structures on the crowd load. Finally, questions about human-structure interaction that require further study are presented.

  5. Human factors for engineering: A South African study

    CSIR Research Space (South Africa)

    Venter, Karien

    2013-10-01

    Full Text Available solutions to alleviate fatigue 351 along this route. Currently Route N3 has a number of lay-bys (informal stopping areas next to 352 the road) as well as four formal truck stops with facilities such as restaurants, bathrooms and so 353 forth. 354... designated stop instructions and the fact 362 that the load is secure (crime issues) were also deemed important by the drivers. Healthy food, 363 affordable restaurants and facilities, such as showers, personal safety and the safety of their loads 364...

  6. Strategies for Human Capacity Development in Nuclear Safety and Security in the NNRA

    International Nuclear Information System (INIS)

    Akpanowo, M.; Iwuala, E.

    2016-01-01

    Full text: The Nigerian Nuclear Regulatory Authority (NNRA) is charged with the responsibility for nuclear safety and radiological protection regulation. With Nigeria as one of the nuclear power states, NNRA has since 2010 intensified efforts in developing capacity to license the first set of nuclear power plants in Nigeria. The NNRA has employed several strategies in developing building and strengthening the human capacity to fulfill its statutory functions. This paper describes available human capacity development programmes and the strategies for implementing them including, knowledge retention and management strategy. The strategy commences with the recruitment process, initial training and education and continuous training. As a technical support arm of the NNRA, the National Institute for Radiation Protection and Research offers postgraduate diploma and masters programmes in radiation protection, where many NNRA officers have been trained. The NNRA also leverages on its collaboration with different international organizations for the training of its manpower in the area of nuclear safety and security. NNRA Officers participate in various IAEA organized programmes including fellowship for postgraduate diploma and master programmes, training course, workshops, seminars, conferences, scientific visits and on-the-job-training (OJT). Collaborations with other international organizations are also presented. (author

  7. Formulating Human Resources Development Strategies for Nuclear R and D, Safety and Security

    International Nuclear Information System (INIS)

    Min, B. J.; Kim, M. K.; Son, M. Y.

    2010-05-01

    Enforced by the recent launch of the 4th National Power Expansion Plan and the 1st Basic Plan for National Energy Policy with an ambitious goal of achieving 'Low CO2 Emission and Green Growth', a rapid expansion of nuclear technology development has been reemphasized. In addition, the nation, being a potential exporter of nuclear power plants and nuclear technologies strives to explore their exports markets. In response, it is inevitable to set the priority in human resource development (HRD) as nuclear technology development both requires and fosters HRD which in turn, enables to meet the successful implementation of nuclear power expansion. A continuous, consistent and well-managed programme of HRD is crucial to assure continuity over time in the needed capacities, skills and knowledge, and to establish and maintain a cadre of manpower variously trained in different nuclear-related skills and educated in nuclear relevant fields. The objective of the study is to conduct comprehensive quantitative analyses to estimate future human resources requirements, particularly in the field of nuclear R and D, safety and security in order to establish an appropriate long-term nuclear HRD plan

  8. Human Research Program Space Human Factors Engineering (SHFE) Standing Review Panel (SRP)

    Science.gov (United States)

    Wichansky, Anna; Badler, Norman; Butler, Keith; Cummings, Mary; DeLucia, Patricia; Endsley, Mica; Scholtz, Jean

    2009-01-01

    The Space Human Factors Engineering (SHFE) Standing Review Panel (SRP) evaluated 22 gaps and 39 tasks in the three risk areas assigned to the SHFE Project. The area where tasks were best designed to close the gaps and the fewest gaps were left out was the Risk of Reduced Safety and Efficiency dire to Inadequate Design of Vehicle, Environment, Tools or Equipment. The areas where there were more issues with gaps and tasks, including poor or inadequate fit of tasks to gaps and missing gaps, were Risk of Errors due to Poor Task Design and Risk of Error due to Inadequate Information. One risk, the Risk of Errors due to Inappropriate Levels of Trust in Automation, should be added. If astronauts trust automation too much in areas where it should not be trusted, but rather tempered with human judgment and decision making, they will incur errors. Conversely, if they do not trust automation when it should be trusted, as in cases where it can sense aspects of the environment such as radiation levels or distances in space, they will also incur errors. This will be a larger risk when astronauts are less able to rely on human mission control experts and are out of touch, far away, and on their own. The SRP also identified 11 new gaps and five new tasks. Although the SRP had an extremely large quantity of reading material prior to and during the meeting, we still did not feel we had an overview of the activities and tasks the astronauts would be performing in exploration missions. Without a detailed task analysis and taxonomy of activities the humans would be engaged in, we felt it was impossible to know whether the gaps and tasks were really sufficient to insure human safety, performance, and comfort in the exploration missions. The SRP had difficulty evaluating many of the gaps and tasks that were not as quantitative as those related to concrete physical danger such as excessive noise and vibration. Often the research tasks for cognitive risks that accompany poor task or

  9. Engineering Substantially Prolonged Human Lifespans: Biotechnological Enhancement and Ethics

    NARCIS (Netherlands)

    Derkx, P.H.J.M.

    2006-01-01

    Substantial extension of the human lifespan has recently become a subject of lively debate. One reason for this is the completion in 2001 of the Human Genome Project and the experimental avenues for biogerontological research it has opened. Another is recent theoretical progress in biogerontology.

  10. Physical security and cyber security issues and human error prevention for 3D printed objects: detecting the use of an incorrect printing material

    Science.gov (United States)

    Straub, Jeremy

    2017-06-01

    A wide variety of characteristics of 3D printed objects have been linked to impaired structural integrity and use-efficacy. The printing material can also have a significant impact on the quality, utility and safety characteristics of a 3D printed object. Material issues can be created by vendor issues, physical security issues and human error. This paper presents and evaluates a system that can be used to detect incorrect material use in a 3D printer, using visible light imaging. Specifically, it assesses the ability to ascertain the difference between materials of different color and different types of material with similar coloration.

  11. Infrastructures Development Strategy in Energy Engineering Education and Research: a Bonus to Introduce a Safe and Secure Nuclear Power Program

    Energy Technology Data Exchange (ETDEWEB)

    Bouhelal, Oum Keltoum [National School of Mineral Industry, ENIM, BP 753, Agdal, 10000 Rabat (Morocco)

    2008-07-01

    In the area of Energy Engineering, high education programs including nuclear activities are currently running in collaboration with the employment sector to provide skills oriented profiles; the available packages are thus characterized by a limited size and a low impact in enhancing power technology teaching and industrial partnerships. However, ongoing nuclear applications activities are undertaken through strong legal and institutional infrastructures as Morocco has joined a large number of international conventions and agreements trusted by the IAEA. The introduction of nuclear power is subject to a close attention today to investigate if it is an alternative solution to meet the increasing energy needs. For a country not much industrialized and characterized by a medium electricity grid, the decision on the recourse to nuclear power needs to carry up early a training, R and D federative program on behalf of the engineering sector and the international cooperation. As the challenges associated to develop a successful nuclear power program requires an important effort directed toward increasing capacity, new education and training programs in the field of Energy Sciences and Engineering are presently targeted in several high education institutions prior to the goals of the education and research national reform. The preparation of a new master and engineer diploma at ENIM 'Power Systems Engineering and Management' is in process: the curricula introduces innovative concepts bringing together academic teachers, researchers and stakeholders to establish new discipline-based teaching and learning tools: what is mainly focused is to increase competency profile in consultation with the industry sector and to attract high quality students to ensure availability of human resources at the right time in the field of power technology utilization including nuclear power. A coordinated approach joining national and international partnership to implement oriented R

  12. Infrastructures Development Strategy in Energy Engineering Education and Research: a Bonus to Introduce a Safe and Secure Nuclear Power Program

    International Nuclear Information System (INIS)

    Bouhelal, Oum Keltoum

    2008-01-01

    In the area of Energy Engineering, high education programs including nuclear activities are currently running in collaboration with the employment sector to provide skills oriented profiles; the available packages are thus characterized by a limited size and a low impact in enhancing power technology teaching and industrial partnerships. However, ongoing nuclear applications activities are undertaken through strong legal and institutional infrastructures as Morocco has joined a large number of international conventions and agreements trusted by the IAEA. The introduction of nuclear power is subject to a close attention today to investigate if it is an alternative solution to meet the increasing energy needs. For a country not much industrialized and characterized by a medium electricity grid, the decision on the recourse to nuclear power needs to carry up early a training, R and D federative program on behalf of the engineering sector and the international cooperation. As the challenges associated to develop a successful nuclear power program requires an important effort directed toward increasing capacity, new education and training programs in the field of Energy Sciences and Engineering are presently targeted in several high education institutions prior to the goals of the education and research national reform. The preparation of a new master and engineer diploma at ENIM 'Power Systems Engineering and Management' is in process: the curricula introduces innovative concepts bringing together academic teachers, researchers and stakeholders to establish new discipline-based teaching and learning tools: what is mainly focused is to increase competency profile in consultation with the industry sector and to attract high quality students to ensure availability of human resources at the right time in the field of power technology utilization including nuclear power. A coordinated approach joining national and international partnership to implement oriented R and D

  13. Human trafficking as a threat for the security of member states of EU

    Directory of Open Access Journals (Sweden)

    Mirela Kapo

    2017-07-01

    Full Text Available The topic “Trafficking of human beings” as subject to advanced studies has been chosen due to a growing interest linked with the phenomenon in question. The study introduces a legal criminal overview of the criminal activity consisted of the recruitment, transport, transfer or reception of persons by means of force or forms of fraud for exploitation purposes. Human trafficking represents a threat for the security of member states. The trend to penetrate to all spheres of the society has obliged the European states to draft a new directive reflecting the growing concern about the phenomenon in question, by respecting human rights in accordance with the legal framework under the United Nations, International Labor Organization (ILO, and Council of Europe etc. The new European priorities aim at victims’ identification, their protection and prevention of the phenomenon and more intense criminal prosecution of traffickers. With the view of fully developing this topic, the outline consists of four chapters preceded by a historical background of human trafficking. Special importance in this study, specifically in the second chapter, is attached to the assistance and protection of the victims of human trafficking. It is crucial that these victims exercise their rights effectively. Therefore, the European directives foresee assistance and support before, after and during the criminal proceeding. The third chapter refers to the relevant legal mechanisms in this field assuring the victims of trafficking legal defense, the right to information and their social, psychological and physical recovery. One of the “key” legal instruments is the Palermo Convention, which gives for the first time a detailed definition of the term of trafficking and smuggling and makes the differences between them. All legal instruments converge to one point: the consent of the human trafficking victim is not important when it is used any of the means of force, threat

  14. Variation in tissue outcome of ovine and human engineered heart valve constructs : relevance for tissue engineering

    NARCIS (Netherlands)

    Geemen, van D.; Driessen - Mol, A.; Grootzwagers, L.G.M.; Soekhradj - Soechit, R.S.; Riem Vis, P.W.; Baaijens, F.P.T.; Bouten, C.V.C.

    AIM: Clinical application of tissue engineered heart valves requires precise control of the tissue culture process to predict tissue composition and mechanical properties prior to implantation, and to understand the variation in tissue outcome. To this end we investigated cellular phenotype and

  15. Managing the human factor in information security how to win over staff and influence business managers

    CERN Document Server

    Lacey, David

    2009-01-01

    With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years'' experience, this book examines how fundamental staff awareness is to establishing security and addresses such challenges as containing threats, managing politics, developing programs, and getting a business to buy into a security plan. Illustrated with real-world examples throughout, this is a must-have guide for security and IT professionals.

  16. Reconstruction of nuclear science and engineering harmonized with human society

    International Nuclear Information System (INIS)

    2003-03-01

    At the beginning of the 21th century, the use of nuclear power has assumed very serious dimensions, because there are many problems not only safety technologies but also action of technical expert. The situation and problems of nuclear power are explained. It consists of six chapter as followings; introduction, history and R and D of nuclear power, paradigm change of nuclear science and engineering, energy science, investigation of micro world, how to research and development and education and training of special talent. The improvement plans and five proposals are stated as followings; 1) a scholar and engineer related to nuclear power have to understand ethics and build up closer connection with person in the various fields. 2) Nuclear power generation and nuclear fuel cycle are important in future, so that they have to be accepted by the society by means of opening to the public. Safety science, anti-pollution measurements, treatment and disposal of radioactive waste and development of new reactor and fusion reactor should be carried out. 3) It is necessary that the original researches of quantum beam and isotope have to step up. 4) The education of nuclear science and technology and upbringing special talent has to be reconstructed. New educational system such as 'nuclear engineering course crossing with many universities' is established. 5) Cooperation among industry, academic world and government. (S.Y.)

  17. Explore the Human-Based Teaching for the Professional Course of Materials Science and Engineering

    Science.gov (United States)

    Zhao, Yiping; Chen, Li; Zhang, Yufeng

    2008-01-01

    As viewed from two sides such as teacher and student, in this article, we explore the human-based teaching reform for the college professional course of materials Science and Engineering, point out the qualities and conditions that professional teacher should possess in the process of human-based teaching reform of professional course and the…

  18. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  19. Human factors and systems engineering approach to patient safety for radiotherapy.

    Science.gov (United States)

    Rivera, A Joy; Karsh, Ben-Tzion

    2008-01-01

    The traditional approach to solving patient safety problems in healthcare is to blame the last person to touch the patient. But since the publication of To Err is Human, the call has been instead to use human factors and systems engineering methods and principles to solve patient safety problems. However, an understanding of the human factors and systems engineering is lacking, and confusion remains about what it means to apply their principles. This paper provides a primer on them and their applications to patient safety.

  20. Human Factors and Systems Engineering Approach to Patient Safety for Radiotherapy

    International Nuclear Information System (INIS)

    Rivera, A. Joy; Karsh, Ben-Tzion

    2008-01-01

    The traditional approach to solving patient safety problems in healthcare is to blame the last person to touch the patient. But since the publication of To Err is Human, the call has been instead to use human factors and systems engineering methods and principles to solve patient safety problems. However, an understanding of the human factors and systems engineering is lacking, and confusion remains about what it means to apply their principles. This paper provides a primer on them and their applications to patient safety

  1. Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era

    Science.gov (United States)

    Ali, Firkhan Ali Bin Hamid; Zalisham Jali, Mohd, Dr

    2018-05-01

    The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and

  2. HOW DO RADIOLOGISTS USE THE HUMAN SEARCH ENGINE?

    Science.gov (United States)

    Wolfe, Jeremy M.; Evans, Karla K.; Drew, Trafton; Aizenman, Avigael; Josephs, Emilie

    2016-01-01

    Radiologists perform many ‘visual search tasks’ in which they look for one or more instances of one or more types of target item in a medical image (e.g. cancer screening). To understand and improve how radiologists do such tasks, it must be understood how the human ‘search engine’ works. This article briefly reviews some of the relevant work into this aspect of medical image perception. Questions include how attention and the eyes are guided in radiologic search? How is global (image-wide) information used in search? How might properties of human vision and human cognition lead to errors in radiologic search? PMID:26656078

  3. The Utah Nuclear Engineering Program and DevonWay are Developing One and Unique Approach to PLiM for Securing the Nation's Nuclear Future

    International Nuclear Information System (INIS)

    Jevremovic, Tatjana; Choe, Dongok; Yang, Haori; White, Sally; Kelly, Mike

    2012-01-01

    The safety culture involving a comprehensive training of the employed engineers at the power plant facilities is neither a simple nor a straightforward task. With aging management and operators, impact of the Fukushima nuclear event, unforeseen and timely unpredictable effects of nuclear memories (Three Mile Island, Chernobyl, Second World War) as evoked every time we have worldwide challenges or discussions of where the nuclear technology will/would further develop, we face a fearful question - is our educational and training approach the right one; is it going to assure continuous and secured practices in providing safe operation of our nuclear power plants?... We at the University of Utah with our just recently revitalized Nuclear Engineering Program, find that the root of securing the safety culture and providing its sustainability in our existing and future nuclear power plants, lies in very early educational practices. We believe that every program in nuclear engineering education shall include training in nuclear safety. That training shall certainly include industrial based practices and involve experts from the companies that develop and contribute to nuclear power safety to add to class practices at the University teaching settings. Working with DevonWay, a leading company in developing software to improve the safety cultures at nuclear power plants in the country, we have implemented the 'Track and Trace' software into our nuclear engineering program, emphasizing high quality training of our undergraduate and graduate students, and promoting a higher level safety culture practices at our nuclear engineering facilities. (author)

  4. Analysis on nuclear power plant control room system design and improvement based on human factor engineering

    International Nuclear Information System (INIS)

    Gao Feng; Liu Yanzi; Sun Yongbin

    2014-01-01

    The design of nuclear power plant control room system is a process of improvement with the implementation of human factor engineering theory and guidance. The method of implementation human factor engineering principles into the nuclear power plant control room system design and improvement was discussed in this paper. It is recommended that comprehensive address should be done from control room system function, human machine interface, digital procedure, control room layout and environment design based on the human factor engineering theory and experience. The main issues which should be paid more attention during the control room system design and improvement also were addressed in this paper, and then advices and notices for the design and improvement of the nuclear power plant control room system were afforded. (authors)

  5. Human-factors engineering-control-room design review: Shoreham Nuclear Power Station. Draft audit report

    International Nuclear Information System (INIS)

    Peterson, L.R.; Preston-Smith, J.; Savage, J.W.; Rousseau, W.F.

    1981-01-01

    A human factors engineering preliminary design review of the Shoreham control room was performed at the site on March 30 through April 3, 1981. This design review was carried out by a team from the Human Factors Engineering Branch, Division of Human Factors Safety. This report was prepared on the basis of the HFEB's review of the applicant's Preliminary Design Assessment and the human factors engineering design review/audit performed at the site. The presented sections are numbered to conform to the guidelines of the draft version of NUREG-0700. They summarize the teams's observations of the control room design and layout, and of the control room operators' interface with the control room environment

  6. Using human factors engineering to improve the effectiveness of infection prevention and control.

    Science.gov (United States)

    Anderson, Judith; Gosbee, Laura Lin; Bessesen, Mary; Williams, Linda

    2010-08-01

    Human factors engineering is a discipline that studies the capabilities and limitations of humans and the design of devices and systems for improved performance. The principles of human factors engineering can be applied to infection prevention and control to study the interaction between the healthcare worker and the system that he or she is working with, including the use of devices, the built environment, and the demands and complexities of patient care. Some key challenges in infection prevention, such as delayed feedback to healthcare workers, high cognitive workload, and poor ergonomic design, are explained, as is how human factors engineering can be used for improvement and increased compliance with practices to prevent hospital-acquired infections.

  7. NATO Guidelines on Human Engineering Testing and Evaluation

    National Research Council Canada - National Science Library

    Geddie, J

    2001-01-01

    The purpose of this report is to document the efforts of RSC-24, which was initiated by DRG Panel 8 in 1992, and was sponsored after the merger of DRG and AGARD by the Human Factors and Medicine (HFM...

  8. Electronic cigarettes: incorporating human factors engineering into risk assessments

    OpenAIRE

    Yang, Ling; Rudy, Susan F; Cheng, James M; Durmowicz, Elizabeth L

    2014-01-01

    Objective A systematic review was conducted to evaluate the impact of human factors (HF) on the risks associated with electronic cigarettes (e-cigarettes) and to identify research gaps. HF is the evaluation of human interactions with products and includes the analysis of user, environment and product complexity. Consideration of HF may mitigate known and potential hazards from the use and misuse of a consumer product, including e-cigarettes. Methods Five databases were searched through Januar...

  9. Human security in Sudan: The report of a Canadian Assessment Mission

    International Nuclear Information System (INIS)

    Harker, J.

    2000-01-01

    In October 1999 the Minister of Foreign Affairs and the Minister for International Co-operation announced the creation of an assessment mission to Sudan to examine allegations about human rights abuses, including the practice of slavery and to investigate and report on alleged link between oil development and human rights violations, particularly in respect of the forced removal of populations around oil fields and oil-related developments. The investigation was the result of allegations concerning the forced relocation of civilian populations in the vicinity of the oil field in the interest of a more secure environment for oil extraction by the Government of Sudan and its partners, which include Talisman Energy Inc., a Canadian oil company. In creating the Mission, the Department of Foreign Affairs declared that if it became evident that oil extraction is exacerbating the conflict in Sudan, or the the human rights violations, the Government of Canada may consider applying economic and trade sanctions. This report contains the results of the Mission's observations and meetings with members of the Government of Sudan, opposition leaders, human rights, civil society, and diplomatic representatives, as well as displaced Southern Sudanese and the UN officials trying to help them. The Mission also thoroughly examined Talisman Energy Inc.'s operations in Sudan and the extent to which oil extraction is exacerbating conflict in that country. The overall conclusion of the Mission's investigation is that while the on-going civil war in Sudan is not about oil, oil has become a key factor, and it is exacerbating the conflict. With regard to the role of Talisman, the conclusion was that the company did not do all that it could to keep itself fully informed as to what was happening, and while some progress has been made in curbing human rights violations, the oil operations in which Talisman is involved add to the conflict and suffering. Several recommendations are made to

  10. Human security in Sudan: The report of a Canadian Assessment Mission

    Energy Technology Data Exchange (ETDEWEB)

    Harker, J.

    2000-01-01

    In October 1999 the Minister of Foreign Affairs and the Minister for International Co-operation announced the creation of an assessment mission to Sudan to examine allegations about human rights abuses, including the practice of slavery and to investigate and report on alleged link between oil development and human rights violations, particularly in respect of the forced removal of populations around oil fields and oil-related developments. The investigation was the result of allegations concerning the forced relocation of civilian populations in the vicinity of the oil field in the interest of a more secure environment for oil extraction by the Government of Sudan and its partners, which include Talisman Energy Inc., a Canadian oil company. In creating the Mission, the Department of Foreign Affairs declared that if it became evident that oil extraction is exacerbating the conflict in Sudan, or the the human rights violations, the Government of Canada may consider applying economic and trade sanctions. This report contains the results of the Mission's observations and meetings with members of the Government of Sudan, opposition leaders, human rights, civil society, and diplomatic representatives, as well as displaced Southern Sudanese and the UN officials trying to help them. The Mission also thoroughly examined Talisman Energy Inc.'s operations in Sudan and the extent to which oil extraction is exacerbating conflict in that country. The overall conclusion of the Mission's investigation is that while the on-going civil war in Sudan is not about oil, oil has become a key factor, and it is exacerbating the conflict. With regard to the role of Talisman, the conclusion was that the company did not do all that it could to keep itself fully informed as to what was happening, and while some progress has been made in curbing human rights violations, the oil operations in which Talisman is involved add to the conflict and suffering. Several recommendations

  11. DoD Identity Matching Engine for Security and Analysis (IMESA) Access to Criminal Justice Information (CJI) and Terrorist Screening Databases (TSDB)

    Science.gov (United States)

    2016-05-04

    Department of Defense INSTRUCTION NUMBER 5525.19 May 4, 2016 USD(P&R) SUBJECT: DoD Identity Matching Engine for Security and Analysis...DoD Identity Management Capability Enterprise Services Application (IMESA) Access to FBI National Crime Information Center (NCIC) Files,” April 22...Coordinates with: (1) The USD(I) for oversight and maintenance responsibilities, and for changes to digital DoD personnel identity data and

  12. How Robust Refugee Protection Policies Can Strengthen Human and National Security

    Directory of Open Access Journals (Sweden)

    Donald Kerwin

    2016-09-01

    Full Text Available This paper makes the case that refugee protection and national security should be viewed as complementary, not conflicting state goals. It argues that refugee protection can further the security of refugees, affected states, and the international community. Refugees and international migrants can also advance national security by contributing to a state’s economic vitality, military strength, diplomatic standing, and civic values. The paper identifies several strategies that would, if implemented, promote both security and refugee protection. It also outlines additional steps that the US Congress should take to enhance US refugee protection policies and security. Finally, it argues for the efficacy of political engagement in support of pro-protection, pro-security policies, and against the assumption that political populism will invariably impede support for refugee protection.

  13. Human factors engineering review for CRT screen design

    International Nuclear Information System (INIS)

    Yi, S. M.; Joo, C. Y.; Ra, J. C.

    1999-01-01

    The information interface between man and machine may be more important than hardware and workplace layout considerations. Transmitting and receiving data through this information interface can be characterized as a communication or interface problem. Management of man-machine interface is essential for the enhancement of the information processing and decision-making capability of computer users working in real time, demanding task. The design of human-computer interface is not a rigid and static procedure. The content and context of each interface varies according to the specific application. So, the purpose of this study is to review the human factor design process for interfaces, to make human factor guidelines for CRT screen and to apply these to CRT screen design. (author)

  14. Engineering Human Neural Tissue by 3D Bioprinting.

    Science.gov (United States)

    Gu, Qi; Tomaskovic-Crook, Eva; Wallace, Gordon G; Crook, Jeremy M

    2018-01-01

    Bioprinting provides an opportunity to produce three-dimensional (3D) tissues for biomedical research and translational drug discovery, toxicology, and tissue replacement. Here we describe a method for fabricating human neural tissue by 3D printing human neural stem cells with a bioink, and subsequent gelation of the bioink for cell encapsulation, support, and differentiation to functional neurons and supporting neuroglia. The bioink uniquely comprises the polysaccharides alginate, water-soluble carboxymethyl-chitosan, and agarose. Importantly, the method could be adapted to fabricate neural and nonneural tissues from other cell types, with the potential to be applied for both research and clinical product development.

  15. Protecting human health and security in digital Europe: how to deal with the "privacy paradox"?

    Science.gov (United States)

    Büschel, Isabell; Mehdi, Rostane; Cammilleri, Anne; Marzouki, Yousri; Elger, Bernice

    2014-09-01

    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to shed light on the tension between secrecy and transparency in the digital era. A special focus is put from the perspectives of psychology, medical ethics and European law on the contradiction between individuals' motivations for consented processing of personal data and their fears about unknown disclosure, transferal and sharing of personal data via information and communication technologies (named the "privacy paradox"). Potential benefits and harms for the individual and society resulting from the use of computers, mobile phones, the Internet and social media are being discussed. Furthermore, the authors point out the ethical and legal limitations inherent to the processing of personal data in a democratic society governed by the rule of law. Finally, they seek to demonstrate that the impact of information and communication technology use on the individuals' well-being, the latter being closely correlated with a high level of fundamental rights protection in Europe, is a promising feature of the socalled "e-democracy" as a new way to collectively attribute meaning to large-scale online actions, motivations and ideas.

  16. Accelerator mass spectrometry of Strontium-90 for homeland security, environmental monitoring, and human health

    Energy Technology Data Exchange (ETDEWEB)

    Tumey, S J; Brown, T A; Hamilton, T F; Hillegonds, D J

    2008-03-03

    Strontium-90 is one of the most hazardous materials managed by agencies charged with protecting the public from radiation. Traditional radiometric methods have been limited by low sample throughput and slow turnaround times. Mass spectrometry offers the advantage of shorter analysis times and the ability to measure samples immediately after processing, however conventional mass spectrometric techniques are susceptible to molecular isobaric interferences that limit their overall sensitivity. In contrast, accelerator mass spectrometry is insensitive to molecular interferences and we have therefore begun developing a method for determination of {sup 90}Sr by accelerator mass spectrometry. Despite a pervasive interference from {sup 90}Zr, our initial development has yielded an instrumental background of {approx} 10{sup 8} atoms (75 mBq) per sample. Further refinement of our system (e.g., redesign of our detector, use of alternative target materials) is expected to push the background below 10{sup 6} atoms, close to the theoretical limit for AMS. Once we have refined our system and developed suitable sample preparation protocols, we will utilize our capability in applications to homeland security, environmental monitoring, and human health.

  17. Security Engineering Project

    Science.gov (United States)

    2015-01-31

    aircraft. The backend database affords the storage of a variety of relevant hardware information. For example, the database could be expanded to...to query for this information, but with an empty database these elements are currently nonfunctional. The Django backend handling the routing of...expanding our design into the mobile market, allowing the cyber commander to monitor aircraft status on a tablet device such as an Apple iPad. We imagine

  18. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  19. A Virtual Campus Based on Human Factor Engineering

    Science.gov (United States)

    Yang, Yuting; Kang, Houliang

    2014-01-01

    Three Dimensional or 3D virtual reality has become increasingly popular in many areas, especially in building a digital campus. This paper introduces a virtual campus, which is based on a 3D model of The Tourism and Culture College of Yunnan University (TCYU). Production of the virtual campus was aided by Human Factor and Ergonomics (HF&E), an…

  20. Operational safety related human engineering research in Finland

    International Nuclear Information System (INIS)

    Haapanen, P.; Wahlstroem, B.

    1984-01-01

    Human errors contribute considerably to the total risk of the nuclear power plants as was clearly demonstrated at the TMI-accident in 1979. This fact was recognized early in Finland and a comprehensive research program was established in the second half of the 1970s. This paper gives a short description of some research projects in this program. (author)

  1. Human engineering considerations in the design of New Virginia Power Radwaste facilities

    International Nuclear Information System (INIS)

    Bankley, A.V.; Morris, L.L.; Lippard, D.W.

    1988-01-01

    Human engineering principles were considered by Virginia Power in the recent design of new radwaste facilities (NRFs) for both the Surry and North Anna power stations. Virginia Power recognized that the rigorous application of human engineering principles to the NRF design was essential to the ultimate success or failure of the facilities. Success of the NRF should not only be measured in the volume of radwaste processed but also by other factors such as (a) availability and maintainability of preferred equipment, (b) as-low-as-reasonably-achievable considerations, (c) actual release rates versus achievable release rates, and (d) flexibility to deal with varying circumstances. Each of these success criteria would suffer as the result of operator/human inefficiencies or error. Therefore, human engineering should be applied to the maximum practical extent to minimize such inefficiencies or errors. No method is ever going to ensure a perfectly human-engineered facility design. Virginia Power believes, however, that significant strides have been made in efforts to design and construct a successful radwaste processing facility, a facility where operating success rests with the ability of the human operators to perform their jobs in an efficient and reliable fashion

  2. Synthetic Biology Approaches to Engineer Probiotics and Members of the Human Microbiota for Biomedical Applications.

    Science.gov (United States)

    Bober, Josef R; Beisel, Chase L; Nair, Nikhil U

    2018-03-12

    An increasing number of studies have strongly correlated the composition of the human microbiota with many human health conditions and, in several cases, have shown that manipulating the microbiota directly affects health. These insights have generated significant interest in engineering indigenous microbiota community members and nonresident probiotic bacteria as biotic diagnostics and therapeutics that can probe and improve human health. In this review, we discuss recent advances in synthetic biology to engineer commensal and probiotic lactic acid bacteria, bifidobacteria, and Bacteroides for these purposes, and we provide our perspective on the future potential of these technologies. 277 Expected final online publication date for the Annual Review of Biomedical Engineering Volume 20 is June 4, 2018. Please see http://www.annualreviews.org/page/journal/pubdates for revised estimates.

  3. Cognitive engineering in the design of human-computer interaction and expert systems

    International Nuclear Information System (INIS)

    Salvendy, G.

    1987-01-01

    The 68 papers contributing to this book cover the following areas: Theories of Interface Design; Methodologies of Interface Design; Applications of Interface Design; Software Design; Human Factors in Speech Technology and Telecommunications; Design of Graphic Dialogues; Knowledge Acquisition for Knowledge-Based Systems; Design, Evaluation and Use of Expert Systems. This demonstrates the dual role of cognitive engineering. On the one hand cognitive engineering is utilized to design computing systems which are compatible with human cognition and can be effectively and be easily utilized by all individuals. On the other hand, cognitive engineering is utilized to transfer human cognition into the computer for the purpose of building expert systems. Two papers are of interest to INIS

  4. Enhancing the Human Factors Engineering Role in an Austere Fiscal Environment

    Science.gov (United States)

    Stokes, Jack W.

    2003-01-01

    An austere fiscal environment in the aerospace community creates pressures to reduce program costs, often minimizing or sometimes even deleting the human interface requirements from the design process. With an assumption that the flight crew can recover real time from a poorly human factored space vehicle design, the classical crew interface requirements have been either not included in the design or not properly funded, though carried as requirements. Cost cuts have also affected quality of retained human factors engineering personnel. In response to this concern, planning is ongoing to correct the acting issues. Herein are techniques for ensuring that human interface requirements are integrated into a flight design, from proposal through verification and launch activation. This includes human factors requirements refinement and consolidation across flight programs; keyword phrases in the proposals; closer ties with systems engineering and other classical disciplines; early planning for crew-interface verification; and an Agency integrated human factors verification program, under the One NASA theme. Importance is given to communication within the aerospace human factors discipline, and utilizing the strengths of all government, industry, and academic human factors organizations in an unified research and engineering approach. A list of recommendations and concerns are provided in closing.

  5. Effects of mechanical loading on human mesenchymal stem cells for cartilage tissue engineering.

    Science.gov (United States)

    Choi, Jane Ru; Yong, Kar Wey; Choi, Jean Yu

    2018-03-01

    Today, articular cartilage damage is a major health problem, affecting people of all ages. The existing conventional articular cartilage repair techniques, such as autologous chondrocyte implantation (ACI), microfracture, and mosaicplasty, have many shortcomings which negatively affect their clinical outcomes. Therefore, it is essential to develop an alternative and efficient articular repair technique that can address those shortcomings. Cartilage tissue engineering, which aims to create a tissue-engineered cartilage derived from human mesenchymal stem cells (MSCs), shows great promise for improving articular cartilage defect therapy. However, the use of tissue-engineered cartilage for the clinical therapy of articular cartilage defect still remains challenging. Despite the importance of mechanical loading to create a functional cartilage has been well demonstrated, the specific type of mechanical loading and its optimal loading regime is still under investigation. This review summarizes the most recent advances in the effects of mechanical loading on human MSCs. First, the existing conventional articular repair techniques and their shortcomings are highlighted. The important parameters for the evaluation of the tissue-engineered cartilage, including chondrogenic and hypertrophic differentiation of human MSCs are briefly discussed. The influence of mechanical loading on human MSCs is subsequently reviewed and the possible mechanotransduction signaling is highlighted. The development of non-hypertrophic chondrogenesis in response to the changing mechanical microenvironment will aid in the establishment of a tissue-engineered cartilage for efficient articular cartilage repair. © 2017 Wiley Periodicals, Inc.

  6. Engineering Data Compendium. Human Perception and Performance. Volume 2

    Science.gov (United States)

    1988-01-01

    Solanch Consultant J.W. Whitlow Rutgers University Section 10.0 Effects of Environmental Stressors Colin Corbridge Institute of Sound Vibration...surrounding discs. Human Factors, 14, 139-148. 2. Drury , C, & Clement. M. (1978). The effect of area, density, and number of background charac- ters...nontargets are often difficult to distinguish. Key References * 1. Drury , C., & Clement, M. (1978). The effect of area, density, and number of

  7. Engineered human broncho-epithelial tissue-like assemblies

    Science.gov (United States)

    Goodwin, Thomas J. (Inventor)

    2012-01-01

    Three-dimensional human broncho-epithelial tissue-like assemblies (TLAs) are produced in a rotating wall vessel (RWV) with microcarriers by coculturing mesenchymal bronchial-tracheal cells (BTC) and bronchial epithelium cells (BEC). These TLAs display structural characteristics and express markers of in vivo respiratory epithelia. TLAs are useful for screening compounds active in lung tissues such as antiviral compounds, cystic fibrosis treatments, allergens, and cytotoxic compounds.

  8. Engineering bone tissue from human embryonic stem cells

    OpenAIRE

    Marolt, Darja; Campos, Iván Marcos; Bhumiratana, Sarindr; Koren, Ana; Petridis, Petros; Zhang, Geping; Spitalnik, Patrice F.; Grayson, Warren L.; Vunjak-Novakovic, Gordana

    2012-01-01

    In extensive bone defects, tissue damage and hypoxia lead to cell death, resulting in slow and incomplete healing. Human embryonic stem cells (hESC) can give rise to all specialized lineages found in healthy bone and are therefore uniquely suited to aid regeneration of damaged bone. We show that the cultivation of hESC-derived mesenchymal progenitors on 3D osteoconductive scaffolds in bioreactors with medium perfusion leads to the formation of large and compact bone constructs. Notably, the i...

  9. Engineering human factors into the Westinghouse advanced control room

    International Nuclear Information System (INIS)

    Easter, J.R.

    1987-01-01

    By coupling the work of the Riso Laboratory in Denmark on human behaviour with new digital computation and display technology, Westinghouse has developed a totally new control room design. This design features a separate, co-ordinated work station to support the systems management role in decision making, as well as robust alarm and display systems. This coupling of the functional and physical data presentation is now being implemented in test facilities. (author)

  10. Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience

    Science.gov (United States)

    Thompson, Eleanor Elizabeth

    2014-01-01

    That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…

  11. Safety review for human factors engineering and control rooms of nuclear power plants

    International Nuclear Information System (INIS)

    Yang Mengzhuo

    1998-01-01

    Safety review for human factors engineering and control rooms of nuclear power plants (NPP) is in a forward position of science and technology, which began at American TMI severe accident and had been implemented in China. The importance and the significance of the safety review are expounded, the requirements of its scope and profundity are explained in detail. In addition, the situation of the technical document system for nuclear safety regulation on human factors engineering and control rooms of NPP in China is introduced briefly, on which the safety review is based

  12. How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns

    NARCIS (Netherlands)

    Compagna, L.; El Khoury, P.; Krausová, A.; Massacci, F.; Zannone, N.

    2009-01-01

    Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose them to implement minimal precautionary security measures. Several IT solutions (e.g., Privacy Enhancing Technologies, Access Control Infrastructure, etc.) have been proposed to address

  13. Saving Humanity from Catastrophic Cooling with Geo-Engineering

    Science.gov (United States)

    Haapala, K.; Singer, S. F.

    2016-02-01

    There are two kinds of ice ages; they are fundamentally different and therefore require different methods of mitigation: (i) Major (Milankovitch-style) glaciations occur on a 100,000-year time-scale and are controlled astronomically. (ii) "Little" ice ages were discovered in ice cores; they have been occurring on an approx. 1000-1500-yr cycle and are likely controlled by the Sun [Ref: Singer & Avery 2007. Unstoppable Global Warming: Every 1500 years]. The current cycle's cooling phase may be imminent - hence there may be urgent need for action. To stop onset of a major (Milankovitch) glaciation 1. Locate a "trigger" - a growing perennial snow/ice field - using satellites 2. Spread soot, to lower the albedo, and use Sun to melt 3. How much soot? How to apply soot? Learn by experimentation To lessen (regional, intermittent) cooling of DOB (Dansgaard-Oeschger-Bond) cycles1. Use greenhouse effect of manmade cirrus (ice particles) [Ref: Singer 1988. Meteorology and Atmospheric Physics 38:228 - 239]2. Inject water droplets (mist) near tropopause 3. Trace dispersion of cirrus cloud by satellite and observe warming at surface 4. How much water; over what area? How often to inject? Learn by experimentation Many scientific questions remain. While certainly interesting and important, there is really no need to delay the crucial and urgent tests of geo-engineering, designed to validate schemes of mitigation. Such proposed tests involve only minor costs and present negligible risks to the environment.

  14. Human Systems Engineering for Launch processing at Kennedy Space Center (KSC)

    Science.gov (United States)

    Henderson, Gena; Stambolian, Damon B.; Stelges, Katrine

    2012-01-01

    Launch processing at Kennedy Space Center (KSC) is primarily accomplished by human users of expensive and specialized equipment. In order to reduce the likelihood of human error, to reduce personal injuries, damage to hardware, and loss of mission the design process for the hardware needs to include the human's relationship with the hardware. Just as there is electrical, mechanical, and fluids, the human aspect is just as important. The focus of this presentation is to illustrate how KSC accomplishes the inclusion of the human aspect in the design using human centered hardware modeling and engineering. The presentations also explain the current and future plans for research and development for improving our human factors analysis tools and processes.

  15. p53 inhibits CRISPR-Cas9 engineering in human pluripotent stem cells.

    Science.gov (United States)

    Ihry, Robert J; Worringer, Kathleen A; Salick, Max R; Frias, Elizabeth; Ho, Daniel; Theriault, Kraig; Kommineni, Sravya; Chen, Julie; Sondey, Marie; Ye, Chaoyang; Randhawa, Ranjit; Kulkarni, Tripti; Yang, Zinger; McAllister, Gregory; Russ, Carsten; Reece-Hoyes, John; Forrester, William; Hoffman, Gregory R; Dolmetsch, Ricardo; Kaykas, Ajamete

    2018-06-11

    CRISPR/Cas9 has revolutionized our ability to engineer genomes and conduct genome-wide screens in human cells 1-3 . Whereas some cell types are amenable to genome engineering, genomes of human pluripotent stem cells (hPSCs) have been difficult to engineer, with reduced efficiencies relative to tumour cell lines or mouse embryonic stem cells 3-13 . Here, using hPSC lines with stable integration of Cas9 or transient delivery of Cas9-ribonucleoproteins (RNPs), we achieved an average insertion or deletion (indel) efficiency greater than 80%. This high efficiency of indel generation revealed that double-strand breaks (DSBs) induced by Cas9 are toxic and kill most hPSCs. In previous studies, the toxicity of Cas9 in hPSCs was less apparent because of low transfection efficiency and subsequently low DSB induction 3 . The toxic response to DSBs was P53/TP53-dependent, such that the efficiency of precise genome engineering in hPSCs with a wild-type P53 gene was severely reduced. Our results indicate that Cas9 toxicity creates an obstacle to the high-throughput use of CRISPR/Cas9 for genome engineering and screening in hPSCs. Moreover, as hPSCs can acquire P53 mutations 14 , cell replacement therapies using CRISPR/Cas9-enginereed hPSCs should proceed with caution, and such engineered hPSCs should be monitored for P53 function.

  16. Safety, reliability, risk management and human factors: an integrated engineering approach applied to nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Vasconcelos, Vanderley de; Silva, Eliane Magalhaes Pereira da; Costa, Antonio Carlos Lopes da; Reis, Sergio Carneiro dos [Centro de Desenvolvimento da Tecnologia Nuclear (CDTN/CNEN-MG), Belo Horizonte, MG (Brazil)], e-mail: vasconv@cdtn.br, e-mail: silvaem@cdtn.br, e-mail: aclc@cdtn.br, e-mail: reissc@cdtn.br

    2009-07-01

    Nuclear energy has an important engineering legacy to share with the conventional industry. Much of the development of the tools related to safety, reliability, risk management, and human factors are associated with nuclear plant processes, mainly because the public concern about nuclear power generation. Despite the close association between these subjects, there are some important different approaches. The reliability engineering approach uses several techniques to minimize the component failures that cause the failure of the complex systems. These techniques include, for instance, redundancy, diversity, standby sparing, safety factors, and reliability centered maintenance. On the other hand system safety is primarily concerned with hazard management, that is, the identification, evaluation and control of hazards. Rather than just look at failure rates or engineering strengths, system safety would examine the interactions among system components. The events that cause accidents may be complex combinations of component failures, faulty maintenance, design errors, human actions, or actuation of instrumentation and control. Then, system safety deals with a broader spectrum of risk management, including: ergonomics, legal requirements, quality control, public acceptance, political considerations, and many other non-technical influences. Taking care of these subjects individually can compromise the completeness of the analysis and the measures associated with both risk reduction, and safety and reliability increasing. Analyzing together the engineering systems and controls of a nuclear facility, their management systems and operational procedures, and the human factors engineering, many benefits can be realized. This paper proposes an integration of these issues based on the application of systems theory. (author)

  17. The experimental study of genetic engineering human neural stem cells mediated by lentivirus to express multigene.

    Science.gov (United States)

    Cai, Pei-qiang; Tang, Xun; Lin, Yue-qiu; Martin, Oudega; Sun, Guang-yun; Xu, Lin; Yang, Yun-kang; Zhou, Tian-hua

    2006-02-01

    To explore the feasibility to construct genetic engineering human neural stem cells (hNSCs) mediated by lentivirus to express multigene in order to provide a graft source for further studies of spinal cord injury (SCI). Human neural stem cells from the brain cortex of human abortus were isolated and cultured, then gene was modified by lentivirus to express both green fluorescence protein (GFP) and rat neurotrophin-3 (NT-3); the transgenic expression was detected by the methods of fluorescence microscope, dorsal root ganglion of fetal rats and slot blot. Genetic engineering hNSCs were successfully constructed. All of the genetic engineering hNSCs which expressed bright green fluorescence were observed under the fluorescence microscope. The conditioned medium of transgenic hNSCs could induce neurite flourishing outgrowth from dorsal root ganglion (DRG). The genetic engineering hNSCs expressed high level NT-3 which could be detected by using slot blot. Genetic engineering hNSCs mediated by lentivirus can be constructed to express multigene successfully.

  18. Safety, reliability, risk management and human factors: an integrated engineering approach applied to nuclear facilities

    International Nuclear Information System (INIS)

    Vasconcelos, Vanderley de; Silva, Eliane Magalhaes Pereira da; Costa, Antonio Carlos Lopes da; Reis, Sergio Carneiro dos

    2009-01-01

    Nuclear energy has an important engineering legacy to share with the conventional industry. Much of the development of the tools related to safety, reliability, risk management, and human factors are associated with nuclear plant processes, mainly because the public concern about nuclear power generation. Despite the close association between these subjects, there are some important different approaches. The reliability engineering approach uses several techniques to minimize the component failures that cause the failure of the complex systems. These techniques include, for instance, redundancy, diversity, standby sparing, safety factors, and reliability centered maintenance. On the other hand system safety is primarily concerned with hazard management, that is, the identification, evaluation and control of hazards. Rather than just look at failure rates or engineering strengths, system safety would examine the interactions among system components. The events that cause accidents may be complex combinations of component failures, faulty maintenance, design errors, human actions, or actuation of instrumentation and control. Then, system safety deals with a broader spectrum of risk management, including: ergonomics, legal requirements, quality control, public acceptance, political considerations, and many other non-technical influences. Taking care of these subjects individually can compromise the completeness of the analysis and the measures associated with both risk reduction, and safety and reliability increasing. Analyzing together the engineering systems and controls of a nuclear facility, their management systems and operational procedures, and the human factors engineering, many benefits can be realized. This paper proposes an integration of these issues based on the application of systems theory. (author)

  19. Conversion of human choriogonadotropin into a follitropin by protein engineering

    International Nuclear Information System (INIS)

    Campbell, R.K.; Dean-Emig, D.M.; Moyle, W.R.

    1991-01-01

    Human reproduction is dependent upon the action of follicle-stimulating hormone (hFSH), luteinizing hormone (hLH), and chorionic gonadotropin (hCG). While the α subunits of these heterodimeric proteins can be interchanged without effect on receptor-binding specificity, their β subunits differ and direct hormone binding to either LH/CG or FSH receptors. Previous studies employing chemical modifications of the hormones, monoclonal antibodies, or synthetic peptides have implicated hCG β-subunit residues between Cys-38 and Cys-57 and corresponding regions of hLHβ and hFSHβ in receptor recognition and activation. Since the β subunits of hCG or hLH and hFSH exhibit very little sequence similarity in this region, the authors postulated that these residues might contribute to hormone specificity. To test this hypothesis the authors constructed chimeric hCG/hFSH β subunits, coexpressed them with the human α subunit, and examined their ability to interact with LH and FSH receptors and hormone-specific monoclonal antibodies. Surprisingly, substitution of hFSHβ residues 33-52 for hCGβ residues 39-58 had no effect on receptor binding or stimulation. However, substitution of hFSHβ residues 88-108 in place of the carboxyl terminus of hCGβ (residues 94-145) resulted in a hormone analog identical to hFSH in its ability to bind and stimulate FSH receptors. The altered binding specificity displayed by this analog is not attributable solely to the replacement of hCGβ residues 108-145 or substitution of residues in the determinant loop located between hCDβ residues 93 and 100

  20. Medicine is not health care, food is health care: plant metabolic engineering, diet and human health.

    Science.gov (United States)

    Martin, Cathie; Li, Jie

    2017-11-01

    Contents 699 I. 699 II. 700 III. 700 IV. 706 V. 707 VI. 714 714 References 714 SUMMARY: Plants make substantial contributions to our health through our diets, providing macronutrients for energy and growth as well as essential vitamins and phytonutrients that protect us from chronic diseases. Imbalances in our food can lead to deficiency diseases or obesity and associated metabolic disorders, increased risk of cardiovascular diseases and cancer. Nutritional security is now a global challenge which can be addressed, at least in part, through plant metabolic engineering for nutritional improvement of foods that are accessible to and eaten by many. We review the progress that has been made in nutritional enhancement of foods, both improvements through breeding and through biotechnology and the engineering principles on which increased phytonutrient levels are based. We also consider the evidence, where available, that such foods do enhance health and protect against chronic diseases. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.

  1. Pengalokasian Tenaga Kerja dengan Human Factor Engineering di PT. Pelindo I

    Directory of Open Access Journals (Sweden)

    Yusnawati Yusnawati

    2017-05-01

    Full Text Available Indonesia Port Corporation I (PT Pelabuhan Indonesia I (Persero or PT. Pelindo I is one of the Indonesian state-owned enterprises which manages port services in western Indonesia. Shipyard unit (Unit Galangan Kapal (UGK is a branch of PT. Pelindo I. At present, a problem arises if more than 2 ships are being repaired at once in the unit, UGK scheduling overlaps the repairing activities. In order to solve the problem, study of human factor is important. Human factor is the study of the limitations, capabilities, and human behavior, as well as its interaction with the product, environment, equipment and the establishment of tasks and activities. One part of the human factor is the human factor in system design. In order to improve the effectiveness of the system, the human factor must be involved in each phase of the design process in the system design. This includes a number of activities to obtain input specification work, therefore the working methods and the optimal amount of labor can be determined. Human factors engineering is the application of science that utilizes research on the human factor and use the basic knowledge to design, to repair and to install the system. This research method is causal, searching for the causes which led to delays in the completion of ship repairing. Through human factor engineering approach to the allocation of labor increased by 12.23 per cent of the actual conditions, so that the delay of ship repair were not found during normal conditions.

  2. Genetic Engineering and Human Mental Ecology: Interlocking Effects and Educational Considerations

    OpenAIRE

    Affifi, Ramsey

    2017-01-01

    This paper describes some likely semiotic consequences of genetic engineering on what Gregory Bateson has called ?the mental ecology? (1979) of future humans, consequences that are less often raised in discussions surrounding the safety of GMOs (genetically modified organisms). The effects are as follows: an increased 1) habituation to the presence of GMOs in the environment, 2) normalization of empirically false assumptions grounding genetic reductionism, 3) acceptance that humans are capabl...

  3. The influence of human factor on security of software intended for educational purposes

    Directory of Open Access Journals (Sweden)

    Valeriy Valentinovich Gurov

    2016-06-01

    Full Text Available The report considers the construction and analysis of attack tree on the software tools intended for educational purposes. This takes into account different groups of attackers. The criterion of security for such tools is introduced.

  4. Application of human engineering to design of central control room and evaluation

    International Nuclear Information System (INIS)

    Tani, Mamoru

    1986-01-01

    The central control room of a nuclear power station is the center of the operation control, monitoring and management of the plant, therefore, the design by the application of human engineering has been performed on the basis of the experience and achievement in thermal power stations and other industries. In this report, the application of human engineering to the development of the new control boards for PWRs and the evaluation are described. In a nuclear power station, the number of the machinery and equipment composing it is large, and the interrelation among them is complex, accordingly, in the information processing system for operation monitoring and control, the man-machine interface works with high density. The concept of multiple protection design requires to show numerous plant parameters on a central control board, and this also complicates the man-machine interface. The introduction of human engineering was seriously studied after the TMI accident. In order to increase the safety and reliability of a plant, the new central control and monitoring system aims at facilitating operation and monitoring, and lightening burden and preventing mistakes in handling and judgement. The operational sequence diagram and mock-up varification, the application of human engineering and the evaluation, the synthetic real-time verification at the time of abnormality and accident, and the evaluation of the reliability improvement of men are reported. (Kako, I.)

  5. Human Capital Formation during the First Industrial Revolution: Evidence from the Use of Steam Engines

    NARCIS (Netherlands)

    de Pleijt, Alexandra|info:eu-repo/dai/nl/375805621; Nuvolari, A.; Weisdorf, J.

    2016-01-01

    This paper explores the effect of technological change on human capital formation during the early phases of England’s Industrial Revolution. Following the methodology used in Franck and Galor (2016), we consider the adoption of steam engines as an indicator of technical change, examining the

  6. Hope voor het MKB : goede resultaten na toepassing Human Oriented Production Engineering (HOPE)

    NARCIS (Netherlands)

    Verweij, M.J.

    1997-01-01

    De doorlooptijd werd 40% korter, de kwaliteitsproblemen namen af en de voorraden slonken met een kwart. Het Belgische bedrijf Verhaegen was zeer tevreden over de resultaten van de methode HOPE (Human Oriented Production Engineering). Dit Europeese project richt zich op het midden- en kleinbedrijf.

  7. Sequential use of human-derived medium supplements favours cardiovascular tissue engineering

    NARCIS (Netherlands)

    Riem Vis, P.W.; Sluijter, J.P.G.; Soekhradj - Soechit, R.S.; Herwerden, van L.A.; Kluin, J.; Bouten, C.V.C.

    2012-01-01

    For clinical application of tissue engineering strategies, the use of animal-derived serum in culture medium is not recommended, because it can evoke immune responses in patients. We previously observed that human platelet-lysate (PL) is favourable for cell expansion, but generates weaker tissue as

  8. Draft audit report, human factors engineering control room design review: Saint Lucie Nuclear Power Plant, Unit No. 2

    International Nuclear Information System (INIS)

    Peterson, L.R.; Lappa, D.A.; Moore, J.W.

    1981-01-01

    A human factors engineering preliminary design review of the Saint Lucie Unit 2 control room was performed at the site on August 3 through August 7, 1981. This design review was carried out by a team from the Human Factors Engineering Branch, Division of Human Factors Safety. This report was prepared on the basis of the HFEB's review of the applicant's Preliminary Design Assessment and the human factors engineering design review/audit performed at the site. The review team included human factors consultants from BioTechnology, Inc., Falls Church, Virginia, and from Lawrence Livermore National Laboratory (University of California), Livermore, California

  9. Enhanced normal short-term human myelopoiesis in mice engineered to express human-specific myeloid growth factors.

    Science.gov (United States)

    Miller, Paul H; Cheung, Alice M S; Beer, Philip A; Knapp, David J H F; Dhillon, Kiran; Rabu, Gabrielle; Rostamirad, Shabnam; Humphries, R Keith; Eaves, Connie J

    2013-01-31

    Better methods to characterize normal human hematopoietic cells with short-term repopulating activity cells (STRCs) are needed to facilitate improving recovery rates in transplanted patients.We now show that 5-fold more human myeloid cells are produced in sublethally irradiated NOD/SCID-IL-2Receptor-γchain-null (NSG) mice engineered to constitutively produce human interleukin-3, granulocyte-macrophage colony-stimulating factor and Steel factor (NSG-3GS mice) than in regular NSG mice 3 weeks after an intravenous injection of CD34 human cord blood cells. Importantly, the NSG-3GS mice also show a concomitant and matched increase in circulating mature human neutrophils. Imaging NSG-3GS recipients of lenti-luciferase-transduced cells showed that human cells being produced 3 weeks posttransplant were heterogeneously distributed, validating the blood as a more representative measure of transplanted STRC activity. Limiting dilution transplants further demonstrated that the early increase in human granulopoiesis in NSG-3GS mice reflects an expanded output of differentiated cells per STRC rather than an increase in STRC detection. NSG-3GS mice support enhanced clonal outputs from human short-term repopulating cells (STRCs) without affecting their engrafting efficiency. Increased human STRC clone sizes enable their more precise and efficient measurement by peripheral blood monitoring.

  10. An Axiology of Information Security for Futuristic Neuroprostheses: Upholding Human Values in the Context of Technological Posthumanization.

    Science.gov (United States)

    Gladden, Matthew E

    2017-01-01

    Previous works exploring the challenges of ensuring information security for neuroprosthetic devices and their users have typically built on the traditional InfoSec concept of the "CIA Triad" of confidentiality, integrity, and availability. However, we argue that the CIA Triad provides an increasingly inadequate foundation for envisioning information security for neuroprostheses, insofar as it presumes that (1) any computational systems to be secured are merely instruments for expressing their human users' agency, and (2) computing devices are conceptually and practically separable from their users. Drawing on contemporary philosophy of technology and philosophical and critical posthumanist analysis, we contend that futuristic neuroprostheses could conceivably violate these basic InfoSec presumptions, insofar as (1) they may alter or supplant their users' biological agency rather than simply supporting it, and (2) they may structurally and functionally fuse with their users to create qualitatively novel "posthumanized" human-machine systems that cannot be secured as though they were conventional computing devices. Simultaneously, it is noted that many of the goals that have been proposed for future neuroprostheses by InfoSec researchers (e.g., relating to aesthetics, human dignity, authenticity, free will, and cultural sensitivity) fall outside the scope of InfoSec as it has historically been understood and touch on a wide range of ethical, aesthetic, physical, metaphysical, psychological, economic, and social values. We suggest that the field of axiology can provide useful frameworks for more effectively identifying, analyzing, and prioritizing such diverse types of values and goods that can (and should) be pursued through InfoSec practices for futuristic neuroprostheses.

  11. Human Factors Engineering Incorporated into the Carolina Power and Light company's nuclear power plant control panel modifications

    International Nuclear Information System (INIS)

    Beith, D.M.; Shoemaker, E.M.; Horn, K.; Boush, D.

    1988-01-01

    Maintaining human factors conventions/practices that were established during the Detailed Control Design Review (DCRDR), is difficult if Human Factors Engineering (HFE) is not incorporated into the plant modification process. This paper presents the approach used at Carolina Power and Light's nuclear power plants that has successfully incorporated human factors engineering into their plant modification process. An HFE Design Guide or HFE Specification was developed which is used by the design engineers or plant engineering support groups in the preparation of plant modifications

  12. Generating human resources in nuclear engineering in India: need of the hour

    International Nuclear Information System (INIS)

    Roy, Prateep

    2010-01-01

    With the fast growth of energy requirement scenario, particularly, in India with limited dependence on fossil power and increased emphasis on green power we have lots of nuclear power plant and associated projects in pipeline. This requires enormous human resources trained and qualified in nuclear engineering who will be engaged in all aspects of nuclear plant projects right from conceptualization, design, construction, development, operation, maintenance till decommissioning. As on today, Department of Atomic Energy (DAE) in Government of India is almost the only agency catering to this need. DAE grooms graduate engineers from various disciplines and postgraduates from sciences, specially, Physics and Chemistry. But, it takes enough financial resources and full 1-year duration past graduation from Indian Government. Even after imparting training to these freshly recruited DAE employees, sizeable chunk of the population quit DAE for better prospect such as higher studies abroad, management studies, IT profession etc. Also, the people trained in nuclear engineering are fewer in number than required and the gap would be increasingly large as time progresses and increasing number of nuclear plants would be constructed/operational. Comparatively larger number of engineering graduates currently produced in India are in Computer Engineering/Information Technology rather than in conventional disciplines like Civil, Mechanical, Electrical, Electronics and Telecommunications Engineering. This poses another problem of orienting/motivating the manpower in nuclear fields. Considering these problems the author proposes to produce and develop nuclear engineering graduates directly in the academic institutions which will help the nation in reducing the gap between the increasing demand of manpower in view of large number of nuclear plants in the pipeline and the availability of the nuclear engineers. Even large number of industries related to manufacturing and consultancy also

  13. Human factors engineering applications to the cask design activities of the Civilian Radioactive Waste Management Program

    International Nuclear Information System (INIS)

    Lake, W.H.; Peck, M. III

    1993-01-01

    The use of human factors engineering (HFE) in the design and use of spent fuel casks being developed for the Department of Energy's Civilian Radioactive Waste Management Program is addressed. The safety functions of cask systems are presented as background for HFE considerations. Because spent fuel casks are passive safety devices they could be subject to latent system failures due to human error. It is concluded that HFE should focus on operations and verifications tests, but should begin, to the extent possible, at the beginning of cask design. Use of HFE during design could serve to eliminate or preclude opportunity for human error

  14. Convergence of emerging science and technology trends for defense, security, and human performance

    International Nuclear Information System (INIS)

    Vaseashta, Ashok

    2010-01-01

    Full text: Recent technological innovations have changed the landscape of traditional scientific research. Advances in the nano- and bio-sciences, and materials and information processing are driving innovations at a phenomenal rate, resulting in greater interest yet uncertainty in the chemical-biological threat environment, research and development and other fields of policy, and overall preparedness. Conversely, the synergy arising from the convergence of nanotechnology, biotechnology, information processing and cognitive sciences (NBIC) offers great potential for transformational, revolutionary opportunities with many technological applications. Employing a new initiative termed 'Technology Foresight, Assessment, and Road-Mapping' (Tech-FARM TM ) - a multi dimensional futures-oriented approach for identification and management of emerging and/or disruptive science and technology. In literature similar initiative termed as GRAIN and BANG appear with similarity to NBIC - however Tech-FARM is comprehensive and an exhaustive method. Trans-disciplinary principles underlying NBIC convergence facilitates the development of visions and projections of future possible scientific and technological advances, environments, and productive collaborations for integrated, novel and/or unconventional solutions for 21 st century chem. -bio defense challenges. Incorporation of cognitive sciences refers to human performance enhancement in battlefield theatre. The dynamic relationship between contextual influence (socio-economical factors) and technological development is of critical consideration for S and T futures analyses. The Tech-FARM approach comprises three over-lapping practices of futures studies, including: foresight, the identification of future S and T development and their interaction with society and environment with the purpose of guiding actions to produce a more favorable future; assessment, which is concerned with the unintended, indirect, and delayed impacts of

  15. Reverse engineering validation using a benchmark synthetic gene circuit in human cells.

    Science.gov (United States)

    Kang, Taek; White, Jacob T; Xie, Zhen; Benenson, Yaakov; Sontag, Eduardo; Bleris, Leonidas

    2013-05-17

    Multicomponent biological networks are often understood incompletely, in large part due to the lack of reliable and robust methodologies for network reverse engineering and characterization. As a consequence, developing automated and rigorously validated methodologies for unraveling the complexity of biomolecular networks in human cells remains a central challenge to life scientists and engineers. Today, when it comes to experimental and analytical requirements, there exists a great deal of diversity in reverse engineering methods, which renders the independent validation and comparison of their predictive capabilities difficult. In this work we introduce an experimental platform customized for the development and verification of reverse engineering and pathway characterization algorithms in mammalian cells. Specifically, we stably integrate a synthetic gene network in human kidney cells and use it as a benchmark for validating reverse engineering methodologies. The network, which is orthogonal to endogenous cellular signaling, contains a small set of regulatory interactions that can be used to quantify the reconstruction performance. By performing successive perturbations to each modular component of the network and comparing protein and RNA measurements, we study the conditions under which we can reliably reconstruct the causal relationships of the integrated synthetic network.

  16. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  17. Tissue-engineered human bioartificial muscles expressing a foreign recombinant protein for gene therapy

    Science.gov (United States)

    Powell, C.; Shansky, J.; Del Tatto, M.; Forman, D. E.; Hennessey, J.; Sullivan, K.; Zielinski, B. A.; Vandenburgh, H. H.

    1999-01-01

    Murine skeletal muscle cells transduced with foreign genes and tissue engineered in vitro into bioartificial muscles (BAMs) are capable of long-term delivery of soluble growth factors when implanted into syngeneic mice (Vandenburgh et al., 1996b). With the goal of developing a therapeutic cell-based protein delivery system for humans, similar genetic tissue-engineering techniques were designed for human skeletal muscle stem cells. Stem cell myoblasts were isolated, cloned, and expanded in vitro from biopsied healthy adult (mean age, 42 +/- 2 years), and elderly congestive heart failure patient (mean age, 76 +/- 1 years) skeletal muscle. Total cell yield varied widely between biopsies (50 to 672 per 100 mg of tissue, N = 10), but was not significantly different between the two patient groups. Percent myoblasts per biopsy (73 +/- 6%), number of myoblast doublings prior to senescence in vitro (37 +/- 2), and myoblast doubling time (27 +/- 1 hr) were also not significantly different between the two patient groups. Fusion kinetics of the myoblasts were similar for the two groups after 20-22 doublings (74 +/- 2% myoblast fusion) when the biopsy samples had been expanded to 1 to 2 billion muscle cells, a number acceptable for human gene therapy use. The myoblasts from the two groups could be equally transduced ex vivo with replication-deficient retroviral expression vectors to secrete 0.5 to 2 microg of a foreign protein (recombinant human growth hormone, rhGH)/10(6) cells/day, and tissue engineered into human BAMs containing parallel arrays of differentiated, postmitotic myofibers. This work suggests that autologous human skeletal myoblasts from a potential patient population can be isolated, genetically modified to secrete foreign proteins, and tissue engineered into implantable living protein secretory devices for therapeutic use.

  18. Optimizing the human engineering design of control panels in nuclear power plant control rooms

    International Nuclear Information System (INIS)

    Behrendt, V.; Krehbiehl, T.; Hartfiel, H.D.; Mannhaupt, H.R.

    1986-12-01

    The study contains two parts. In the first part an analytical procedure is developed to logically and reproducibly subdivide the control room personnel tasks resulting in a list of the elements (operations) and the structure (operations scheme) of a task. The second part lists together all knowledge of and influences on human engineering which are known at this time and which should be taken into account in designing control rooms. The content of this catalogue can best be used and presented by using a personal computer. Two fundamental different ways are possible to use the catalogue. Designing new control rooms or new parts of control rooms the results of the task analysis which should be done first, should guide the search in the catalogue to find the right human engineering factors. For assessing existing control room panels the performance shaping factors which are establishing the table of content, permit a quick access to the catalogue. Both the specific procedure of the task analysis and the different ways of access to the catalogue of human engineering knowledge for designing nuclear power plant control rooms have been proven by experienced system engineers and safety experts. The results are presented. They have been considered in this version of the study. (orig.) [de

  19. Design engineer perceptions and attitudes regarding human factors application to nuclear power plant design

    International Nuclear Information System (INIS)

    Ma, R.; Jones, J. M.

    2006-01-01

    With the renewed interest in nuclear power and the possibility of constructing new reactors within the next decade in the U.S., there are several challenges for the regulators, designers, and vendors. One challenge is to ensure that Human Factors Engineering (HFE) is involved, and correctly applied in the life-cycle design of the Nuclear Power Plant (NPP). As an important part of the effort, people would ask: 'is the system-design engineer effectively incorporating HFE in the NPPs design?' The present study examines the sagacity of Instrumentation and Control design engineers on issues relating to awareness, attitude, and application of HFE in NPP design. A questionnaire was developed and distributed, focusing on the perceptions and attitudes of the design engineers. The responses revealed that, while the participants had a relatively high positive attitude about HFE, their awareness and application of HFE were moderate. The results also showed that senior engineers applied HFE more frequently in their design work than young engineers. This study provides some preliminary results and implications for improved HFE education and application in NPP design. (authors)

  20. Ambulatory Antibiotic Stewardship through a Human Factors Engineering Approach: A Systematic Review.

    Science.gov (United States)

    Keller, Sara C; Tamma, Pranita D; Cosgrove, Sara E; Miller, Melissa A; Sateia, Heather; Szymczak, Julie; Gurses, Ayse P; Linder, Jeffrey A

    2018-01-01

    In the United States, most antibiotics are prescribed in ambulatory settings. Human factors engineering, which explores interactions between people and the place where they work, has successfully improved quality of care. However, human factors engineering models have not been explored to frame what is known about ambulatory antibiotic stewardship (AS) interventions and barriers and facilitators to their implementation. We conducted a systematic review and searched OVID MEDLINE, Embase, Scopus, Web of Science, and CINAHL to identify controlled interventions and qualitative studies of ambulatory AS and determine whether and how they incorporated principles from a human factors engineering model, the Systems Engineering Initiative for Patient Safety 2.0 model. This model describes how a work system (ambulatory clinic) contributes to a process (antibiotic prescribing) that leads to outcomes. The work system consists of 5 components, tools and technology, organization, person, tasks, and environment, within an external environment. Of 1,288 abstracts initially identified, 42 quantitative studies and 17 qualitative studies met inclusion criteria. Effective interventions focused on tools and technology (eg, clinical decision support and point-of-care testing), the person (eg, clinician education), organization (eg, audit and feedback and academic detailing), tasks (eg, delayed antibiotic prescribing), the environment (eg, commitment posters), and the external environment (media campaigns). Studies have not focused on clinic-wide approaches to AS. A human factors engineering approach suggests that investigating the role of the clinic's processes or physical layout or external pressures' role in antibiotic prescribing may be a promising way to improve ambulatory AS. © Copyright 2018 by the American Board of Family Medicine.

  1. Building an integrated nuclear engineering and nuclear science human resources pipeline at the Idaho National Engineering and Environmental Laboratory

    International Nuclear Information System (INIS)

    Sneed, A.; Sikorski, B.; Lineberry, M.; Jolly, J.

    2004-01-01

    Full text: In 2002, the US Department of Energy (US DOE) transferred sponsorship of the INEEL and ANL-W to the DOE Office of Nuclear Energy, Science and Technology and designated the INEEL and ANL-W as the nation's lead laboratories for nuclear reactor and nuclear fuel cycle research and development. This transfer acknowledged the laboratories' history, infrastructure, expertise and commitment to collaborate broadly in order to fulfill its assigned role as the nation's center for nuclear energy research and development. Key to this role is the availability of well-educated and trained nuclear engineers, professionals from other disciplines of engineering, nuclear scientists, and others with advanced degrees in supporting disciplines such as physics, chemistry, and math. In 2005 the INEEL and ANL-W will be combined into the Idaho National Laboratory (INL). One of US DOE's objectives for the INL will be for it to take a strong role in the revitalization of nuclear engineering and nuclear science education in the US. Responding to this objective for the INL and the national need to rejuvenate nuclear engineering and nuclear science research and education, ISU, University of Idaho (UI), Boise State University, the INEEL, and ANL-W are all supporting a new Institute of Nuclear Science and Engineering (INSE), initially proposed by and to be administered by ISU. The Institute will rely on the resources of both universities and the INL to create a US center for reactor and fuel cycle research to development and attract outstanding faculty and students to Idaho and to the INL. The Institute and other university based education development efforts represent only one component of a viable Human Resources Pipeline from university to leading edge laboratory researcher. Another critical component is the successful integration of new graduates into the laboratory research environment, the transfer of knowledge from senior researchers, and the development of these individuals into

  2. Human rights or security? Positions on asylum in European Parliament speeches

    DEFF Research Database (Denmark)

    Frid-Nielsen, Snorre Sylvester

    2018-01-01

    parties’ general ‘right-left’ preferences, and duration of EU membership. Generally, MEPs from Central and Eastern Europe and the European People's Party take up pro-security stances. Wordfish was effective and valid, confirming the relevance of automated content analysis for studying the EU.......-2014, scaling MEPs along a unidimensional policy space. Debates on asylum predominantly concern positions for or against European Union (EU) security measures. Surprisingly, national party preferences for EU integration were not the dominant factor. The strongest predictors of MEPs' positions are their national...

  3. The case for applying tissue engineering methodologies to instruct human organoid morphogenesis.

    Science.gov (United States)

    Marti-Figueroa, Carlos R; Ashton, Randolph S

    2017-05-01

    Three-dimensional organoids derived from human pluripotent stem cell (hPSC) derivatives have become widely used in vitro models for studying development and disease. Their ability to recapitulate facets of normal human development during in vitro morphogenesis produces tissue structures with unprecedented biomimicry. Current organoid derivation protocols primarily rely on spontaneous morphogenesis processes to occur within 3-D spherical cell aggregates with minimal to no exogenous control. This yields organoids containing microscale regions of biomimetic tissues, but at the macroscale (i.e. 100's of microns to millimeters), the organoids' morphology, cytoarchitecture, and cellular composition are non-biomimetic and variable. The current lack of control over in vitro organoid morphogenesis at the microscale induces aberrations at the macroscale, which impedes realization of the technology's potential to reproducibly form anatomically correct human tissue units that could serve as optimal human in vitro models and even transplants. Here, we review tissue engineering methodologies that could be used to develop powerful approaches for instructing multiscale, 3-D human organoid morphogenesis. Such technological mergers are critically needed to harness organoid morphogenesis as a tool for engineering functional human tissues with biomimetic anatomy and physiology. Human PSC-derived 3-D organoids are revolutionizing the biomedical sciences. They enable the study of development and disease within patient-specific genetic backgrounds and unprecedented biomimetic tissue microenvironments. However, their uncontrolled, spontaneous morphogenesis at the microscale yields inconsistences in macroscale organoid morphology, cytoarchitecture, and cellular composition that limits their standardization and application. Integration of tissue engineering methods with organoid derivation protocols could allow us to harness their potential by instructing standardized in vitro morphogenesis

  4. Three-Dimensionally Engineered Normal Human Broncho-epithelial Tissue-Like Assemblies: Target Tissues for Human Respiratory Viral Infections

    Science.gov (United States)

    Goodwin, T. J.; McCarthy, M.; Lin, Y-H

    2006-01-01

    In vitro three-dimensional (3D) human broncho-epithelial (HBE) tissue-like assemblies (3D HBE TLAs) from this point forward referred to as TLAs were engineered in Rotating Wall Vessel (RWV) technology to mimic the characteristics of in vivo tissues thus providing a tool to study human respiratory viruses and host cell interactions. The TLAs were bioengineered onto collagen-coated cyclodextran microcarriers using primary human mesenchymal bronchial-tracheal cells (HBTC) as the foundation matrix and an adult human bronchial epithelial immortalized cell line (BEAS-2B) as the overlying component. The resulting TLAs share significant characteristics with in vivo human respiratory epithelium including polarization, tight junctions, desmosomes, and microvilli. The presence of tissue-like differentiation markers including villin, keratins, and specific lung epithelium markers, as well as the production of tissue mucin, further confirm these TLAs differentiated into tissues functionally similar to in vivo tissues. Increasing virus titers for human respiratory syncytial virus (wtRSVA2) and parainfluenza virus type 3 (wtPIV3 JS) and the detection of membrane bound glycoproteins over time confirm productive infections with both viruses. Therefore, TLAs mimic aspects of the human respiratory epithelium and provide a unique capability to study the interactions of respiratory viruses and their primary target tissue independent of the host's immune system.

  5. Human Factors Engineering and Ergonomics Analysis for the Canister Storage Building (CSB) Results and Findings

    Energy Technology Data Exchange (ETDEWEB)

    GARVIN, L.J.

    1999-09-20

    The purpose for this supplemental report is to follow-up and update the information in SNF-3907, Human Factors Engineering (HFE) Analysis: Results and Findings. This supplemental report responds to applicable U.S. Department of Energy Safety Analysis Report review team comments and questions. This Human Factors Engineering and Ergonomics (HFE/Erg) analysis was conducted from April 1999 to July 1999; SNF-3907 was based on analyses accomplished in October 1998. The HFE/Erg findings presented in this report and SNF-3907, along with the results of HNF-3553, Spent Nuclear Fuel Project, Final Safety Analysis Report, Annex A, ''Canister Storage Building Final Safety Analysis Report,'' Chapter A3.0, ''Hazards and Accidents Analyses,'' provide the technical basis for preparing or updating HNF-3553. Annex A, Chaptex A13.0, ''Human Factors Engineering.'' The findings presented in this report allow the HNF-3553 Chapter 13.0, ''Human Factors,'' to respond fully to the HFE requirements established in DOE Order 5480.23, Nuclear Safety Analysis Reports.

  6. Human Factors Engineering and Ergonomics Analysis for the Canister Storage Building (CSB) Results and Findings

    International Nuclear Information System (INIS)

    GARVIN, L.J.

    1999-01-01

    The purpose for this supplemental report is to follow-up and update the information in SNF-3907, Human Factors Engineering (HFE) Analysis: Results and Findings. This supplemental report responds to applicable U.S. Department of Energy Safety Analysis Report review team comments and questions. This Human Factors Engineering and Ergonomics (HFE/Erg) analysis was conducted from April 1999 to July 1999; SNF-3907 was based on analyses accomplished in October 1998. The HFE/Erg findings presented in this report and SNF-3907, along with the results of HNF-3553, Spent Nuclear Fuel Project, Final Safety Analysis Report. Annex A, ''Canister Storage Building Final Safety Analysis Report,'' Chapter A3.0, ''Hazards and Accidents Analyses,'' provide the technical basis for preparing or updating HNF-3553, Annex A, Chapter A13.0, ''Human Factors Engineering.'' The findings presented in this report allow the HNF-3553 Chapter 13.0, ''Human Factors,'' to respond fully to the HFE requirements established in DOE Order 5480.23, Nuclear Safety Analysis Reports

  7. Human Factors Engineering and Ergonomics Analysis for the Canister Storage Building (CSB): Results and Findings

    International Nuclear Information System (INIS)

    GARVIN, L.J.

    1999-01-01

    The purpose for this supplemental report is to follow-up and update the information in SNF-3907, Human Factors Engineering (HFE) Analysis: Results and Findings. This supplemental report responds to applicable U.S. Department of Energy Safety Analysis Report review team comments and questions. This Human Factors Engineering and Ergonomics (HFE/Erg) analysis was conducted from April 1999 to July 1999; SNF-3907 was based on analyses accomplished in October 1998. The HFE/Erg findings presented in this report and SNF-3907, along with the results of HNF-3553, Spent Nuclear Fuel Project, Final Safety Analysis Report, Annex A, ''Canister Storage Building Final Safety Analysis Report,'' Chapter A3.0, ''Hazards and Accidents Analyses,'' provide the technical basis for preparing or updating HNF-3553. Annex A, Chaptex A13.0, ''Human Factors Engineering.'' The findings presented in this report allow the HNF-3553 Chapter 13.0, ''Human Factors,'' to respond fully to the HFE requirements established in DOE Order 5480.23, Nuclear Safety Analysis Reports

  8. Identification of advanced human factors engineering analysis, design and evaluation methods

    International Nuclear Information System (INIS)

    Plott, C.; Ronan, A. M.; Laux, L.; Bzostek, J.; Milanski, J.; Scheff, S.

    2006-01-01

    NUREG-0711 Rev.2, 'Human Factors Engineering Program Review Model,' provides comprehensive guidance to the Nuclear Regulatory Commission (NRC) in assessing the human factors practices employed by license applicants for Nuclear Power Plant control room designs. As software based human-system interface (HSI) technologies supplant traditional hardware-based technologies, the NRC may encounter new HSI technologies or seemingly unconventional approaches to human factors design, analysis, and evaluation methods which NUREG-0711 does not anticipate. A comprehensive survey was performed to identify advanced human factors engineering analysis, design and evaluation methods, tools, and technologies that the NRC may encounter in near term future licensee applications. A review was conducted to identify human factors methods, tools, and technologies relevant to each review element of NUREG-0711. Additionally emerging trends in technology which have the potential to impact review elements, such as Augmented Cognition, and various wireless tools and technologies were identified. The purpose of this paper is to provide an overview of the survey results and to highlight issues that could be revised or adapted to meet with emerging trends. (authors)

  9. United States Security Assistance 1977-1980: Human Rights Issues Affecting Arms Transfers.

    Science.gov (United States)

    1995-09-01

    police attempted to break up the gathering, the crowd became enraged and proceeded to destroy a number of banks, cinemas , and hotels (Brown:296...According to Carter’s National Security Advisor, Zbigniew Brzezinski, the Peruvian government released over 300 prisoners in April 1977; "disappearances

  10. Human Rights as Practice: Dalit Women's Collective Action to Secure Livelihood Entitlements in rural South India

    NARCIS (Netherlands)

    Mangubhai, Y.

    2012-01-01

    In this dissertation, I investigate how Dalit women in rural South India secure livelihood entitlements by analysing processes of social exclusion as well as collective action by these women through their perspectives. This problematic requires focus on how caste, class and gender mutually construct

  11. A Systems Engineering Framework for Implementing a Security and Critical Patch Management Process in Diverse Environments (Academic Departments' Workstations)

    Science.gov (United States)

    Mohammadi, Hadi

    2014-01-01

    Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to…

  12. Human Kunitz-type protease inhibitor engineered for enhanced matrix retention extends longevity of fibrin biomaterials.

    Science.gov (United States)

    Briquez, Priscilla S; Lorentz, Kristen M; Larsson, Hans M; Frey, Peter; Hubbell, Jeffrey A

    2017-08-01

    Aprotinin is a broad-spectrum serine protease inhibitor used in the clinic as an anti-fibrinolytic agent in fibrin-based tissue sealants. However, upon re-exposure, some patients suffer from hypersensitivity immune reactions likely related to the bovine origin of aprotinin. Here, we aimed to develop a human-derived substitute to aprotinin. Based on sequence homology analyses, we identified the Kunitz-type protease inhibitor (KPI) domain of human amyloid-β A4 precursor protein as being a potential candidate. While KPI has a lower intrinsic anti-fibrinolytic activity than aprotinin, we reasoned that its efficacy is additionally limited by its fast release from fibrin material, just as aprotinin's is. Thus, we engineered KPI variants for controlled retention in fibrin biomaterials, using either covalent binding through incorporation of a substrate for the coagulation transglutaminase Factor XIIIa or through engineering of extracellular matrix protein super-affinity domains for sequestration into fibrin. We showed that both engineered KPI variants significantly slowed plasmin-mediated fibrinolysis in vitro, outperforming aprotinin. In vivo, our best engineered KPI variant (incorporating the transglutaminase substrate) extended fibrin matrix longevity by 50%, at a dose at which aprotinin did not show efficacy, thus qualifying it as a competitive substitute of aprotinin in fibrin sealants. Copyright © 2017 The Author(s). Published by Elsevier Ltd.. All rights reserved.

  13. A systems engineering perspective on the human-centered design of health information systems.

    Science.gov (United States)

    Samaras, George M; Horst, Richard L

    2005-02-01

    The discipline of systems engineering, over the past five decades, has used a structured systematic approach to managing the "cradle to grave" development of products and processes. While elements of this approach are typically used to guide the development of information systems that instantiate a significant user interface, it appears to be rare for the entire process to be implemented. In fact, a number of authors have put forth development lifecycle models that are subsets of the classical systems engineering method, but fail to include steps such as incremental hazard analysis and post-deployment corrective and preventative actions. In that most health information systems have safety implications, we argue that the design and development of such systems would benefit by implementing this systems engineering approach in full. Particularly with regard to bringing a human-centered perspective to the formulation of system requirements and the configuration of effective user interfaces, this classical systems engineering method provides an excellent framework for incorporating human factors (ergonomics) knowledge and integrating ergonomists in the interdisciplinary development of health information systems.

  14. Human factors engineering evaluation of the Advanced Test Reactor Control Room

    International Nuclear Information System (INIS)

    Boone, M.P.; Banks, W.W.

    1980-12-01

    The information presented here represents preliminary findings related to an ongoing human engineering evaluation of the Advanced Test Reactor (ATR) Control Room. Although many of the problems examined in this report have been previously noted by ATR operations personnel, the systematic approach used in this investigation produced many new insights. While many violations of Human Engineering military standards (MIL-STD) are noted, and numerous recommendations made, the recommendations should be examined cautiously. The reason for our suggested caution lies in the fact that many ATR operators have well over 10-years experience in operating the controls, meters, etc. Hence, it is assumed adaptation to the existing system is quite developed and the introduction of hardware/control changes, even though the changes enhance the system, may cause short-term (or long-term, depending upon the amount of operator experience and training) adjustment problems for operators adapting to the new controls/meters and physical layout

  15. Tissue-Engineered Vascular Rings from Human iPSC-Derived Smooth Muscle Cells

    Directory of Open Access Journals (Sweden)

    Biraja C. Dash

    2016-07-01

    Full Text Available There is an urgent need for an efficient approach to obtain a large-scale and renewable source of functional human vascular smooth muscle cells (VSMCs to establish robust, patient-specific tissue model systems for studying the pathogenesis of vascular disease, and for developing novel therapeutic interventions. Here, we have derived a large quantity of highly enriched functional VSMCs from human induced pluripotent stem cells (hiPSC-VSMCs. Furthermore, we have engineered 3D tissue rings from hiPSC-VSMCs using a facile one-step cellular self-assembly approach. The tissue rings are mechanically robust and can be used for vascular tissue engineering and disease modeling of supravalvular aortic stenosis syndrome. Our method may serve as a model system, extendable to study other vascular proliferative diseases for drug screening. Thus, this report describes an exciting platform technology with broad utility for manufacturing cell-based tissues and materials for various biomedical applications.

  16. Recommendations to the NRC on human engineering guidelines for nuclear power plant maintainability

    Energy Technology Data Exchange (ETDEWEB)

    Badalamente, R.V.; Fecht, B.A.; Blahnik, D.E.; Eklund, J.D.; Hartley, C.S.

    1986-03-01

    This document contains human engineering guidelines which can enhance the maintainability of nuclear power plants. The guidelines have been derived from general human engineering design principles, criteria, and data. The guidelines may be applied to existing plants as well as to plants under construction. They apply to nuclear power plant systems, equipment and facilities, as well as to maintenance tools and equipment. The guidelines are grouped into seven categories: accessibility and workspace, physical environment, loads and forces, maintenance facilities, maintenance tools and equipment, operating equipment design, and information needs. Each chapter of the document details specific maintainability problems encountered at nuclear power plants, the safety impact of these problems, and the specific maintainability design guidelines whose application can serve to avoid these problems in new or existing plants.

  17. Human factors engineering design review acceptance criteria for the safety parameter display

    International Nuclear Information System (INIS)

    McGevna, V.; Peterson, L.R.

    1981-01-01

    This report contains human factors engineering design review acceptance criteria developed by the Human Factors Engineering Branch (HFEB) of the Nuclear Regulatory Commission (NRC) to use in evaluating designs of the Safety Parameter Display System (SPDS). These criteria were developed in response to the functional design criteria for the SPDS defined in NUREG-0696, Functional Criteria for Emergency Response Facilities. The purpose of this report is to identify design review acceptance criteria for the SPDS installed in the control room of a nuclear power plant. Use of computer driven cathode ray tube (CRT) displays is anticipated. General acceptance criteria for displays of plant safety status information by the SPDS are developed. In addition, specific SPDS review criteria corresponding to the SPDS functional criteria specified in NUREG-0696 are established

  18. Recommendations to the NRC on human engineering guidelines for nuclear power plant maintainability

    International Nuclear Information System (INIS)

    Badalamente, R.V.; Fecht, B.A.; Blahnik, D.E.; Eklund, J.D.; Hartley, C.S.

    1986-03-01

    This document contains human engineering guidelines which can enhance the maintainability of nuclear power plants. The guidelines have been derived from general human engineering design principles, criteria, and data. The guidelines may be applied to existing plants as well as to plants under construction. They apply to nuclear power plant systems, equipment and facilities, as well as to maintenance tools and equipment. The guidelines are grouped into seven categories: accessibility and workspace, physical environment, loads and forces, maintenance facilities, maintenance tools and equipment, operating equipment design, and information needs. Each chapter of the document details specific maintainability problems encountered at nuclear power plants, the safety impact of these problems, and the specific maintainability design guidelines whose application can serve to avoid these problems in new or existing plants

  19. The Social Engineering Personality Framework

    NARCIS (Netherlands)

    Uebelacker, Sven; Quiel, Susanne

    We explore ICT security in a socio-technical world and focus in particular on the susceptibility to social engineering attacks. We pursue the question if and how personality traits influence this susceptibility. This allows us to research human factors and their potential impact on the physical and

  20. Use of Diplomatic Assurances in Terrorism-related Cases: In search of a Balance between Security Concerns and Human Rights

    Directory of Open Access Journals (Sweden)

    Bibi van Ginkel

    2010-03-01

    Full Text Available In this paper, Research Fellow Dr. Bibi van Ginkel and intern Federico Rojas analyse the different policies on diplomatic assurances in a number of countries that are representative of a certain trend and attempt to clarify the criteria that have to be fulfilled before assurance may be used. Key in the whole discussion surrounding the use of diplomatic assurances is finding the right balance between national security concerns and human rights obligations. The outcomes of the Expert Meeting on this topic, that took place on 22 March 2011, have been incorporated in this paper.

  1. Personal view of educating two-phase flow and human resource development as a nuclear engineer

    International Nuclear Information System (INIS)

    Hotta, Akitoshi

    2010-01-01

    As an engineer who has devoted himself in the nuclear industry for almost three decades, the author gave a personal view on educating two-phase flow and developing human resources. An expected role of universities in on-going discussions of collaboration among industry-government-academia is introduced. Reformation of two-phase flow education is discussed from two extreme viewpoints, the basic structure of physics and the practical system analysis. (author)

  2. Assessing the feasibility of integrating ecosystem-based with engineered water resource governance and management for water security in semi-arid landscapes: A case study in the Banas catchment, Rajasthan, India.

    Science.gov (United States)

    Everard, Mark; Sharma, Om Prakash; Vishwakarma, Vinod Kumar; Khandal, Dharmendra; Sahu, Yogesh K; Bhatnagar, Rahul; Singh, Jitendra K; Kumar, Ritesh; Nawab, Asghar; Kumar, Amit; Kumar, Vivek; Kashyap, Anil; Pandey, Deep Narayan; Pinder, Adrian C

    2018-01-15

    Much of the developing world and areas of the developed world suffer water vulnerability. Engineering solutions enable technically efficient extraction and diversion of water towards areas of demand but, without rebalancing resource regeneration, can generate multiple adverse ecological and human consequences. The Banas River, Rajasthan (India), has been extensively developed for water diversion, particularly from the Bisalpur Dam from which water is appropriated by powerful urban constituencies dispossessing local people. Coincidentally, abandonment of traditional management, including groundwater recharge practices, is leading to increasingly receding and contaminated groundwater. This creates linked vulnerabilities for rural communities, irrigation schemes, urban users, dependent ecosystems and the multiple ecosystem services that they provide, compounded by climate change and population growth. This paper addresses vulnerabilities created by fragmented policy measures between rural development, urban and irrigation water supply and downstream consequences for people and wildlife. Perpetuating narrowly technocentric approaches to resource exploitation is likely only to compound emerging problems. Alternatively, restoration or innovation of groundwater recharge practices, particularly in the upper catchment, can represent a proven, ecosystem-based approach to resource regeneration with linked beneficial socio-ecological benefits. Hybridising an ecosystem-based approach with engineered methods can simultaneously increase the security of rural livelihoods, piped urban and irrigation supplies, and the vitality of river ecosystems and their services to beneficiaries. A renewed policy focus on local-scale water recharge practices balancing water extraction technologies is consistent with emerging Rajasthani policies, particularly Jal Swavlamban Abhiyan ('water self-reliance mission'). Policy reform emphasising recharge can contribute to water security and yield socio

  3. Workshop on cooperative and human aspects of software engineering (CHASE 2011)

    DEFF Research Database (Denmark)

    Cataldo, Marcelo; de Souza, Cleidson; Dittrich, Yvonne

    2011-01-01

    is to provide a forum for discussing high quality research on human and cooperative aspects of software engineering. We aim at providing both a meeting place for the growing community and the possibility for researchers interested in joining the field to present their work in progress and get an overview over......Software is created by people for people working in varied environments, under various conditions. Thus understanding cooperative and human aspects of software development is crucial to comprehend how methods and tools are used, and thereby improve the creation and maintenance of software. Over...

  4. Applications of human factors engineering to LNG release prevention and control

    Energy Technology Data Exchange (ETDEWEB)

    Shikiar, R.; Rankin, W.L.; Rideout, T.B.

    1982-06-01

    The results of an investigation of human factors engineering and human reliability applications to LNG release prevention and control are reported. The report includes a discussion of possible human error contributions to previous LNG accidents and incidents, and a discussion of generic HF considerations for peakshaving plants. More specific recommendations for improving HF practices at peakshaving plants are offered based on visits to six facilities. The HF aspects of the recently promulgated DOT regulations are reviewed, and recommendations are made concerning how these regulations can be implemented utilizing standard HF practices. Finally, the integration of HF considerations into overall system safety is illustrated by a presentation of human error probabilities applicable to LNG operations and by an expanded fault tree analysis which explicitly recognizes man-machine interfaces.

  5. Engineering antigen-specific T cells from genetically modified human hematopoietic stem cells in immunodeficient mice.

    Directory of Open Access Journals (Sweden)

    Scott G Kitchen

    Full Text Available There is a desperate need for effective therapies to fight chronic viral infections. The immune response is normally fastidious at controlling the majority of viral infections and a therapeutic strategy aimed at reestablishing immune control represents a potentially powerful approach towards treating persistent viral infections. We examined the potential of genetically programming human hematopoietic stem cells to generate mature CD8+ cytotoxic T lymphocytes that express a molecularly cloned, "transgenic" human anti-HIV T cell receptor (TCR. Anti-HIV TCR transduction of human hematopoietic stem cells directed the maturation of a large population of polyfunctional, HIV-specific CD8+ cells capable of recognizing and killing viral antigen-presenting cells. Thus, through this proof-of-concept we propose that genetic engineering of human hematopoietic stem cells will allow the tailoring of effector T cell responses to fight HIV infection or other diseases that are characterized by the loss of immune control.

  6. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  7. Survey of control-room design practices with respect to human factors engineering

    International Nuclear Information System (INIS)

    Seminara, J.L.; Parsons, S.O.

    1980-01-01

    Human factors engineering is an interdisciplinary speciality concerned with influencing the design of equipment systems, facilities, and operational environments to promote safe, efficient, and reliable operator performance. This emphasis has been applied to most military and space systems in the past 30 y. A review of five nuclear power-plant control rooms, reported in the November-December 1977 issue of Nuclear Safety, revealed that human factors principles of design have generally not been incorporated in present-generation control rooms. This article summarizes the findings of a survey of 20 control-board designers from a mix of nuclear steam-supply system and architect-engineering firms. The interviews with these designers probed design methods currently used in developing control rooms. From these data it was concluded that there is currently no consistent, formal, uniform concern for the human factors aspects of control-room design on the part of the design organizations, the utilities, or the Nuclear Regulatory Commission. Although all the parties involved are concerned with human factors issues, this responsibility is not focused, and human factors yardsticks, or design standards, specific to power plants have not been evolved and applied in the development and verification of control-room designs from the standpoint of the man-machine interface

  8. Engineering and Humanities Students' Strategies for Vocabulary Acquisition: An Iranian Experience

    Directory of Open Access Journals (Sweden)

    Hassan Soodmand Afshar

    2014-05-01

    Full Text Available The present study set out to investigate the differences between EAP (English for Academic Purposes students of Humanities and Engineering in terms of vocabulary strategy choice and use. One hundred and five undergraduate Iranian students (39 students from Engineering Faculty and 66 from Humanities Faculty studying at Bu-Ali Sina University Hamedan, during the academic year of 2011–2012 participated in this study. For data collection purposes, a pilot-tested factor-analyzed five-point Likert-scale vocabulary learning strategies questionnaire (VLSQ containing 45 statements was adopted. The results of independent samples t-test indicated that, overall, the two groups were not significantly different in the choice and use of vocabulary learning strategies. However, running Chi square analyses, significant differences were found in individual strategy use in 6 out of 45 strategies. That is, while Humanities students used more superficial and straightforward strategies like repetition strategy and seeking help from others, the Engineering students preferred much deeper, thought-provoking and sophisticated strategies like using a monolingual dictionary and learning vocabulary through collocations and coordinates. Further, the most and the least frequently used vocabulary learning strategies by the two groups were specified, out of which only two strategies in each category were commonly shared by both groups. The possible reasons why the results have turned out to be so as well as the implications of the study are discussed in details in the paper.

  9. Tools for Developing a Quality Management Program: Human Factors and Systems Engineering Tools

    International Nuclear Information System (INIS)

    Caldwell, Barrett S.

    2008-01-01

    During the past 10 years, there has been growing acceptance and encouragement of partnerships between medical teams and engineers. Using human factors and systems engineering descriptions of process flows and operational sequences, the author's research laboratory has helped highlight opportunities for reducing adverse events and improving performance in health care and other high-consequence environments. This research emphasized studying human behavior that enhances system performance and a range of factors affecting adverse events, rather than a sole emphasis on human error causation. Developing a balanced evaluation requires novel approaches to causal analyses of adverse events and, more importantly, methods of recovery from adverse conditions. Recent work by the author's laboratory in collaboration with the Regenstrief Center for Healthcare Engineering has started to address possible improvements in taxonomies describing health care tasks. One major finding includes enhanced understanding of events and how event dynamics influence provider tasks and constraints. Another element of this research examines team coordination tasks that strongly affect patient care and quality management, but may be undervalued as 'indirect patient care' activities

  10. EDF EPR project: operating principles validation and human factor engineering program

    International Nuclear Information System (INIS)

    Lefebvre, B.; Berard, E.; Arpino, J.-M.

    2005-01-01

    This article describes the specificities of the operating principles chosen by EDF for the EPR project as a result of an extensive Human Factor Engineering program successfully implemented in an industrial project context. The design process and its achievements benefit of the EDF experience feedback not only in term of NPP operation - including the fully computerized control room of the N4-serie - but also in term of NPP designer. The elements exposed hereafter correspond to the basic design phase of EPR HMI which has been completed and successfully validated by the end of 2003. The article aims to remind the context of the project which basically consists in designing a modern and efficient HMI taking into account the operating needs while relying on proven and reliable technologies. The Human Factor Engineering program implemented merges these both aspects by : 1) being fully integrated within the project activities and scheduling; 2) efficiently taking into account the users needs as well as the feasibility constraints by relying on a multidisciplinary design team including HF specialists, I and C specialists, Process specialists and experienced operator representatives. The resulting design process makes a wide use of experience feedback and experienced operator knowledge to complete largely the existing standards for providing a fully useable and successful design method in an industrial context. The article underlines the design process highlights that largely contribute to the successful implementation of a Human Factor Engineering program for EPR. (authors)

  11. Efficient CRISPR/Cas9-Based Genome Engineering in Human Pluripotent Stem Cells.

    Science.gov (United States)

    Kime, Cody; Mandegar, Mohammad A; Srivastava, Deepak; Yamanaka, Shinya; Conklin, Bruce R; Rand, Tim A

    2016-01-01

    Human pluripotent stem cells (hPS cells) are rapidly emerging as a powerful tool for biomedical discovery. The advent of human induced pluripotent stem cells (hiPS cells) with human embryonic stem (hES)-cell-like properties has led to hPS cells with disease-specific genetic backgrounds for in vitro disease modeling and drug discovery as well as mechanistic and developmental studies. To fully realize this potential, it will be necessary to modify the genome of hPS cells with precision and flexibility. Pioneering experiments utilizing site-specific double-strand break (DSB)-mediated genome engineering tools, including zinc finger nucleases (ZFNs) and transcription activator-like effector nucleases (TALENs), have paved the way to genome engineering in previously recalcitrant systems such as hPS cells. However, these methods are technically cumbersome and require significant expertise, which has limited adoption. A major recent advance involving the clustered regularly interspaced short palindromic repeats (CRISPR) endonuclease has dramatically simplified the effort required for genome engineering and will likely be adopted widely as the most rapid and flexible system for genome editing in hPS cells. In this unit, we describe commonly practiced methods for CRISPR endonuclease genomic editing of hPS cells into cell lines containing genomes altered by insertion/deletion (indel) mutagenesis or insertion of recombinant genomic DNA. Copyright © 2016 John Wiley & Sons, Inc.

  12. Education in Responsibility in Order to Secure Human Rights in Times of Crisis

    Science.gov (United States)

    Merrigan, Michaël

    2014-01-01

    Education in and awareness about human rights is generally seen as one of the less contentious elements of citizenship education. However, it would seem that, for the concept of human rights to have a real impact in today's world, theoretical knowledge of human rights standards should be complemented by an understanding of the ethical concept of…

  13. A software prototype development of human system interfaces for human factors engineering validation tests of SMART MCR

    International Nuclear Information System (INIS)

    Lim, Jong Tae; Han, Kwan Ho; Yang, Seung Won

    2011-02-01

    An integrated system validation test bed used for human factors engineering validation test is being developed. This study has a goal to develop a software prototype for HFE validation of SMART MCR design. To achieve these, first, some prototype specifications of the software was developed. Then software prototypes of alarm reduction logic system, Plant Protection System, ESF-CCS, Elastic Tile Alarm Indication, and EID-based HSIs were implemented as codes. Test procedures for the software prototypes were established to verify the completeness of the codes implemented. The careful software test has been done according to these test procedures, and the result were documented

  14. Reference to the Safety Engineering Undergraduate Courses to Improve the Subjects and Contents of the Certified Safety Engineer Qualification and Examination System of China

    OpenAIRE

    Haibin Qiu; Shanghong Shi; Tingdi Zhao; Yiwei Qiao; Jiangshi Zhang

    2013-01-01

    The aim of this paper is to recommend that the subjects and contents of certified safety engineers use safety engineering undergraduate curriculum system for reference. Human resources play an important role in accident prevention and loss control. Education on safety engineering develops quickly in China. Moreover, the State Administration of Work Safety and the National Human Resources and Social Security Ministry have implemented a certified safety engineer qualification and examination sy...

  15. The suitability of human adipose-derived stem cells for the engineering of ligament tissue.

    Science.gov (United States)

    Eagan, Michael J; Zuk, Patricia A; Zhao, Ke-Wei; Bluth, Benjamin E; Brinkmann, Elyse J; Wu, Benjamin M; McAllister, David R

    2012-10-01

    Rupture of the anterior cruciate ligament (ACL) is the one of the most common sports-related injuries. With its poor healing capacity, surgical reconstruction using either autografts or allografts is currently required to restore function. However, serious complications are associated with graft reconstructions and the number of such reconstructions has steadily risen over the years, necessitating the search for an alternative approach to ACL repair. Such an approach may likely be tissue engineering. Recent engineering approaches using ligament-derived fibroblasts have been promising, but the slow growth rate of such fibroblasts in vitro may limit their practical application. More promising results are being achieved using bone marrow mesenchymal stem cells (MSCs). The adipose-derived stem cell (ASC) is often proposed as an alternative choice to the MSC and, as such, may be a suitable stem cell for ligament engineering. However, the use of ASCs in ligament engineering still remains relatively unexplored. Therefore, in this study, the potential use of human ASCs in ligament tissue engineering was initially explored by examining their ability to express several ligament markers under growth factor treatment. ASC populations treated for up to 4 weeks with TGFβ1 or IGF1 did not show any significant and consistent upregulation in the expression of collagen types 1 and 3, tenascin C and scleraxis. While treatment with EGF or bFGF resulted in increased tenascin C expression, increased expression of collagens 1 and 3 were never observed. Therefore, simple in vitro treatment of human ASC populations with growth factors may not stimulate their ligament differentiative potential. Copyright © 2011 John Wiley & Sons, Ltd.

  16. Integrated Human Test Facilities at NASA and the Role of Human Engineering

    Science.gov (United States)

    Tri, Terry O.

    2002-01-01

    Integrated human test facilities are a key component of NASA's Advanced Life Support Program (ALSP). Over the past several years, the ALSP has been developing such facilities to serve as a large-scale advanced life support and habitability test bed capable of supporting long-duration evaluations of integrated bioregenerative life support systems with human test crews. These facilities-targeted for evaluation of hypogravity compatible life support and habitability systems to be developed for use on planetary surfaces-are currently in the development stage at the Johnson Space Center. These major test facilities are comprised of a set of interconnected chambers with a sealed internal environment, which will be outfitted with systems capable of supporting test crews of four individuals for periods exceeding one year. The advanced technology systems to be tested will consist of both biological and physicochemical components and will perform all required crew life support and habitability functions. This presentation provides a description of the proposed test "missions" to be supported by these integrated human test facilities, the overall system architecture of the facilities, the current development status of the facilities, and the role that human design has played in the development of the facilities.

  17. CERN Computing Colloquia Spring Series: IT Security - A High-Performance Pattern Matching Engine for Intrusion Detection

    CERN Multimedia

    CERN. Geneva

    2006-01-01

    The flexible and modular design of the engine allows a broad spectrum of applications, ranging from high-end enterprise level network devices that need to match hundreds of thousands of patterns at speeds of tens of gigabits per second, to low-end dev...

  18. The passage of Australia’s data retention regime: national security, human rights, and media scrutiny

    Directory of Open Access Journals (Sweden)

    Nicolas Suzor

    2017-03-01

    Full Text Available In 2015, the Australian government passed the Telecommunications (Interception and Access Amendment (Data Retention Act, which requires ISPs to collect metadata about their users and store this metadata for two years. From its conception, Australia’s data retention scheme has been controversial. In this article we examine how public interest concerns were addressed in Australian news media during the Act’s passage. The Act was ultimately passed with bipartisan support, despite serious deficiencies. We show how the Act’s complexity seemed to limit engaged critique in the mainstream media and how fears over terrorist attacks were exploited to secure the Act’s passage through parliament.

  19. Building an integrated nuclear engineering and nuclear science human resources pipeline at the Idaho National Engineering and Environmental Laboratory

    International Nuclear Information System (INIS)

    Sneed, A.; Sikorski, B.; Lineberry, M.; Jolly, J.

    2004-01-01

    In a joint effort with the Argonne National Laboratory - West (ANL-W), the Idaho National Engineering and Environmental Laboratory (INEEL) has assumed the lead role for nuclear energy reactor research for the United States Government. In 2005, these two laboratories will be combined into one entity, the Idaho National Laboratory (INL). There are two objectives for the INL: (1) to act as the lead systems integrator for the Department of Energy's Office of Nuclear Energy Science and Technology and, (2) to establish a Center for Advanced Energy Studies. Focusing on the Center for Advanced Energy Studies, this paper presents a Human Resources Pipeline Model outlining a nuclear educational pathway that leads to university and industry research partnerships. The pathway progresses from education to employment and into retirement. Key to the model is research and mentoring and their impact upon each stage. The Center's success will be the result of effective and advanced communications, faculty/student involvement, industry support, inclusive broadbased involvement, effective long-term partnering, and increased federal and state support. (author)

  20. Tissue engineering for human urethral reconstruction: systematic review of recent literature.

    Science.gov (United States)

    de Kemp, Vincent; de Graaf, Petra; Fledderus, Joost O; Ruud Bosch, J L H; de Kort, Laetitia M O

    2015-01-01

    Techniques to treat urethral stricture and hypospadias are restricted, as substitution of the unhealthy urethra with tissue from other origins (skin, bladder or buccal mucosa) has some limitations. Therefore, alternative sources of tissue for use in urethral reconstructions are considered, such as ex vivo engineered constructs. To review recent literature on tissue engineering for human urethral reconstruction. A search was made in the PubMed and Embase databases restricted to the last 25 years and the English language. A total of 45 articles were selected describing the use of tissue engineering in urethral reconstruction. The results are discussed in four groups: autologous cell cultures, matrices/scaffolds, cell-seeded scaffolds, and clinical results of urethral reconstructions using these materials. Different progenitor cells were used, isolated from either urine or adipose tissue, but slightly better results were obtained with in vitro expansion of urothelial cells from bladder washings, tissue biopsies from the bladder (urothelium) or the oral cavity (buccal mucosa). Compared with a synthetic scaffold, a biological scaffold has the advantage of bioactive extracellular matrix proteins on its surface. When applied clinically, a non-seeded matrix only seems suited for use as an onlay graft. When a tubularized substitution is the aim, a cell-seeded construct seems more beneficial. Considerable experience is available with tissue engineering of urethral tissue in vitro, produced with cells of different origin. Clinical and in vivo experiments show promising results.

  1. Human iPSC-derived cardiomyocytes and tissue engineering strategies for disease modeling and drug screening.

    Science.gov (United States)

    Smith, Alec S T; Macadangdang, Jesse; Leung, Winnie; Laflamme, Michael A; Kim, Deok-Ho

    Improved methodologies for modeling cardiac disease phenotypes and accurately screening the efficacy and toxicity of potential therapeutic compounds are actively being sought to advance drug development and improve disease modeling capabilities. To that end, much recent effort has been devoted to the development of novel engineered biomimetic cardiac tissue platforms that accurately recapitulate the structure and function of the human myocardium. Within the field of cardiac engineering, induced pluripotent stem cells (iPSCs) are an exciting tool that offer the potential to advance the current state of the art, as they are derived from somatic cells, enabling the development of personalized medical strategies and patient specific disease models. Here we review different aspects of iPSC-based cardiac engineering technologies. We highlight methods for producing iPSC-derived cardiomyocytes (iPSC-CMs) and discuss their application to compound efficacy/toxicity screening and in vitro modeling of prevalent cardiac diseases. Special attention is paid to the application of micro- and nano-engineering techniques for the development of novel iPSC-CM based platforms and their potential to advance current preclinical screening modalities. Published by Elsevier Inc.

  2. Bone tissue engineering with human mesenchymal stem cell sheets constructed using magnetite nanoparticles and magnetic force.

    Science.gov (United States)

    Shimizu, Kazunori; Ito, Akira; Yoshida, Tatsuro; Yamada, Yoichi; Ueda, Minoru; Honda, Hiroyuki

    2007-08-01

    An in vitro reconstruction of three-dimensional (3D) tissues without the use of scaffolds may be an alternative strategy for tissue engineering. We have developed a novel tissue engineering strategy, termed magnetic force-based tissue engineering (Mag-TE), in which magnetite cationic liposomes (MCLs) with a positive charge at the liposomal surface, and magnetic force were used to construct 3D tissue without scaffolds. In this study, human mesenchymal stem cells (MSCs) magnetically labeled with MCLs were seeded onto an ultra-low attachment culture surface, and a magnet (4000 G) was placed on the reverse side. The MSCs formed multilayered sheet-like structures after a 24-h culture period. MSCs in the sheets constructed by Mag-TE maintained an in vitro ability to differentiate into osteoblasts, adipocytes, or chondrocytes after a 21-day culture period using each induction medium. Using an electromagnet, MSC sheets constructed by Mag-TE were harvested and transplanted into the bone defect in the crania of nude rats. Histological observation revealed that new bone surrounded by osteoblast-like cells was formed in the defect area 14 days after transplantation with MSC sheets, whereas no bone formation was observed in control rats without the transplant. These results indicated that Mag-TE could be used for the transplantation of MSC sheets using magnetite nanoparticles and magnetic force, providing novel methodology for bone tissue engineering.

  3. THE DEVELOPMENT OF DETAILED HUMAN FACTORS ENGINEERING GUIDELINES FOR DIGITAL CONTROL ROOM UPGRADES

    International Nuclear Information System (INIS)

    BROWN, W.; O'HARA, J.M.

    2004-01-01

    As part of the Department of Energy and Electric Power Research Institute's hybrid control room project, detailed human factors engineering guidance was developed for designing human-system interfaces that may be affected by introduction of additional digital technology during modernization of nuclear power plants. The guidance addresses several aspects of human-system interaction: information display, interface management, soft controls, alarms, computer-based procedures, computerized operator support systems, communications, and workstation/workplace design. In this paper, the ways in which digital upgrades might affect users' interaction with systems in each of these contexts are briefly described, and the contents of the guidance developed for each of the topics is also described

  4. KEPCO‧s Activity to Power-Engineer Human Resource Development

    Science.gov (United States)

    Kobashi, Kazushi

    While business environment changes a lot, in order to aim at realization of “what we want the Group to look like in 2030” , it is necessary to cultivate human resources with a strong sense of mission. We need to prepare an opportunity to teach and to be taught, in order to cultivate resources and a measure for connecting every person‧s growth to growth of a company. In chapter one, we show Five Trends for attaining what KANSAI Electric Power Corporation wants to be and explain the importance of human resource development under the changing environment. In chapter two, we explain the fundamental policy of human resource cultivation and describe the development plan and the facilities for training based on the policy in chapter two. In chapter three, we express the specific efforts in the field of maintenance, construction, and operation at the department of Engineering and Operation.

  5. Development ethics through the lenses of caring, gender, and human security.

    NARCIS (Netherlands)

    D.R. Gasper (Des); T-D. Truong (Thanh-Dam)

    2008-01-01

    textabstractThinking about ethics of development and human development must both treat development in a global perspective and yet reflect on the content of human. This paper explores some faces of globalization by using a gender perspective, in order to consider reproduction (psychological and

  6. Fast forward for the United Nations. Human security becomes a unifying force

    International Nuclear Information System (INIS)

    Annan, Kofi

    2005-01-01

    This paper speaks about the author's vision of a safer world and a better United Nations. The global threats of our age include terrorism, deadly weapons, genocide, infectious disease, poverty, environmental degradation and organized crime. They will not wait for States to sort out their differences. That is why we must act now to strengthen our collective defences. We must unite to master today's threats, and not allow them to divide and master us. And I submit that the only universal instrument that can bring States together in such a global effort is the United Nations. One must acknowledge that the United Nations is not perfect. At times, it shows its age. But our world will not easily find a better instrument for forging a sustained, global response to today's threats. We must use it to unite around common priorities - and act on them. And we must agree on a plan to reform the United Nations - and get on with the job of implementing it. This message lies at the heart of the recent report, A More Secure World: Our Shared Responsibility. It is the work of the Panel of 16 men and women from around the world I appointed last year. The report contains a powerful vision of collective security. Whether the threat is terrorism or AIDS, a threat to one is a threat to all. Our defences are only as strong as their weakest link. We will be safest if we work together

  7. Human security paradigms and economic crisis in first year of the North Caucasus Federal District

    Directory of Open Access Journals (Sweden)

    Tiago Ferreira Lopes

    2013-04-01

    Full Text Available The decrease in insecurity in the North Caucasus during the first eight years of the 21st century was achieved with the help of federal money used to amnesty soldiers and to pacify ethnic leaders' ambitions. But circumstances changed after Dmitry Kozak's announcement that the federal budget for the entire region would decrease significantly. As all the republics in the North Caucasus are dependent on federal aid of no less than 50% (in Ingushetia, Chechnya and Dagestan dependence is superior to 80%, such cut represented a politically potential danger. The main goal of the article is to present a deeper understanding of the potential link between the international and regional economic dynamics and the current acceleration of social disruption in the North Caucasus region. The paper explains how ethno-political and transition studies can benefit from the inclusion of the economic dimension into the analysis, and so it clarifies the importance of a bi-level analysis using two concepts: economic society and economic security. The paper employs the concepts of economic security and economic society to perform a richer and innovative analysis.

  8. The Impact of Pro-Government Militias on State and Human Security: A Comparative Analysis of the Afghan Local Police and the Janjaweed

    Science.gov (United States)

    2018-03-01

    employed them; second, that we should expect to see an inverse relationship between pro-government militia employment and human security. This study also...security to the principal who employed them; second, that we should expect to see an inverse relationship between pro-government militia employment and...Uzbek forces, the United States and its allied partners momentarily destroyed most of the al Qaeda operatives in Afghanistan while simultaneously

  9. Virtual Environment Computer Simulations to Support Human Factors Engineering and Operations Analysis for the RLV Program

    Science.gov (United States)

    Lunsford, Myrtis Leigh

    1998-01-01

    The Army-NASA Virtual Innovations Laboratory (ANVIL) was recently created to provide virtual reality tools for performing Human Engineering and operations analysis for both NASA and the Army. The author's summer research project consisted of developing and refining these tools for NASA's Reusable Launch Vehicle (RLV) program. Several general simulations were developed for use by the ANVIL for the evaluation of the X34 Engine Changeout procedure. These simulations were developed with the software tool dVISE 4.0.0 produced by Division Inc. All software was run on an SGI Indigo2 High Impact. This paper describes the simulations, various problems encountered with the simulations, other summer activities, and possible work for the future. We first begin with a brief description of virtual reality systems.

  10. INCORPORATION OF HUMAN FACTORS ENGINEERING ANALYSES AND TOOLS INTO THE DESIGN PROCESS FOR DIGITAL CONTROL ROOM UPGRADES

    International Nuclear Information System (INIS)

    O'HARA, J.M.; BROWN, W.

    2004-01-01

    Many nuclear power plants are modernizing with digital instrumentation and control systems and computer-based human-system interfaces (HSIs). The purpose of this paper is to summarize the human factors engineering (HFE) activities that can help to ensure that the design meets personnel needs. HFE activities should be integrated into the design process as a regular part of the engineering effort of a plant modification. The HFE activities will help ensure that human performance issues are addressed, that new technology supports task performance, and that the HSIs are designed in a manner that is compatible with human physiological, cognitive and social characteristics

  11. Towards breaking the silence between the two cultures: Engineering and the other humanities

    Energy Technology Data Exchange (ETDEWEB)

    Prausnitz, John M.

    2003-01-01

    Over the years, I have attended numerous meetings like this one at the Center for the Study of Higher Education. I have noticed that most of the attendees, and certainly the speakers, tend to come from the social sciences or humanities. Only rarely do I see anyone here from Berkeley's College of Chemistry or College of Engineering. I come from the College of Chemistry that includes Berkeley's Department of Chemical Engineering. I mention this background to indicate that my remarks here are necessarily less abstract, less theoretical and less philosophical than those of most previous seminar speakers. My remarks are probably somewhat simplistic because, as a result of my engineering background, I tend to focus less on generalities and principles, giving more attention to possible solutions of limited practical problems. About seven weeks ago, I was invited to attend a conference sponsored by the Berlin Academy of Sciences where ''Sciences'' is not confined to natural sciences but includes also humanities and social sciences. The topic of the Conference was ''Sprachlosigkeit'', a German word that roughly translated means inability to speak. The subtitle was ''Silence Between the Disciplines''. The German universities are worried about the increasing gulf between what is often called ''the two cultures''. This gulf is a problem everywhere, including Berkeley, but it is my impression that it is much worse in Europe than in America. The International Conference in Berlin was attended by some big names including the presidents of the Humboldt University in Berlin, the University of Uppsala in Sweden and the Central European University of Budapest, as well as some distinguished academics from a variety of institutions including Harvard and Stanford, and the presidents of three major funding organizations: The Volkswagen Foundation, The German National Science Foundation and the Max

  12. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  13. Human Factors Engineering (HFE) insights for advanced reactors based upon operating experience

    International Nuclear Information System (INIS)

    Higgins, J.; Nasta, K.

    1997-01-01

    The NRC Human Factors Engineering Program Review Model (HFE PRM, NUREG-0711) was developed to support a design process review for advanced reactor design certification under 10CFR52. The HFE PRM defines ten fundamental elements of a human factors engineering program. An Operating Experience Review (OER) is one of these elements. The main purpose of an OER is to identify potential safety issues from operating plant experience and ensure that they are addressed in a new design. Broad-based experience reviews have typically been performed in the past by reactor designers. For the HFE PRM the intent is to have a more focussed OER that concentrates on HFE issues or experience that would be relevant to the human-system interface (HSI) design process for new advanced reactors. This document provides a detailed list of HFE-relevant operating experience pertinent to the HSI design process for advanced nuclear power plants. This document is intended to be used by NRC reviewers as part of the HFE PRM review process in determining the completeness of an OER performed by an applicant for advanced reactor design certification. 49 refs

  14. Engineering adolescence: maturation of human pluripotent stem cell-derived cardiomyocytes.

    Science.gov (United States)

    Yang, Xiulan; Pabon, Lil; Murry, Charles E

    2014-01-31

    The discovery of human pluripotent stem cells (hPSCs), including both human embryonic stem cells and human-induced pluripotent stem cells, has opened up novel paths for a wide range of scientific studies. The capability to direct the differentiation of hPSCs into functional cardiomyocytes has provided a platform for regenerative medicine, development, tissue engineering, disease modeling, and drug toxicity testing. Despite exciting progress, achieving the optimal benefits has been hampered by the immature nature of these cardiomyocytes. Cardiac maturation has long been studied in vivo using animal models; however, finding ways to mature hPSC cardiomyocytes is only in its initial stages. In this review, we discuss progress in promoting the maturation of the hPSC cardiomyocytes, in the context of our current knowledge of developmental cardiac maturation and in relation to in vitro model systems such as rodent ventricular myocytes. Promising approaches that have begun to be examined in hPSC cardiomyocytes include long-term culturing, 3-dimensional tissue engineering, mechanical loading, electric stimulation, modulation of substrate stiffness, and treatment with neurohormonal factors. Future studies will benefit from the combinatorial use of different approaches that more closely mimic nature's diverse cues, which may result in broader changes in structure, function, and therapeutic applicability.

  15. NRC Reviewer Aid for Evaluating the Human Factors Engineering Aspects of Small Modular Reactors

    International Nuclear Information System (INIS)

    OHara, J.M.; Higgins, J.C.

    2012-01-01

    Small modular reactors (SMRs) are a promising approach to meeting future energy needs. Although the electrical output of an individual SMR is relatively small compared to that of typical commercial nuclear plants, they can be grouped to produce as much energy as a utility demands. Furthermore, SMRs can be used for other purposes, such as producing hydrogen and generating process heat. The design characteristics of many SMRs differ from those of current conventional plants and may require a distinct concept of operations (ConOps). The U.S. Nuclear Regulatory Commission (NRC) conducted research to examine the human factors engineering (HFE) and the operational aspects of SMRs. The research identified thirty potential human-performance issues that should be considered in the NRC's reviews of SMR designs and in future research activities. The purpose of this report is to support NRC HFE reviewers of SMR applications by identifying some of the questions that can be asked of applicants whose designs have characteristics identified in the issues. The questions for each issue were identified and organized based on the review elements and guidance contained in Chapter 18 of the Standard Review Plan (NUREG-0800), and the Human Factors Engineering Program Review Model (NUREG-0711).

  16. Spent nuclear fuel project, Cold Vacuum Drying Facility human factors engineering (HFE) analysis: Results and findings

    International Nuclear Information System (INIS)

    Garvin, L.J.

    1998-01-01

    This report presents the background, methodology, and findings of a human factors engineering (HFE) analysis performed in May, 1998, of the Spent Nuclear Fuels (SNF) Project Cold Vacuum Drying Facility (CVDF), to support its Preliminary Safety Analysis Report (PSAR), in responding to the requirements of Department of Energy (DOE) Order 5480.23 (DOE 1992a) and drafted to DOE-STD-3009-94 format. This HFE analysis focused on general environment, physical and computer workstations, and handling devices involved in or directly supporting the technical operations of the facility. This report makes no attempt to interpret or evaluate the safety significance of the HFE analysis findings. The HFE findings presented in this report, along with the results of the CVDF PSAR Chapter 3, Hazards and Accident Analyses, provide the technical basis for preparing the CVDF PSAR Chapter 13, Human Factors Engineering, including interpretation and disposition of findings. The findings presented in this report allow the PSAR Chapter 13 to fully respond to HFE requirements established in DOE Order 5480.23. DOE 5480.23, Nuclear Safety Analysis Reports, Section 8b(3)(n) and Attachment 1, Section-M, require that HFE be analyzed in the PSAR for the adequacy of the current design and planned construction for internal and external communications, operational aids, instrumentation and controls, environmental factors such as heat, light, and noise and that an assessment of human performance under abnormal and emergency conditions be performed (DOE 1992a)

  17. The secure reactors

    International Nuclear Information System (INIS)

    Hannerz, K.

    1987-01-01

    The principle of Process Inherent Ultimate Safety (PIUS) is a new approach to Light Water Reactor (LWR) safety that could represent a solution to the present problems of public distrust, regulatory maze and plant design complexity plaguing the nuclear industry in many countries. A unique thermohydraulic design of the primary system ensures core integrity, and thereby gurarantees freedom from significant releases of radioactive matter, in all credible emergencies. This is accomplished entirely without reliance on potentially failure prone engineered safety systems and with immunity to operator mistskes. The potential for human fallibility to cause accidents is thereby drastically reduced in an easily understood way. Plant design can be greatly simplified because redundant, diverse safety systems are no longer needed. The paper briefly describes the PIUS design principle and the two SECURE reactor designs based on it, i.e. SECURE-H for district heating and process steam and SECURE-P (usually known simply as PIUS) for electric power generation. Demonstration of simulated system over-all thermohydraulic function and transient response in a large electrically heated test loop is described and results from some component development work is given. (author)

  18. Enhanced Electrical Integration of Engineered Human Myocardium via Intramyocardial versus Epicardial Delivery in Infarcted Rat Hearts.

    Directory of Open Access Journals (Sweden)

    Kaytlyn A Gerbin

    Full Text Available Cardiac tissue engineering is a promising approach to provide large-scale tissues for transplantation to regenerate the heart after ischemic injury, however, integration with the host myocardium will be required to achieve electromechanical benefits. To test the ability of engineered heart tissues to electrically integrate with the host, 10 million human embryonic stem cell (hESC-derived cardiomyocytes were used to form either scaffold-free tissue patches implanted on the epicardium or micro-tissue particles (~1000 cells/particle delivered by intramyocardial injection into the left ventricular wall of the ischemia/reperfusion injured athymic rat heart. Results were compared to intramyocardial injection of 10 million dispersed hESC-cardiomyocytes. Graft size was not significantly different between treatment groups and correlated inversely with infarct size. After implantation on the epicardial surface, hESC-cardiac tissue patches were electromechanically active, but they beat slowly and were not electrically coupled to the host at 4 weeks based on ex vivo fluorescent imaging of their graft-autonomous GCaMP3 calcium reporter. Histologically, scar tissue physically separated the patch graft and host myocardium. In contrast, following intramyocardial injection of micro-tissue particles and suspended cardiomyocytes, 100% of the grafts detected by fluorescent GCaMP3 imaging were electrically coupled to the host heart at spontaneous rate and could follow host pacing up to a maximum of 300-390 beats per minute (5-6.5 Hz. Gap junctions between intramyocardial graft and host tissue were identified histologically. The extensive coupling and rapid response rate of the human myocardial grafts after intramyocardial delivery suggest electrophysiological adaptation of hESC-derived cardiomyocytes to the rat heart's pacemaking activity. These data support the use of the rat model for studying electromechanical integration of human cardiomyocytes, and they

  19. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  20. DEVELOPMENT OF HUMAN FACTORS ENGINEERING GUIDANCE FOR SAFETY EVALUATIONS OF ADVANCED REACTORS

    International Nuclear Information System (INIS)

    O'HARA, J.; PERSENSKY, J.; SZABO, A.

    2006-01-01

    Advanced reactors are expected to be based on a concept of operations that is different from what is currently used in today's reactors. Therefore, regulatory staff may need new tools, developed from the best available technical bases, to support licensing evaluations. The areas in which new review guidance may be needed and the efforts underway to address the needs will be discussed. Our preliminary results focus on some of the technical issues to be addressed in three areas for which new guidance may be developed: automation and control, operations under degraded conditions, and new human factors engineering methods and tools

  1. Envisioning a Future Decision Support System for Requirements Engineering : A Holistic and Human-centred Perspective

    OpenAIRE

    Alenljung, Beatrice

    2008-01-01

    Complex decision-making is a prominent aspect of requirements engineering (RE) and the need for improved decision support for RE decision-makers has been identified by a number of authors in the research literature. The fundamental viewpoint that permeates this thesis is that RE decision-making can be substantially improved by RE decision support systems (REDSS) based on the actual needs of RE decision-makers as well as the actual generic human decision-making activities that take place in th...

  2. Human factors engineering applications in the testing of the legal weight truck cask transportation system

    International Nuclear Information System (INIS)

    Smith, T.C.; Peck, M. III; Sealock, R.A.

    1994-01-01

    The Department of Energy's Office of Civilian Radioactive Waste Management (OCRWM) will collect performance data to be used in limited human factors engineering analysis of the light weight tractor as a component of the legal weight truck cask transport system. The Management and Operating contractor will provide an analysis and comparison of limited data on driver behavior and subjective driver evaluations of the light weight tractor performance versus that of a heavier baseline tractor. A significant difference in performance data would suggest that given tractor configurations affect driver behavior differently

  3. Enabling Robotic Social Intelligence by Engineering Human Social-Cognitive Mechanisms

    DEFF Research Database (Denmark)

    Wiltshire, Travis; Warta, Samantha F.; Barber, Daniel

    2017-01-01

    for artificial cognitive systems. We discuss a recent integrative perspective of social cognition to provide a systematic theoretical underpinning for computational instantiations of these mechanisms. We highlight several commitments of our approach that we refer to as Engineering Human Social Cognition. We...... then provide a series of recommendations to facilitate the development of the perceptual, motor, and cognitive architecture for this proposed artificial cognitive system in future work. For each recommendation, we highlight their relation to the discussed social-cognitive mechanisms, provide the rationale...

  4. Education in Responsibility in Order to Secure Human Rights in Times of Crisis

    Directory of Open Access Journals (Sweden)

    Michaël Merrigan

    2014-05-01

    Full Text Available Education in and awareness about human rights is generally seen as one of the less contentious elements of citizenship education. However, it would seem that, for the concept of human rights to have a real impact in today's world, theoretical knowledge of human rights standards should be complemented by an understanding of the ethical concept of individual responsibility. This concept could, moreover, prove to be a valuable tool in conceiving creative answers to some of the consequences of the crisis Europe has been facing. This crisis has affected especially the protection and realisation of socio-economic rights, as many States were left with increasingly less budgetary space to meet increasingly urgent societal demands. Over the last few decades, and already prior to the current crisis, many have called for a greater stress on ‘duties and responsibilities’, as it was perceived that ‘rights-talk’ alone did not provide all the answers. From a legal perspective, as well as from the side of human rights advocacy groups, however, these appeals were often met with scepticism and hostility. In answer to the often justified criticism, it is essential to make a distinction between the ‘legal’, the ‘moral’ and the ‘ethical’ realms. While an unnuanced greater focus on moral duties is potentially dangerous, education based on the proposed notion of ethical ‘responsibility’ would seem, on the contrary, essential for the survival of human rights and, hence, of the democratic society.

  5. A Path to Planetary Protection Requirements for Human Exploration: A Literature Review and Systems Engineering Approach

    Science.gov (United States)

    Johnson, James E.; Conley, Cassie; Siegel, Bette

    2015-01-01

    As systems, technologies, and plans for the human exploration of Mars and other destinations beyond low Earth orbit begin to coalesce, it is imperative that frequent and early consideration is given to how planetary protection practices and policy will be upheld. While the development of formal planetary protection requirements for future human space systems and operations may still be a few years from fruition, guidance to appropriately influence mission and system design will be needed soon to avoid costly design and operational changes. The path to constructing such requirements is a journey that espouses key systems engineering practices of understanding shared goals, objectives and concerns, identifying key stakeholders, and iterating a draft requirement set to gain community consensus. This paper traces through each of these practices, beginning with a literature review of nearly three decades of publications addressing planetary protection concerns with respect to human exploration. Key goals, objectives and concerns, particularly with respect to notional requirements, required studies and research, and technology development needs have been compiled and categorized to provide a current 'state of knowledge'. This information, combined with the identification of key stakeholders in upholding planetary protection concerns for human missions, has yielded a draft requirement set that might feed future iteration among space system designers, exploration scientists, and the mission operations community. Combining the information collected with a proposed forward path will hopefully yield a mutually agreeable set of timely, verifiable, and practical requirements for human space exploration that will uphold international commitment to planetary protection.

  6. Human engineered heart tissue as a versatile tool in basic research and preclinical toxicology.

    Directory of Open Access Journals (Sweden)

    Sebastian Schaaf

    Full Text Available Human embryonic stem cell (hESC progenies hold great promise as surrogates for human primary cells, particularly if the latter are not available as in the case of cardiomyocytes. However, high content experimental platforms are lacking that allow the function of hESC-derived cardiomyocytes to be studied under relatively physiological and standardized conditions. Here we describe a simple and robust protocol for the generation of fibrin-based human engineered heart tissue (hEHT in a 24-well format using an unselected population of differentiated human embryonic stem cells containing 30-40% α-actinin-positive cardiac myocytes. Human EHTs started to show coherent contractions 5-10 days after casting, reached regular (mean 0.5 Hz and strong (mean 100 µN contractions for up to 8 weeks. They displayed a dense network of longitudinally oriented, interconnected and cross-striated cardiomyocytes. Spontaneous hEHT contractions were analyzed by automated video-optical recording and showed chronotropic responses to calcium and the β-adrenergic agonist isoprenaline. The proarrhythmic compounds E-4031, quinidine, procainamide, cisapride, and sertindole exerted robust, concentration-dependent and reversible decreases in relaxation velocity and irregular beating at concentrations that recapitulate findings in hERG channel assays. In conclusion this study establishes hEHT as a simple in vitro model for heart research.

  7. On recent advances in human engineering Provocative trends in embryology, genetics, and regenerative medicine.

    Science.gov (United States)

    Anton, Roman

    2016-01-01

    Advances in embryology, genetics, and regenerative medicine regularly attract attention from scientists, scholars, journalists, and policymakers, yet implications of these advances may be broader than commonly supposed. Laboratories culturing human embryos, editing human genes, and creating human-animal chimeras have been working along lines that are now becoming intertwined. Embryogenic methods are weaving traditional in vivo and in vitro distinctions into a new "in vivitro" (in life in glass) fabric. These and other methods known to be in use or thought to be in development promise soon to bring society to startling choices and discomfiting predicaments, all in a global effort to supply reliably rejuvenating stem cells, to grow immunologically non-provocative replacement organs, and to prevent, treat, cure, or even someday eradicate diseases having genetic or epigenetic mechanisms. With humanity's human-engineering era now begun, procedural prohibitions, funding restrictions, institutional controls, and transparency rules are proving ineffective, and business incentives are migrating into the most basic life-sciences inquiries, wherein lie huge biomedical potentials and bioethical risks. Rights, health, and heritage are coming into play with bioethical presumptions and formal protections urgently needing reassessment.

  8. In vivo delivery of recombinant human growth hormone from genetically engineered human fibroblasts implanted within Baxter immunoisolation devices.

    Science.gov (United States)

    Josephs, S F; Loudovaris, T; Dixit, A; Young, S K; Johnson, R C

    1999-01-01

    Continuous delivery of therapeutic peptide to the systemic circulation would be the optimal treatment for a variety of diseases. The Baxter TheraCyte system is a membrane encapsulation system developed for implantation of tissues, cells such as endocrine cells or cell lines genetically engineered for therapeutic peptide delivery in vivo. To demonstrate the utility of this system, cell lines were developed which expressed human growth hormone (hGH) at levels exceeding 1 microgram per million cells per day. These were loaded into devices which were then implanted into juvenile nude rats. Significant levels of hGH of up to 2.5 ng/ml were detected in plasma throughout the six month duration of the study. In contrast, animals implanted with free cells showed peak plasma levels of 0.5 to 1.2 ng four days after implantation with no detectable hGH beyond 10 days. Histological examination of explanted devices showed they were vascularized and contained cells that were viable and morphologically healthy. After removal of the implants, no hGH could be detected which confirmed that the source of hGH was from cells contained within the device. The long term expression of human growth hormone as a model peptide has implications for the peptide therapies for a variety of human diseases using membrane encapsulated cells.

  9. Towards an integrative post-2015 sustainable development goal framework: Focusing on global justice – peace, security and basic human rights

    Directory of Open Access Journals (Sweden)

    George R. Lueddeke

    2015-12-01

    To strengthen the likelihood of realizing the post-2015 Sustainable Development Goals (SDGs, particularly with regard to “planet and population” health and well-being , UN and other decision-makers are urged to consider the adoption of an integrated SDG framework that is based on (i a vision of global justice - underpinned by peace, security and basic human rights; (ii the development of interdependent and interconnected strategies for each of the eleven thematic indicators identified in the UN document The World We Want; and (iii the application of guiding principles to measure the impact of SDG strategies in terms of holism, equity, sustainability, ownership, and global obligation. While current discussions on the SDGs are making progress in a number of areas, the need for integration of these around a common global vision and purpose seems especially crucial to avoid MDG shortcomings.

  10. Human resources requirements for diabetic patients healthcare in primary care clinics of the Mexican Institute of Social Security

    Directory of Open Access Journals (Sweden)

    Svetlana V Doubova

    2013-11-01

    Full Text Available Objective. To estimate the requirements of human resources (HR of two models of care for diabetes patients: conventional and specific, also called DiabetIMSS, which are provided in primary care clinics of the Mexican Institute of Social Security (IMSS. Materials and methods. An evaluative research was conducted. An expert group identified the HR activities and time required to provide healthcare consistent with the best clinical practices for diabetic patients. HR were estimated by using the evidence-based adjusted service target approach for health workforce planning; then, comparisons between existing and estimated HRs were made. Results. To provide healthcare in accordance with the patients’ metabolic control, the conventional model required increasing the number of family doctors (1.2 times nutritionists (4.2 times and social workers (4.1 times. The DiabetIMSS model requires greater increase than the conventional model. Conclusions. Increasing HR is required to provide evidence-based healthcare to diabetes patients.

  11. Introduction of Human Factors Engineering Program Plan of a Research Reactor

    International Nuclear Information System (INIS)

    Jang, Tong Il; Lee, Hyun Chul

    2011-01-01

    KAERI (Korea Atomic Energy Research Institute) has a contract with Jordan to export a research and training reactor. KAERI is performing the project as an SD (System Design) and the design work has been performing by 8 design teams which include an Instrumentation and Control (I and C). A design of the MCR (Main Control Room) and the SCR (Supplementary Control Room) is being developed by the HFE design team which is a part of the I and C team. For the control room design considering the human factors principles, the HFE design team developed an HFEPP (Human Factors Engineering Program Plan) which should be established to meet regulatory requirements. In this study, the HFEPP for the JRTR (Jordan Research and Training Reactor) is introduced and the details are described

  12. Land security and the challenges of realizing the human right to water and sanitation in the slums of Mumbai, India.

    Science.gov (United States)

    Murthy, Sharmila L

    2012-12-15

    Addressing the human right to water and sanitation in the slums of Mumbai, India requires disentangling the provision of basic services from a more complicated set of questions around land security and land ownership. Millions of slum-dwellers in Mumbai lack adequate access to safe drinking water and sanitation, which places them at risk for waterborne diseases. Many slums are located in hazardous areas such as flood plains, increasing their susceptibility to climate change-related weather patterns. Access to water and sanitation in slums generally hinges on whether a dwelling was created prior to January 1, 1995, because those constructed created prior to that date have greater land security. Although the so-called "1995 cut-off rule" looms large in Mumbai slum policy, a closer reading of the relevant laws and regulations suggests that access to water and sanitation could be expanded to slums created after January 1, 1995. State and municipal governments already have the authority to expand access to water services; they just need to exercise their discretion. However, slums located on central government land are in a more difficult position. Central government agencies in Mumbai have often refused to allow the state and municipal governments to rehabilitate or improve access to services for slums located on their land. As a result, an argument could be made that by interfering with the efforts of sub-national actors to extend water and sanitation to services to slum-dwellers, the central government of India is violating its obligations to respect the human right to water and sanitation under international and national jurisprudence. Copyright © 2012 Murthy. This is an open access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/), which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original author and source are

  13. Martian Surface Boundary Layer Characterization: Enabling Environmental Data for Science, Engineering and Human Exploration

    Science.gov (United States)

    England, C.

    2000-01-01

    For human or large robotic exploration of Mars, engineering devices such as power sources will be utilized that interact closely with the Martian environment. Heat sources for power production, for example, will use the low ambient temperature for efficient heat rejection. The Martian ambient, however, is highly variable, and will have a first order influence on the efficiency and operation of all large-scale equipment. Diurnal changes in temperature, for example, can vary the theoretical efficiency of power production by 15% and affect the choice of equipment, working fluids, and operating parameters. As part of the Mars Exploration program, missions must acquire the environmental data needed for design, operation and maintenance of engineering equipment including the transportation devices. The information should focus on the variability of the environment, and on the differences among locations including latitudes, altitudes, and seasons. This paper outlines some of the WHY's, WHAT's and WHERE's of the needed data, as well as some examples of how this data will be used. Environmental data for engineering design should be considered a priority in Mars Exploration planning. The Mars Thermal Environment Radiator Characterization (MTERC), and Dust Accumulation and Removal Technology (DART) experiments planned for early Mars landers are examples of information needed for even small robotic missions. Large missions will require proportionately more accurate data that encompass larger samples of the Martian surface conditions. In achieving this goal, the Mars Exploration program will also acquire primary data needed for understanding Martian weather, surface evolution, and ground-atmosphere interrelationships.

  14. Optimization of human tendon tissue engineering: peracetic acid oxidation for enhanced reseeding of acellularized intrasynovial tendon.

    Science.gov (United States)

    Woon, Colin Y L; Pridgen, Brian C; Kraus, Armin; Bari, Sina; Pham, Hung; Chang, James

    2011-03-01

    Tissue engineering of human flexor tendons combines tendon scaffolds with recipient cells to create complete cell-tendon constructs. Allogenic acellularized human flexor tendon has been shown to be a useful natural scaffold. However, there is difficulty repopulating acellularized tendon with recipient cells, as cell penetration is restricted by a tightly woven tendon matrix. The authors evaluated peracetic acid treatment in optimizing intratendinous cell penetration. Cadaveric human flexor tendons were harvested, acellularized, and divided into experimental groups. These groups were treated with peracetic acid in varying concentrations (2%, 5%, and 10%) and for varying time periods (4 and 20 hours) to determine the optimal treatment protocol. Experimental tendons were analyzed for differences in tendon microarchitecture. Additional specimens were reseeded by incubation in a fibroblast cell suspension at 1 × 10(6) cells/ml. This group was then analyzed for reseeding efficacy. A final group underwent biomechanical studies for strength. The optimal treatment protocol comprising peracetic acid at 5% concentration for 4 hours produced increased scaffold porosity, improving cell penetration and migration. Treated scaffolds did not show reduced collagen or glycosaminoglycan content compared with controls (p = 0.37 and p = 0.65, respectively). Treated scaffolds were cytotoxic to neither attached cells nor the surrounding cell suspension. Treated scaffolds also did not show inferior ultimate tensile stress or elastic modulus compared with controls (p = 0.26 and p = 0.28, respectively). Peracetic acid treatment of acellularized tendon scaffolds increases matrix porosity, leading to greater reseeding. It may prove to be an important step in tissue engineering of human flexor tendon using natural scaffolds.

  15. Comparative Human Health Impact Assessment of Engineered Nanomaterials in the Framework of Life Cycle Assessment.

    Science.gov (United States)

    Fransman, Wouter; Buist, Harrie; Kuijpers, Eelco; Walser, Tobias; Meyer, David; Zondervan-van den Beuken, Esther; Westerhout, Joost; Klein Entink, Rinke H; Brouwer, Derk H

    2017-07-01

    For safe innovation, knowledge on potential human health impacts is essential. Ideally, these impacts are considered within a larger life-cycle-based context to support sustainable development of new applications and products. A methodological framework that accounts for human health impacts caused by inhalation of engineered nanomaterials (ENMs) in an indoor air environment has been previously developed. The objectives of this study are as follows: (i) evaluate the feasibility of applying the CF framework for NP exposure in the workplace based on currently available data; and (ii) supplement any resulting knowledge gaps with methods and data from the life cycle approach and human risk assessment (LICARA) project to develop a modified case-specific version of the framework that will enable near-term inclusion of NP human health impacts in life cycle assessment (LCA) using a case study involving nanoscale titanium dioxide (nanoTiO 2 ). The intent is to enhance typical LCA with elements of regulatory risk assessment, including its more detailed measure of uncertainty. The proof-of-principle demonstration of the framework highlighted the lack of available data for both the workplace emissions and human health effects of ENMs that is needed to calculate generalizable characterization factors using common human health impact assessment practices in LCA. The alternative approach of using intake fractions derived from workplace air concentration measurements and effect factors based on best-available toxicity data supported the current case-by-case approach for assessing the human health life cycle impacts of ENMs. Ultimately, the proposed framework and calculations demonstrate the potential utility of integrating elements of risk assessment with LCA for ENMs once the data are available. © 2016 Society for Risk Analysis.

  16. In Genes We Trust: Germline Engineering, Eugenics, and the Future of the Human Genome.

    Science.gov (United States)

    Powell, Russell

    2015-12-01

    Liberal proponents of genetic engineering maintain that developing human germline modification technologies is morally desirable because it will result in a net improvement in human health and well-being. Skeptics of germline modification, in contrast, fear evolutionary harms that could flow from intervening in the human germline, and worry that such programs, even if well intentioned, could lead to a recapitulation of the scientifically and morally discredited projects of the old eugenics. Some bioconservatives have appealed as well to the value of retaining our "given" human biological nature as a reason for restraining the development and use of human genetic modification technologies even where they would tend to increase well-being. In this article, I argue that germline intervention will be necessary merely to sustain the levels of genetic health that we presently enjoy for future generations-a goal that should appeal to bioliberals and bioconservatives alike. This is due to the population-genetic consequences of relaxed selection pressures in human populations caused by the increasing efficacy and availability of conventional medicine. This heterodox conclusion, which I present as a problem of intergenerational justice, has been overlooked in medicine and bioethics due to certain misconceptions about human evolution, which I attempt to rectify, as well as the sordid history of Darwinian approaches to medicine and social policy, which I distinguish from the present argument. © The Author 2015. Published by Oxford University Press, on behalf of the Journal of Medicine and Philosophy Inc. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  17. Women's Land Tenure Security and Household Human Capital: Evidence from Ethiopia's Land Certification.

    Science.gov (United States)

    Muchomba, Felix M

    2017-10-01

    This paper examines the impact of Ethiopia's gendered land certification programs on household consumption of healthcare, food, education, and clothing. Ethiopia embarked on a land tenure reform program in 1998, after years of communism during which all land was nationalized. The reform began in Tigray region where land certificates were issued to household heads, who were primarily male. In a second phase carried out in 2003-2005, three other regions issued land certificates jointly to household heads and spouses, presenting variation in land tenure security by gender. Results using household panel data show that joint land certification to spouses was accompanied by increased household consumption of healthcare and homegrown food and decreased education expenditure, compared to household-head land certification. Joint land certification was also accompanied by increased consumption of women's and girls' clothing, and decreased men's clothing expenditures indicating results may be explained by a shift in the gender balance of power within households. Analysis on the incidence and duration of illness indicates that increased healthcare expenditures after joint land certification may be due to joint certification households seeking more effective treatment than head-only certification households for household members who fell ill or suffered injuries.

  18. 3D Bioprinting Human Chondrocytes with Nanocellulose-Alginate Bioink for Cartilage Tissue Engineering Applications.

    Science.gov (United States)

    Markstedt, Kajsa; Mantas, Athanasios; Tournier, Ivan; Martínez Ávila, Héctor; Hägg, Daniel; Gatenholm, Paul

    2015-05-11

    The introduction of 3D bioprinting is expected to revolutionize the field of tissue engineering and regenerative medicine. The 3D bioprinter is able to dispense materials while moving in X, Y, and Z directions, which enables the engineering of complex structures from the bottom up. In this study, a bioink that combines the outstanding shear thinning properties of nanofibrillated cellulose (NFC) with the fast cross-linking ability of alginate was formulated for the 3D bioprinting of living soft tissue with cells. Printability was evaluated with concern to printer parameters and shape fidelity. The shear thinning behavior of the tested bioinks enabled printing of both 2D gridlike structures as well as 3D constructs. Furthermore, anatomically shaped cartilage structures, such as a human ear and sheep meniscus, were 3D printed using MRI and CT images as blueprints. Human chondrocytes bioprinted in the noncytotoxic, nanocellulose-based bioink exhibited a cell viability of 73% and 86% after 1 and 7 days of 3D culture, respectively. On the basis of these results, we can conclude that the nanocellulose-based bioink is a suitable hydrogel for 3D bioprinting with living cells. This study demonstrates the potential use of nanocellulose for 3D bioprinting of living tissues and organs.

  19. Human umbilical cord mesenchymal stem cells: osteogenesis in vivo as seed cells for bone tissue engineering.

    Science.gov (United States)

    Diao, Yinze; Ma, Qingjun; Cui, Fuzhai; Zhong, Yanfeng

    2009-10-01

    Mesenchymal stem cells (MSCs) are ideal seed cells for bone tissue engineering. However, intrinsic deficiencies exist for the autologous transplantation strategy of constructing artificial bone with MSCs derived from bone marrow of patients. In this study, MSCs-like cells were isolated from human umbilical cords and were expanded in vitro. Flow cytometric analysis revealed that cells from the fourth passage were positive for CD29, CD44, CD71, CD73, CD90, and CD105 whereas they were negative for CD14, CD34, CD45, and CD117. Furthermore, these cells expressed HLA-A, B, C (MHC-I), but not HLA-DP, DQ, DR (MHC-II), or costimulatory molecules such as CD80 and CD86. Following incubation in specific inductive media for 3 weeks, cultured cells were shown to possess potential to differentiate into adipogenic, osteogenic or chondrogenic lineages in vitro. The umbilical cord-derived MSCs (UC-MSCs) were loaded with a biomimetic artificial bone scaffold material before being implanted subcutaneously in the back of Balb/c nude mice for four to twelve weeks. Our results revealed that UC-MSCs loaded with the scaffold displayed capacity of osteogenic differentiation leading to osteogenesis with human origin in vivo. As a readily available source of seed cells for bone tissue engineering, UC-MSCs should have broad application prospects.

  20. Defined Engineered Human Myocardium with Advanced Maturation for Applications in Heart Failure Modelling and Repair

    Science.gov (United States)

    Tiburcy, Malte; Hudson, James E.; Balfanz, Paul; Schlick, Susanne; Meyer, Tim; Liao, Mei-Ling Chang; Levent, Elif; Raad, Farah; Zeidler, Sebastian; Wingender, Edgar; Riegler, Johannes; Wang, Mouer; Gold, Joseph D.; Kehat, Izhak; Wettwer, Erich; Ravens, Ursula; Dierickx, Pieterjan; van Laake, Linda W.; Goumans, Marie Jose; Khadjeh, Sara; Toischer, Karl; Hasenfuss, Gerd; Couture, Larry A.; Unger, Andreas; Linke, Wolfgang A.; Araki, Toshiyuki; Neel, Benjamin; Keller, Gordon; Gepstein, Lior; Wu, Joseph C.; Zimmermann, Wolfram-Hubertus

    2017-01-01

    Background Advancing structural and functional maturation of stem cell-derived cardiomyocytes remains a key challenge for applications in disease modelling, drug screening, and heart repair. Here, we sought to advance cardiomyocyte maturation in engineered human myocardium (EHM) towards an adult phenotype under defined conditions. Methods We systematically investigated cell composition, matrix and media conditions to generate EHM from embryonic and induced pluripotent stem cell-derived cardiomyocytes and fibroblasts with organotypic functionality under serum-free conditions. We employed morphological, functional, and transcriptome analyses to benchmark maturation of EHM. Results EHM demonstrated important structural and functional properties of postnatal myocardium, including: (1) rod-shaped cardiomyocytes with M-bands assembled as a functional syncytium; (2) systolic twitch forces at a similar level as observed in bona fide postnatal myocardium; (3) a positive force-frequency-response; (4) inotropic responses to β-adrenergic stimulation mediated via canonical β1- and β2-adrenoceptor signaling pathways; and (5) evidence for advanced molecular maturation by transcriptome profiling. EHM responded to chronic catecholamine toxicity with contractile dysfunction, cardiomyocyte hypertrophy, cardiomyocyte death, and NT-proBNP release; all are classical hallmarks of heart failure. Additionally, we demonstrate scalability of EHM according to anticipated clinical demands for cardiac repair. Conclusions We provide proof-of-concept for a universally applicable technology for the engineering of macro-scale human myocardium for disease modelling and heart repair from embryonic and induced pluripotent stem cell-derived cardiomyocytes under defined, serum-free conditions. PMID:28167635

  1. Defined Engineered Human Myocardium With Advanced Maturation for Applications in Heart Failure Modeling and Repair.

    Science.gov (United States)

    Tiburcy, Malte; Hudson, James E; Balfanz, Paul; Schlick, Susanne; Meyer, Tim; Chang Liao, Mei-Ling; Levent, Elif; Raad, Farah; Zeidler, Sebastian; Wingender, Edgar; Riegler, Johannes; Wang, Mouer; Gold, Joseph D; Kehat, Izhak; Wettwer, Erich; Ravens, Ursula; Dierickx, Pieterjan; van Laake, Linda W; Goumans, Marie Jose; Khadjeh, Sara; Toischer, Karl; Hasenfuss, Gerd; Couture, Larry A; Unger, Andreas; Linke, Wolfgang A; Araki, Toshiyuki; Neel, Benjamin; Keller, Gordon; Gepstein, Lior; Wu, Joseph C; Zimmermann, Wolfram-Hubertus

    2017-05-09

    Advancing structural and functional maturation of stem cell-derived cardiomyocytes remains a key challenge for applications in disease modeling, drug screening, and heart repair. Here, we sought to advance cardiomyocyte maturation in engineered human myocardium (EHM) toward an adult phenotype under defined conditions. We systematically investigated cell composition, matrix, and media conditions to generate EHM from embryonic and induced pluripotent stem cell-derived cardiomyocytes and fibroblasts with organotypic functionality under serum-free conditions. We used morphological, functional, and transcriptome analyses to benchmark maturation of EHM. EHM demonstrated important structural and functional properties of postnatal myocardium, including: (1) rod-shaped cardiomyocytes with M bands assembled as a functional syncytium; (2) systolic twitch forces at a similar level as observed in bona fide postnatal myocardium; (3) a positive force-frequency response; (4) inotropic responses to β-adrenergic stimulation mediated via canonical β 1 - and β 2 -adrenoceptor signaling pathways; and (5) evidence for advanced molecular maturation by transcriptome profiling. EHM responded to chronic catecholamine toxicity with contractile dysfunction, cardiomyocyte hypertrophy, cardiomyocyte death, and N-terminal pro B-type natriuretic peptide release; all are classical hallmarks of heart failure. In addition, we demonstrate the scalability of EHM according to anticipated clinical demands for cardiac repair. We provide proof-of-concept for a universally applicable technology for the engineering of macroscale human myocardium for disease modeling and heart repair from embryonic and induced pluripotent stem cell-derived cardiomyocytes under defined, serum-free conditions. © 2017 American Heart Association, Inc.

  2. Advanced human-system interface design review guideline. Evaluation procedures and guidelines for human factors engineering reviews

    International Nuclear Information System (INIS)

    O'Hara, J.M.; Brown, W.S.; Baker, C.C.; Welch, D.L.; Granda, T.M.; Vingelis, P.J.

    1994-07-01

    Advanced control rooms will use advanced human-system interface (HSI) technologies that may have significant implications for plant safety in that they will affect the operator's overall role in the system, the method of information presentation, and the ways in which operators interact with the system. The U.S. Nuclear Regulatory Commission (NRC) reviews the HSI aspects of control rooms to ensure that they are designed to good human factors engineering principles and that operator performance and reliability are appropriately supported to protect public health and safety. The principal guidance available to the NRC, however, was developed more than ten years ago, well before these technological changes. Accordingly, the human factors guidance needs to be updated to serve as the basis for NRC review of these advanced designs. The purpose of this project was to develop a general approach to advanced HSI review and the human factors guidelines to support. NRC safety reviews of advanced systems. This two-volume report provides the results of the project. Volume I describes the development of the Advanced HSI Design Review Guideline (DRG) including (1) its theoretical and technical foundation, (2) a general model for the review of advanced HSIs, (3) guideline development in both hard-copy and computer-based versions, and (4) the tests and evaluations performed to develop and validate the DRG. Volume I also includes a discussion of the gaps in available guidance and a methodology for addressing them. Volume 2 provides the guidelines to be used for advanced HSI review and the procedures for their use

  3. Advanced human-system interface design review guideline. Evaluation procedures and guidelines for human factors engineering reviews

    Energy Technology Data Exchange (ETDEWEB)

    O`Hara, J.M.; Brown, W.S. [Brookhaven National Lab., Upton, NY (United States); Baker, C.C.; Welch, D.L.; Granda, T.M.; Vingelis, P.J. [Carlow International Inc., Falls Church, VA (United States)

    1994-07-01

    Advanced control rooms will use advanced human-system interface (HSI) technologies that may have significant implications for plant safety in that they will affect the operator`s overall role in the system, the method of information presentation, and the ways in which operators interact with the system. The U.S. Nuclear Regulatory Commission (NRC) reviews the HSI aspects of control rooms to ensure that they are designed to good human factors engineering principles and that operator performance and reliability are appropriately supported to protect public health and safety. The principal guidance available to the NRC, however, was developed more than ten years ago, well before these technological changes. Accordingly, the human factors guidance needs to be updated to serve as the basis for NRC review of these advanced designs. The purpose of this project was to develop a general approach to advanced HSI review and the human factors guidelines to support. NRC safety reviews of advanced systems. This two-volume report provides the results of the project. Volume I describes the development of the Advanced HSI Design Review Guideline (DRG) including (1) its theoretical and technical foundation, (2) a general model for the review of advanced HSIs, (3) guideline development in both hard-copy and computer-based versions, and (4) the tests and evaluations performed to develop and validate the DRG. Volume I also includes a discussion of the gaps in available guidance and a methodology for addressing them. Volume 2 provides the guidelines to be used for advanced HSI review and the procedures for their use.

  4. Chondroprotective supplementation promotes the mechanical properties of injectable scaffold for human nucleus pulposus tissue engineering.

    Science.gov (United States)

    Foss, Berit L; Maxwell, Thomas W; Deng, Ying

    2014-01-01

    A result of intervertebral disc (IVD) degeneration, the nucleus pulposus (NP) is no longer able to withstand applied load leading to pain and disability. The objective of this study is to fabricate a tissue-engineered injectable scaffold with chondroprotective supplementation in vitro to improve the mechanical properties of a degenerative NP. Tissue-engineered scaffolds were fabricated using different concentrations of alginate and calcium chloride and mechanically evaluated. Fabrication conditions were based on structural and mechanical resemblance to the native NP. Chondroprotective supplementation, glucosamine (GCSN) and chondroitin sulfate (CS), were added to scaffolds at concentrations of 0:0µg/mL (0:0-S), 125:100µg/mL (125:100-S), 250:200µg/mL (250:200-S), and 500:400µg/mL (500:400-S), GCSN and CS, respectively. Scaffolds were used to fabricate tissue-engineered constructs through encapsulation of human nucleus pulposus cells (HNPCs). The tissue-engineered constructs were collected at days 1, 14, and 28 for biochemical and biomechanical evaluations. Confocal microscopy showed HNPC viability and rounded morphology over the 28 day period. MTT analysis resulted in significant increases in cell proliferation for each group. Collagen type II ELISA quantification and compressive aggregate moduli (HA) showed increasing trends for both 250:200-S and the 500:400-S groups on Day 28 with significantly greater HA compared to 0:0-S group. Glycosaminoglycan and water content decreased for all groups. Results indicate the increased mechanical properties of the 250:200-S and the 500:400-S was due to production of a functional matrix. This study demonstrated potential for a chondroprotective supplemented injectable scaffold to restore biomechanical function of a degenerative disc through the production of a mechanically functional matrix. Copyright © 2013 Elsevier Ltd. All rights reserved.

  5. Human-factors engineering control-room design review/audit report: Byron Generating Station, Commonwealth Edison Company

    International Nuclear Information System (INIS)

    Savage, J.W.

    1983-01-01

    A human factors engineering design review/audit of the Byron Unit 1 control room was performed at the site on November 17 through November 19, 1981. This review was accomplished using the Unit 2 control room appropriately mocked-up to reflect design changes already committed to be incorporated in Unit 1. The report was prepared on the basis of the HFEB's audit of the applicant's Preliminary Design Assessment report and the human factors engineering design review performed at the site. This design review was carried out by a team from the Human Factors Engineering Branch, Division of Human Factors Safety. The review team was assisted by consultants from BioTechnology, Inc. (Falls Church, Virginia), and from Lawrence Livermore National Laboratory (University of California), Livermore, California

  6. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  7. Ebola's Revelations — A Threefold Human Security Analysis of Liberia & Its Peacebuilding Efforts

    DEFF Research Database (Denmark)

    Ammann, Theresa

    2015-01-01

    enhanced local ownership of the peacebuilding process; and (5) a more accurate reflection of lived, social realities. The article shows the applicability of this compass at the example of Liberia where it manifests that human insecurity prevails in Liberia and consequently, peacebuilding failed...... has failed to establish sustainable peace. The withdrawal of UNMIL and the 2017 elections will show how stable Liberian peace truly is. In the end, the voices of the people should prevail....

  8. Human osteoblast cells: isolation, characterization, and growth on polymers for musculoskeletal tissue engineering.

    Science.gov (United States)

    El-Amin, Saadiq F; Botchwey, Edward; Tuli, Richard; Kofron, Michelle D; Mesfin, Addisu; Sethuraman, Swaminathan; Tuan, Rocky S; Laurencin, Cato T

    2006-03-01

    We performed a detailed examination of the isolation, characterization, and growth of human osteoblast cells derived from trabecular bone. We further examined the morphology, phenotypic gene expression, mineralization,and growth of these human osteoblasts on polyester polymers used for musculoskeletal tissue engineering. Polylactic-co-glycolic acid [PLAGA (85:15, 50:50, 75:25)], and poly-lactic acid (L-PLA, D,L-PLA) were examined. The osteoblastic expression of key phenotypic markers osteocalcin, alkaline phosphatase, collagen, and bone sialoprotein at 4 and 8 weeks was examined. Reverse transcription-polymerase chain reaction studies revealed that trabecular-derived osteoblasts were positive for all markers evaluated with higher levels expressed over long-term culture. These cells also revealed mineralization and maturation as evidenced by energy dispersive X-ray analysis and scanning electron microscopy. Growth studies on PLAGA at 50:50,75:25, and 85:15 ratios and PLA in the L and DL isoforms revealed that human osteoblasts actively grew, with significantly higher cell numbers attached to scaffolds composed of PLAGA 50:50 in the short term and PLAGA 85:15 in the long term compared with PLA (p < 0.05). We believe human cell adhesion among these polymeric materials may be dependent on differences in cellular integrin expression and extracellular matrix protein elaboration. (c) 2005 Wiley Periodicals, Inc.

  9. Human factors engineering applied to Control Centre Design of a research nuclear reactor

    Energy Technology Data Exchange (ETDEWEB)

    Farias, Larissa P. de; Santos, Isaac J.A. Luquetti dos; Carvalho, Paulo V.R., E-mail: larissapfarias@ymail.com [Instituto de Engenharia Nuclear (DENN/SEESC/IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil). Lab, de Usabilidade e Confiabilidade Humana; Monteiro, Beany G. [Universidade Federal do Rio Janeiro (UFRJ), Rio Janeiro, RJ (Brazil). Departamento de Desenho Industrial

    2017-07-01

    The Human Factors Engineering (HFE) program is an essential aspect for the design of nuclear installations. The overall aim of the HFE program is the improvement of the operational reliability and safety of plant operation. The HFE program main purpose is to ensure that human factor practices are incorporated into the plant design, emphasizing man-machine interface issues and design improvement of the nuclear reactor Control Centre. The Control Centre of nuclear reactor is a combination of control rooms, control suites and local control stations, which are functionally connected and located on the reactor site. The objective of this paper is to present a design approach for the Control Centre of a nuclear reactor used to produce radioisotopes and for nuclear research, including human factor issues. The design approach is based on participatory design principles, using human factor standards, ergonomic guidelines, and the participation of a multidisciplinary team during all design phases. Using the information gathered, an initial sketch 3D of the Control Centre was developed. (author)

  10. Heart research advances using database search engines, Human Protein Atlas and the Sydney Heart Bank.

    Science.gov (United States)

    Li, Amy; Estigoy, Colleen; Raftery, Mark; Cameron, Darryl; Odeberg, Jacob; Pontén, Fredrik; Lal, Sean; Dos Remedios, Cristobal G

    2013-10-01

    This Methodological Review is intended as a guide for research students who may have just discovered a human "novel" cardiac protein, but it may also help hard-pressed reviewers of journal submissions on a "novel" protein reported in an animal model of human heart failure. Whether you are an expert or not, you may know little or nothing about this particular protein of interest. In this review we provide a strategic guide on how to proceed. We ask: How do you discover what has been published (even in an abstract or research report) about this protein? Everyone knows how to undertake literature searches using PubMed and Medline but these are usually encyclopaedic, often producing long lists of papers, most of which are either irrelevant or only vaguely relevant to your query. Relatively few will be aware of more advanced search engines such as Google Scholar and even fewer will know about Quertle. Next, we provide a strategy for discovering if your "novel" protein is expressed in the normal, healthy human heart, and if it is, we show you how to investigate its subcellular location. This can usually be achieved by visiting the website "Human Protein Atlas" without doing a single experiment. Finally, we provide a pathway to discovering if your protein of interest changes its expression level with heart failure/disease or with ageing. Crown Copyright © 2013. Published by Elsevier B.V. All rights reserved.

  11. Human factors engineering applied to Control Centre Design of a research nuclear reactor

    International Nuclear Information System (INIS)

    Farias, Larissa P. de; Santos, Isaac J.A. Luquetti dos; Carvalho, Paulo V.R.; Monteiro, Beany G.

    2017-01-01

    The Human Factors Engineering (HFE) program is an essential aspect for the design of nuclear installations. The overall aim of the HFE program is the improvement of the operational reliability and safety of plant operation. The HFE program main purpose is to ensure that human factor practices are incorporated into the plant design, emphasizing man-machine interface issues and design improvement of the nuclear reactor Control Centre. The Control Centre of nuclear reactor is a combination of control rooms, control suites and local control stations, which are functionally connected and located on the reactor site. The objective of this paper is to present a design approach for the Control Centre of a nuclear reactor used to produce radioisotopes and for nuclear research, including human factor issues. The design approach is based on participatory design principles, using human factor standards, ergonomic guidelines, and the participation of a multidisciplinary team during all design phases. Using the information gathered, an initial sketch 3D of the Control Centre was developed. (author)

  12. Physiology of SLC12 transporters: lessons from inherited human genetic mutations and genetically engineered mouse knockouts.

    Science.gov (United States)

    Gagnon, Kenneth B; Delpire, Eric

    2013-04-15

    Among the over 300 members of the solute carrier (SLC) group of integral plasma membrane transport proteins are the nine electroneutral cation-chloride cotransporters belonging to the SLC12 gene family. Seven of these transporters have been functionally described as coupling the electrically silent movement of chloride with sodium and/or potassium. Although in silico analysis has identified two additional SLC12 family members, no physiological role has been ascribed to the proteins encoded by either the SLC12A8 or the SLC12A9 genes. Evolutionary conservation of this gene family from protists to humans confirms their importance. A wealth of physiological, immunohistochemical, and biochemical studies have revealed a great deal of information regarding the importance of this gene family to human health and disease. The sequencing of the human genome has provided investigators with the capability to link several human diseases with mutations in the genes encoding these plasma membrane proteins. The availability of bacterial artificial chromosomes, recombination engineering techniques, and the mouse genome sequence has simplified the creation of targeting constructs to manipulate the expression/function of these cation-chloride cotransporters in the mouse in an attempt to recapitulate some of these human pathologies. This review will summarize the three human disorders that have been linked to the mutation/dysfunction of the Na-Cl, Na-K-2Cl, and K-Cl cotransporters (i.e., Bartter's, Gitleman's, and Andermann's syndromes), examine some additional pathologies arising from genetically modified mouse models of these cotransporters including deafness, blood pressure, hyperexcitability, and epithelial transport deficit phenotypes.

  13. Functional characterisation of an engineered multidomain human P450 2E1 by molecular Lego.

    Science.gov (United States)

    Fairhead, Michael; Giannini, Silva; Gillam, Elizabeth M J; Gilardi, Gianfranco

    2005-12-01

    The human cytochrome P450s constitute an important family of monooxygenase enzymes that carry out essential roles in the metabolism of endogenous compounds and foreign chemicals. We present here results of a fusion between a human P450 enzyme and a bacterial reductase that for the first time is shown does not require the addition of lipids or detergents to achieve wild-type-like activities. The fusion enzyme, P450 2E1-BMR, contains the N-terminally modified residues 22-493 of the human P450 2E1 fused at the C-terminus to residues 473-1049 of the P450 BM3 reductase (BMR). The P450 2E1-BMR enzyme is active, self-sufficient and presents the typical marker activities of the native human P450 2E1: the hydroxylation of p-nitrophenol (KM=1.84+/-0.09 mM and kcat of 2.98+/-0.04 nmol of p-nitrocatechol formed per minute per nanomole of P450) and chlorzoxazone (KM=0.65+/-0.08 mM and kcat of 0.95+/-0.10 nmol of 6-hydroxychlorzoxazone formed per minute per nanomole of P450). A 3D model of human P450 2E1 was generated to rationalise the functional data and to allow an analysis of the surface potentials. The distribution of charges on the model of P450 2E1 compared with that of the FMN domain of BMR provides the ground for the understanding of the interaction between the fused domains. The results point the way to successfully engineer a variety of catalytically self-sufficient human P450 enzymes for drug metabolism studies in solution.

  14. Human factors engineering control-room-design review/audit report: Palo Verde Nuclear Generating Station, Arizona Public Service Company

    International Nuclear Information System (INIS)

    Savage, J.W.; Lappa, D.A.

    1981-01-01

    A human factors engineering design review of the Palo Verde control room simulator was performed at the site on September 15 through September 17, 1981. Observed human factors design discrepancies were given priority ratings. This report summarizes the team's observations of the control room design and layout and of the control room operators' interface with the control room environment. A list of the human factors strengths observed in the Palo Verde control room simulator is given

  15. A Practical Method ‘Discussion using Matrix Diagram’ , ConnectingHuman Base-Liberal-and Engineering Base-Professional-

    Science.gov (United States)

    Shimada, Wataru

    In order to bring up talented people, it is a most important subject how to awake ‘Emotional Human Power’ , which is the origin of Autonomy and Creativity. A Practical Method ‘Discussion using Matrix Diagram’ developed for improving ‘Emotional Human Power’ including ‘Communication Skill’ , is confirmed to be useful for connecting Human Base-Liberal-and Engineering Base-Professional-.

  16. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  17. Security, development and human rights: normative, legal and policy challenges for the international drug control system.

    Science.gov (United States)

    Barrett, Damon

    2010-03-01

    This commentary addresses some of the challenges posed by the broader normative, legal and policy framework of the United Nations for the international drug control system. The 'purposes and principles' of the United Nations are presented and set against the threat based rhetoric of the drug control system and the negative consequences of that system. Some of the challenges posed by human rights law and norms to the international drug control system are also described, and the need for an impact assessment of the current system alongside alternative policy options is highlighted as a necessary consequence of these analyses. Copyright (c) 2010 Elsevier B.V. All rights reserved.

  18. Human-factors engineering control-room design review/audit: Waterford 3 SES Generating Station, Louisiana Power and Light Company

    International Nuclear Information System (INIS)

    Savage, J.W.

    1983-01-01

    A human factors engineering design review/audit of the Waterford-3 control room was performed at the site on May 10 through May 13, 1982. The report was prepared on the basis of the HFEB's review of the applicant's Preliminary Human Engineering Discrepancy (PHED) report and the human factors engineering design review performed at the site. This design review was carried out by a team from the Human Factors Engineering Branch, Division of Human Factors Safety. The review team was assisted by consultants from Lawrence Livermore National Laboratory (University of California), Livermore, California

  19. The globalization of insecurity: how the international economic order undermines human and national security on a world scale

    Directory of Open Access Journals (Sweden)

    Nafeez Mosaddeq Ahmed

    2009-03-01

    Full Text Available La seguridad nacional y humana ha sido fundamentalmente subestimada por políticas promovidas por instituciones claves de la globalización. La adopción de una conceptualización estato-céntrica de la seguridad demuestra cómo la globalización debilita y fragmenta el Estado, mientras militariza a los actores estatales y subestatales, contribuyendo sistemáticamente  a la emergencia de conflictos inter e intra-estatales. Un paradigma centrado en lo humano, que se focalise en el impacto de la globalización sobre los individuos y comunidades, muestra que este proceso esá vinculado con la generación de violencia estructural a lo largo de fronteras nacionales. Ambos niveles de procesos -el nacional y el humano- son mutualmente interdependientes e impactan el uno en el otro de forma recíproca. De aquí que la economía capitalista mundial ha creado un fenómeno que puede ser claramente descrito como la globalización de la inseguridad, generando en primera instancia conflicto y consecuentemente desestabilizando  naciones y comunidades, y en segundo lugar empobrecimiento, enfermedad y marginación. ________________ABSTRACT:National and human security has been fundamentally undermined by policies promoted by the key institutions of globalization. Adopting a state-centred conceptualization of security demonstrates how globalization at once weakens and fragments the state, while militarizing both the state and sub-state actors, contributing systematically to the emergence of intra- and inter-state conflicts. A human-centred framework, however, focusing on the impact of globalization on individuals and communities, shows that this process is further linked to the generation of structural violence across national boundaries. Both these national -and human- level processes are mutually interdependent and impact on one another reciprocally. Hence, the world capitalist economy has created a phenomenon that can be accurately described as the

  20. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.