WorldWideScience

Sample records for intrinsically secure fast

  1. Intrinsically secure fast reactors with dense cores

    International Nuclear Information System (INIS)

    Slessarev, Igor

    2007-01-01

    Secure safety, resistance to weapons material proliferation and problems of long-lived wastes remain the most important 'painful points' of nuclear power. Many innovative reactor concepts have been developed aimed at a radical enhancement of safety. The promising potential of innovative nuclear reactors allows for shifting accents in current reactor safety 'strategy' to reveal this worth. Such strategy is elaborated focusing on the priority for intrinsically secure safety features as well as on sure protection being provided by the first barrier of defence. Concerning the potential of fast reactors (i.e. sodium cooled, lead-cooled, etc.), there are no doubts that they are able to possess many favourable intrinsically secure safety features and to lay the proper foundation for a new reactor generation. However, some of their neutronic characteristics have to be radically improved. Among intrinsically secure safety properties, the following core parameters are significantly important: reactivity margin values, reactivity feed-back and coolant void effects. Ways of designing intrinsically secure safety features in fast reactors (titled hereafter as Intrinsically Secure Fast Reactors - ISFR) can be found in the frame of current reactor technologies by radical enhancement of core neutron economy and by optimization of core compositions. Simultaneously, respecting resistance to proliferation, by using non-enriched fuel feed as well as a core breeding gain close to zero, are considered as the important features (long-lived waste problems will be considered in a separate paper). This implies using the following reactor design options as well as closed fuel cycles with natural U as the reactor feed: ·Ultra-plate 'dense cores' of the ordinary (monolithic) type with negative total coolant void effects. ·Modular type cores. Multiple dense modules can be embedded in the common reflector for achieving the desired NPP total power. The modules can be used also independently (as

  2. Intrinsically secure fast reactors for long-lived waste free and proliferation resistant nuclear power

    International Nuclear Information System (INIS)

    Slessarev, Igor

    2008-01-01

    This paper provides description of a nuclear reactor concept aimed towards a radical safety enhancement, an increased proliferation resistance, as well as a realisation of a 'long-lived waste free' NP development. It emphasizes the achievement of considerable reduction ('by design') of residual actinides in the waste streams and of the most hazardous long-lived fission products. It allows to implement only small volume of repositories for the radioactive waste (mostly fission products) and to postpone the technically arduous problems of a large scale disposal of the long-lived wastes until the next millennium, i.e. up to the exhaustion of the fertile natural resources and/or the emergence of more effective technologies of nuclide separation/transmutation. A thorough incineration/transmutation of the wastes (residual actinides in the mixture with lanthanides as well as of the most hazardous fission products) under reactor neutron flux is proposed for their mass reduction. A gradual growth of NP park is necessary for increasing the NP park capacity for waste irradiation. This 'constraint' is not really limiting because it coincides with the permanently growing demands in energy production. The potential of long-lived waste reduction depends on the total fertile fuel resources and on NP growth rate. It was shown that the accumulated actinide long-lived radioactive masses will be reduced significantly: by factor in the range of 10 4 -10 8 in magnitude (compared with LWR once-through cycle) and by 10 2 -10 6 (compared with the ordinary fast reactor park). Thus, the total long-lived waste toxicity pollution source might be comparable with the 'burnt away' toxicity of the natural fertile feed stream. This is quite realistic taking into account the large fertile fuel (U/Th) world-wide resources which provide the NP growth for a sustained time. Along side with the radical intrinsic safety improvement, a further enhancement of core physics ('neutronics') is one of the

  3. Towards hardware-intrinsic security foundations and practice

    CERN Document Server

    Sadeghi, Ahmad-Reza; Tuyls, Pim

    2010-01-01

    Hardware-intrinsic security is a young field dealing with secure secret key storage. This book features contributions from researchers and practitioners with backgrounds in physics, mathematics, cryptography, coding theory and processor theory.

  4. Enhancing MISP with Fast Mobile IPv6 Security

    Directory of Open Access Journals (Sweden)

    Ilsun You

    2011-01-01

    Full Text Available The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction with an authentication server that is required for every authentication is considered as a delay factor during handovers. In this paper, we present an improvement of MISP that utilizes the fast handover approach of Fast Mobile IPv6 and minimizes an involvement of the authentication server while eliminating identified security drawbacks of MISP. The formal security analysis is performed to verify the correctness of the proposed scheme. Moreover, the handover performance of the proposed scheme is compared with an existing scheme.

  5. Intrinsic information Security: Embedding security issues in the design process of telematics systems

    NARCIS (Netherlands)

    Tettero, Olaf; Tettero, O.

    This book presents a systematic approach to embed information security issues in the design process of telematics systems. The approach supports both designers and user organisations. We elaborate on the activities that designers should perform to design telematics systems in which information

  6. Fast hydrogen exchange affects 15N relaxation measurements in intrinsically disordered proteins

    International Nuclear Information System (INIS)

    Kim, Seho; Wu, Kuen-Phon; Baum, Jean

    2013-01-01

    Unprotected amide protons can undergo fast hydrogen exchange (HX) with protons from the solvent. Generally, NMR experiments using the out-and-back coherence transfer with amide proton detection are affected by fast HX and result in reduced signal intensity. When one of these experiments, 1 H– 15 N HSQC, is used to measure the 15 N transverse relaxation rate (R 2 ), the measured R 2 rate is convoluted with the HX rate (k HX ) and has higher apparent R 2 values. Since the 15 N R 2 measurement is important for analyzing protein backbone dynamics, the HX effect on the R 2 measurement is investigated and described here by multi-exponential signal decay. We demonstrate these effects by performing 15 N R 2 CPMG experiments on α-synuclein, an intrinsically disordered protein, in which the amide protons are exposed to solvent. We show that the HX effect on R 2 CPMG can be extracted by the derived equation. In conclusion, the HX effect may be pulse sequence specific and results from various sources including the J coupling evolution, the change of steady state water proton magnetization, and the D 2 O content in the sample. To avoid the HX effect on the analysis of relaxation data of unprotected amides, it is suggested that NMR experimental conditions insensitive to the HX should be considered or that intrinsic R 2 CPMG values be obtained by methods described herein.

  7. Live-cell super-resolution imaging of intrinsically fast moving flagellates

    Science.gov (United States)

    Glogger, M.; Stichler, S.; Subota, I.; Bertlein, S.; Spindler, M.-C.; Teßmar, J.; Groll, J.; Engstler, M.; Fenz, S. F.

    2017-02-01

    Recent developments in super-resolution microscopy make it possible to resolve structures in biological cells at a spatial resolution of a few nm and observe dynamical processes with a temporal resolution of ms to μs. However, the optimal structural resolution requires repeated illumination cycles and is thus limited to chemically fixed cells. For live cell applications substantial improvement over classical Abbe-limited imaging can already be obtained in adherent or slow moving cells. Nonetheless, a large group of cells are fast moving and thus could not yet be addressed with live cell super-resolution microscopy. These include flagellate pathogens like African trypanosomes, the causative agents of sleeping sickness in humans and nagana in livestock. Here, we present an embedding method based on a in situ forming cytocompatible UV-crosslinked hydrogel. The fast cross-linking hydrogel immobilizes trypanosomes efficiently to allow microscopy on the nanoscale. We characterized both the trypanosomes and the hydrogel with respect to their autofluorescence properties and found them suitable for single-molecule fluorescence microscopy (SMFM). As a proof of principle, SMFM was applied to super-resolve a structure inside the living trypanosome. We present an image of a flagellar axoneme component recorded by using the intrinsic blinking behavior of eYFP. , which features invited work from the best early-career researchers working within the scope of J Phys D. This project is part of the Journal of Physics series’ 50th anniversary celebrations in 2017. Susanne Fenz was selected by the Editorial Board of J Phys D as an Emerging Talent/Leader.

  8. He-4 fast neutron detectors in nuclear security applications

    International Nuclear Information System (INIS)

    Murer, D. E.

    2014-01-01

    This work presents studies of 4 He fast neutron detectors for nuclear security applications. Such devices are high pressure gas scintillation detectors, sensitive to neutrons in the energy range of fission sources. First, an introduction to the scope of the intended application is given. This is followed by a description of all components relevant to the operation of the detector. The next chapter presents studies of various characteristics of the neutron detector, among them properties of its scintillation response, differences between neutron and gamma interactions and effects of the light collection process. The results of the detector characterization are used to develop neutron gamma discrimination methods. These methods are put to the test using measurements with a high gamma flux, and the results are compared to performance requirements of Radiation Portal Monitors. Background neutron measurements are presented next. Measured neutron rates are compared to values published in scientific literature. The fluctuation of the background count rate was studied, and the contribution of muons evaluated. Two applications of the detectors in the field of nuclear security are discussed in the last two chapters. The first one is a novel method to measure the plutonium mass in a container filled with Mixed Oxide Fuel. The last chapter presents the development of a Radiation Portal Monitor which, in addition to neutron and gamma counting, exploits time correlation to detect threats such as plutonium and 60 Co. (author)

  9. Safety, Security And safeguards In GEN IV sodium fast reactors

    OpenAIRE

    Rossi, Fabiana

    2015-01-01

    This work presents first a study of the national and international laws in the fields of safety, security and safeguards. The international treaties and the recommendations issued by the IAEA as well as the national regulations in force in France, the United States and Italy are analyzed. As a result of this, a comparison among them is presented. Given the interest of the Japan Atomic Energy Agency for the aspects of criminal penalties and monetary, also the Japanese case is analyzed. The ...

  10. Fast and maliciously secure two-party computation using the GPU

    DEFF Research Database (Denmark)

    Frederiksen, Tore Kasper; Nielsen, Jesper Buus

    2013-01-01

    We describe, and implement, a maliciously secure protocol for two-party computation in a parallel computational model. Our protocol is based on Yao’s garbled circuit and an efficient OT extension. The implementation is done using CUDA and yields fast results for maliciously secure two-party compu......-party computation in a financially feasible and practical setting by using a consumer grade CPU and GPU. Our protocol further uses some novel constructions in order to combine garbled circuits and an OT extension in a parallel and maliciously secure setting....

  11. Secure Route Structures for Parallel Mobile Agents Based Systems Using Fast Binary Dispatch

    Directory of Open Access Journals (Sweden)

    Yan Wang

    2005-01-01

    Full Text Available In a distributed environment, where a large number of computers are connected together to enable the large-scale sharing of data and computing resources, agents, especially mobile agents, are the tools for autonomously completing tasks on behalf of their owners. For applications of large-scale mobile agents, security and efficiency are of great concern. In this paper, we present a fast binary dispatch model and corresponding secure route structures for mobile agents dispatched in parallel to protect the dispatch routes of agents while ensuring the dispatch efficiency. The fast binary dispatch model is simple but efficient with a dispatch complexity of O(log2n. The secure route structures adopt the combination of public-key encryption and digital signature schemes and expose minimal route information to hosts. The nested structure can help detect attacks as early as possible. We evaluated the various models both analytically and empirically.

  12. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  13. A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform

    Directory of Open Access Journals (Sweden)

    Srinivas Koppu

    2017-01-01

    Full Text Available An enhanced secure image chaotic cryptosystem has been proposed based on hybrid CMT-Lanczos algorithm. We have achieved fast encryption and decryption along with privacy of images. The pseudorandom generator has been used along with Lanczos algorithm to generate root characteristics and eigenvectors. Using hybrid CMT image, pixels are shuffled to accomplish excellent randomness. Compared with existing methods, the proposed method had more robustness to various attacks: brute-force attack, known cipher plaintext, chosen-plaintext, security key space, key sensitivity, correlation analysis and information entropy, and differential attacks. Simulation results show that the proposed methods give better result in protecting images with low-time complexity.

  14. Effects of Nuclear Energy on Sustainable Development and Energy Security: Sodium-Cooled Fast Reactor Case

    Directory of Open Access Journals (Sweden)

    Sungjoo Lee

    2016-09-01

    Full Text Available We propose a stepwise method of selecting appropriate indicators to measure effects of a specific nuclear energy option on sustainable development and energy security, and also to compare an energy option with another. Focusing on the sodium-cooled fast reactor, one of the highlighted Generation IV reactors, we measure and compare its effects with the standard pressurized water reactor-based nuclear power, and then with coal power. Collecting 36 indicators, five experts select seven key indicators to meet data availability, nuclear energy relevancy, comparability among energy options, and fit with Korean energy policy objectives. The results show that sodium-cooled fast reactors is a better alternative than existing nuclear power as well as coal electricity generation across social, economic and environmental dimensions. Our method makes comparison between energy alternatives easier, thereby clarifying consequences of different energy policy decisions.

  15. Fast Three-dimensional Sparse Holography Imaging Algorithm for Personal Security Verification

    Directory of Open Access Journals (Sweden)

    Liu Wei

    2016-06-01

    Full Text Available Terahertz holographic imaging has broad applications in the field of personal security verification, concealed weapon detection, and non-destructive testing. To suppress the range ambiguity, a fast sparse image reconstruction approach and imaging scheme is proposed for three-dimensional terahertz holography. The proposed algorithm establishes the terahertz imaging geometry and corresponding echo model. The range ambiguity is eliminated using the random step frequency method, and a frequency shift procedure is applied to recover the targets with a high computational efficiency. Simulation and experimental results verify the proposed algorithm.

  16. Detector-device-independent quantum key distribution: Security analysis and fast implementation

    International Nuclear Information System (INIS)

    Boaron, Alberto; Korzh, Boris; Boso, Gianluca; Martin, Anthony; Zbinden, Hugo; Houlmann, Raphael; Lim, Charles Ci Wen

    2016-01-01

    One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. However, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) has been proposed to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. Here, we analyze the security of DDI-QKD and elucidate its security assumptions. We find that DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.

  17. Ultra-fast secure communication with complex systems in classical channels (Conference Presentation)

    KAUST Repository

    Mazzone, Valerio

    2017-04-28

    Developing secure communications is a research area of growing interest. During the past years, several cryptographic schemes have been developed, with Quantum cryptography being a promising scheme due to the use of quantum effects, which make very difficult for an eavesdropper to intercept the communication. However, practical quantum key distribution methods have encountered several limitations; current experimental realizations, in fact, fail to scale up on long distances, as well as in providing unconditional security and speed comparable to classical optical communications channels. Here we propose a new, low cost and ultra-fast cryptographic system based on a fully classical optical channel. Our cryptographic scheme exploits the complex synchronization of two different random systems (one on the side of the sender and another on the side of the receiver) to realize a “physical” one paid system. The random medium is created by an optical chip fabricated through electron beam lithography on a Silicon On Insulator (SOI) substrate. We present experiments with ps lasers and commercial fibers, showing the ultrafast distribution of a random key between two users (Alice and Bob), with absolute no possibility for a passive/active eavesdropper to intercept the communication. Remarkably, this system enables the same security of quantum cryptography, but with the use of a classical communication channel. Our system exploits a unique synchronization that exists between two different random systems, and at such is extremely versatile and can enable safe communications among different users in standards telecommunications channels.

  18. A framework for fast and secure packaging identification on mobile phones

    Science.gov (United States)

    Diephuis, Maurits; Voloshynovskiy, Svyatoslav; Holotyak, Taras; Stendardo, Nabil; Keel, Bruno

    2014-02-01

    In this paper, we address the problem of fast and secure packaging identification on mobile phones. It is a well known fact that consumer goods are counterfeited on a massive scale in certain regions of the world, illustrating how existing counter measures fall short or don't exist at all, as can be seen in the local absence of laws pertaining to brand protection. This paper introduces a technological tool that allows the consumer to quickly identify a product or package with a mobile device using a physical non-cloneable features in the form of a surface micro- structure image. This natural occurring identifier allows a producer or brand owner to track and trace all its products and gives the consumer a powerful tool to confirm the authenticity of an offered product.

  19. Estimation of entropy rate in a fast physical random-bit generator using a chaotic semiconductor laser with intrinsic noise.

    Science.gov (United States)

    Mikami, Takuya; Kanno, Kazutaka; Aoyama, Kota; Uchida, Atsushi; Ikeguchi, Tohru; Harayama, Takahisa; Sunada, Satoshi; Arai, Ken-ichi; Yoshimura, Kazuyuki; Davis, Peter

    2012-01-01

    We analyze the time for growth of bit entropy when generating nondeterministic bits using a chaotic semiconductor laser model. The mechanism for generating nondeterministic bits is modeled as a 1-bit sampling of the intensity of light output. Microscopic noise results in an ensemble of trajectories whose bit entropy increases with time. The time for the growth of bit entropy, called the memory time, depends on both noise strength and laser dynamics. It is shown that the average memory time decreases logarithmically with increase in noise strength. It is argued that the ratio of change in average memory time with change in logarithm of noise strength can be used to estimate the intrinsic dynamical entropy rate for this method of random bit generation. It is also shown that in this model the entropy rate corresponds to the maximum Lyapunov exponent.

  20. The Subaru FMOS galaxy redshift survey (FastSound). V. Intrinsic alignments of emission-line galaxies at z ˜ 1.4

    Science.gov (United States)

    Tonegawa, Motonari; Okumura, Teppei; Totani, Tomonori; Dalton, Gavin; Glazebrook, Karl; Yabe, Kiyoto

    2018-04-01

    Intrinsic alignments (IA), the coherent alignment of intrinsic galaxy orientations, can be a source of a systematic error of weak lensing surveys. The redshift evolution of IA also contains information about the physics of galaxy formation and evolution. This paper presents the first measurement of IA at high redshift, z ˜ 1.4, using the spectroscopic catalog of blue star-forming galaxies of the FastSound redshift survey, with the galaxy shape information from the Canada-Hawaii-France telescope lensing survey. The IA signal is consistent with zero with power-law amplitudes fitted to the projected correlation functions for density-shape and shape-shape correlation components, Aδ+ = -0.0071 ± 0.1340 and A++ = -0.0505 ± 0.0848, respectively. These results are consistent with those obtained from blue galaxies at lower redshifts (e.g., A _{δ +}=0.0035_{-0.0389}^{+0.0387} and A_{++}=0.0045_{-0.0168}^{+0.0166} at z = 0.51 from the WiggleZ survey). The upper limit of the constrained IA amplitude corresponds to a few percent contamination to the weak-lensing shear power spectrum, resulting in systematic uncertainties on the cosmological parameter estimations by -0.052 < Δσ8 < 0.039 and -0.039 < ΔΩm < 0.030.

  1. On the security of Y-00 under fast correlation and other attacks on the key

    International Nuclear Information System (INIS)

    Yuen, Horace P.; Nair, Ranjith

    2007-01-01

    The security of the Y-00 direct encryption protocol under correlation attack is addressed. A Y-00 configuration that is more secure than AES under known-plaintext attack is presented. It is shown that under any ciphertext-only attack, full information-theoretic security on the Y-00 seed key is obtained for any encryption box ENC with proper deliberate signal randomization

  2. FAST

    DEFF Research Database (Denmark)

    Zuidmeer-Jongejan, Laurian; Fernandez-Rivas, Montserrat; Poulsen, Lars K.

    2012-01-01

    ABSTRACT: The FAST project (Food Allergy Specific Immunotherapy) aims at the development of safe and effective treatment of food allergies, targeting prevalent, persistent and severe allergy to fish and peach. Classical allergen-specific immunotherapy (SIT), using subcutaneous injections...... with aqueous food extracts may be effective but has proven to be accompanied by too many anaphylactic side-effects. FAST aims to develop a safe alternative by replacing food extracts with hypoallergenic recombinant major allergens as the active ingredients of SIT. Both severe fish and peach allergy are caused...... in depth serological and cellular immune analyses will be performed, allowing identification of novel biomarkers for monitoring treatment efficacy. FAST aims at improving the quality of life of food allergic patients by providing a safe and effective treatment that will significantly lower their threshold...

  3. Fast-Valving of Large Steam Turbine Units as a Means of Power System Security Enhancement

    Directory of Open Access Journals (Sweden)

    Bogdan Sobczak

    2014-03-01

    Full Text Available Fast-valving assists in maintaining system stability following a severe transmission system fault by reducing the turbine mechanical power. Fast-valving consists in rapid closing and opening of steam valves in an adequate manner to reduce the generator accelerating power following the recognition of a severe fault. FV can be an effective and economical method of meeting the performance requirements of a power system in the presence of an increase in wind and solar generation in the power system, newly connected large thermal units and delaying of building new transmission lines. The principle of fast-valving and advantages of applying this technique in large steam turbine units was presented in the paper. Effectiveness of fast-valving in enhancing the stability of the Polish Power Grid was analyzed. The feasibility study of fast-valving application in the 560 MW unit in Kozienice Power Station (EW SA was discussed.

  4. FAST

    Science.gov (United States)

    Nathavitharana, R R; Daru, P; Barrera, A E; Mostofa Kamal, S M; Islam, S; Ul-Alam, M; Sultana, R; Rahman, M; Hossain, Md S; Lederer, P; Hurwitz, S; Chakraborty, K; Kak, N; Tierney, D B; Nardell, E

    2017-09-01

    National Institute of Diseases of the Chest and Hospital, Dhaka; Bangladesh Institute of Research and Rehabilitation in Diabetes, Endocrine and Metabolic Disorders, Dhaka; and Chittagong Chest Disease Hospital, Chittagong, Bangladesh. To present operational data and discuss the challenges of implementing FAST (Find cases Actively, Separate safely and Treat effectively) as a tuberculosis (TB) transmission control strategy. FAST was implemented sequentially at three hospitals. Using Xpert® MTB/RIF, 733/6028 (12.2%, 95%CI 11.4-13.0) patients were diagnosed with unsuspected TB. Patients with a history of TB who were admitted with other lung diseases had more than twice the odds of being diagnosed with unsuspected TB as those with no history of TB (OR 2.6, 95%CI 2.2-3.0, P stakeholder engagement and laboratory capacity are important for sustainability and scalability.

  5. Intrinsic Motivation.

    Science.gov (United States)

    the activity. There has been very little research and theorizing which considers the topic of intrinsic motivation , yet there is a substantial amount...reported within the framework of intrinsic motivation , yet the paper reinterprets the work within that framework. It considers several approaches of

  6. Fast and secure key distribution using mesoscopic coherent states of light

    International Nuclear Information System (INIS)

    Barbosa, Geraldo A.

    2003-01-01

    This work shows how two parties A and B can securely share unlimited sequences of random bits at optical speeds. A and B possess true-random physical sources and exchange random bits by using a random sequence received to cipher the following one to be sent. A starting shared secret key is used and the method can be described as a one-time-pad unlimited extender. It is demonstrated that the minimum probability of error in signal determination by the eavesdropper can be set arbitrarily close to the pure guessing level. Being based on the M-ry encryption protocol this method also allows for optical amplification without security degradation, offering practical advantages over the Bennett-Brassard 1984 protocol for key distribution

  7. Fast forward for the United Nations. Human security becomes a unifying force

    International Nuclear Information System (INIS)

    Annan, Kofi

    2005-01-01

    This paper speaks about the author's vision of a safer world and a better United Nations. The global threats of our age include terrorism, deadly weapons, genocide, infectious disease, poverty, environmental degradation and organized crime. They will not wait for States to sort out their differences. That is why we must act now to strengthen our collective defences. We must unite to master today's threats, and not allow them to divide and master us. And I submit that the only universal instrument that can bring States together in such a global effort is the United Nations. One must acknowledge that the United Nations is not perfect. At times, it shows its age. But our world will not easily find a better instrument for forging a sustained, global response to today's threats. We must use it to unite around common priorities - and act on them. And we must agree on a plan to reform the United Nations - and get on with the job of implementing it. This message lies at the heart of the recent report, A More Secure World: Our Shared Responsibility. It is the work of the Panel of 16 men and women from around the world I appointed last year. The report contains a powerful vision of collective security. Whether the threat is terrorism or AIDS, a threat to one is a threat to all. Our defences are only as strong as their weakest link. We will be safest if we work together

  8. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  9. Security

    OpenAIRE

    Leander, Anna

    2009-01-01

    This paper argues that security belongs to a specific category of commodities: “contested commodities” around which there is an ongoing and unsettled symbolic struggle over whether or not they can and should be though of as commodities (section 1). The contested nature of commodification has implications for how markets function; market practices tend to be defined and organized in ways that minimize their contentiousness and obfuscate their expansion. The paper looks at the implications of t...

  10. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  11. DTIC Review: Biometric Security

    National Research Council Canada - National Science Library

    2007-01-01

    ...: Biometrics, the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits, is a critical tool used in law enforcement, computer security and homeland defense...

  12. Status report on the Small Secure Transportable Autonomous Reactor (SSTAR) /Lead-cooled Fast Reactor (LFR) and supporting research and development.

    Energy Technology Data Exchange (ETDEWEB)

    Sienicki, J. J.; Moisseytsev, A.; Yang, W. S.; Wade, D. C.; Nikiforova, A.; Hanania, P.; Ryu, H. J.; Kulesza, K. P.; Kim, S. J.; Halsey, W. G.; Smith, C. F.; Brown, N. W.; Greenspan, E.; de Caro, M.; Li, N.; Hosemann, P.; Zhang, J.; Yu, H.; Nuclear Engineering Division; LLNL; LANL; Massachusetts Inst. of Tech.; Ecole des Mines de Paris; Oregon State Univ.; Univ.of California at Berkley

    2008-06-23

    This report provides an update on development of a pre-conceptual design for the Small Secure Transportable Autonomous Reactor (SSTAR) Lead-Cooled Fast Reactor (LFR) plant concept and supporting research and development activities. SSTAR is a small, 20 MWe (45 MWt), natural circulation, fast reactor plant for international deployment concept incorporating proliferation resistance for deployment in non-fuel cycle states and developing nations, fissile self-sufficiency for efficient utilization of uranium resources, autonomous load following making it suitable for small or immature grid applications, and a high degree of passive safety further supporting deployment in developing nations. In FY 2006, improvements have been made at ANL to the pre-conceptual design of both the reactor system and the energy converter which incorporates a supercritical carbon dioxide Brayton cycle providing higher plant efficiency (44 %) and improved economic competitiveness. The supercritical CO2 Brayton cycle technology is also applicable to Sodium-Cooled Fast Reactors providing the same benefits. One key accomplishment has been the development of a control strategy for automatic control of the supercritical CO2 Brayton cycle in principle enabling autonomous load following over the full power range between nominal and essentially zero power. Under autonomous load following operation, the reactor core power adjusts itself to equal the heat removal from the reactor system to the power converter through the large reactivity feedback of the fast spectrum core without the need for motion of control rods, while the automatic control of the power converter matches the heat removal from the reactor to the grid load. The report includes early calculations for an international benchmarking problem for a LBE-cooled, nitride-fueled fast reactor core organized by the IAEA as part of a Coordinated Research Project on Small Reactors without Onsite Refueling; the calculations use the same neutronics

  13. Intrinsic contractures of the hand.

    Science.gov (United States)

    Paksima, Nader; Besh, Basil R

    2012-02-01

    Contractures of the intrinsic muscles of the fingers disrupt the delicate and complex balance of intrinsic and extrinsic muscles, which allows the hand to be so versatile and functional. The loss of muscle function primarily affects the interphalangeal joints but also may affect etacarpophalangeal joints. The resulting clinical picture is often termed, intrinsic contracture or intrinsic-plus hand. Disruption of the balance between intrinsic and extrinsic muscles has many causes and may be secondary to changes within the intrinsic musculature or the tendon unit. This article reviews diagnosis, etiology, and treatment algorithms in the management of intrinsic contractures of the fingers. Copyright © 2012 Elsevier Inc. All rights reserved.

  14. Predicting Intrinsic Motivation

    Science.gov (United States)

    Martens, Rob; Kirschner, Paul A.

    2004-01-01

    Intrinsic motivation can be predicted from participants' perceptions of the social environment and the task environment (Ryan & Deci, 2000)in terms of control, relatedness and competence. To determine the degree of independence of these factors 251 students in higher vocational education (physiotherapy and hotel management) indicated the…

  15. Intrinsic and Extrinsic Motivation

    OpenAIRE

    Roland Bénabou; Jean Tirole

    2003-01-01

    A central tenet of economics is that individuals respond to incentives. For psychologists and sociologists, in contrast, rewards and punishments are often counterproductive, because they undermine "intrinsic motivation". We reconcile these two views, showing how performance incentives offered by an informed principal (manager, teacher, parent) can adversely impact an agent's (worker, child) perception of the task, or of his own abilities. Incentives are then only weak reinforcers in the short...

  16. Intrinsic and extrinsic mortality reunited

    DEFF Research Database (Denmark)

    Koopman, Jacob J E; Wensink, Maarten J; Rozing, Maarten P

    2015-01-01

    Intrinsic and extrinsic mortality are often separated in order to understand and measure aging. Intrinsic mortality is assumed to be a result of aging and to increase over age, whereas extrinsic mortality is assumed to be a result of environmental hazards and be constant over age. However......, allegedly intrinsic and extrinsic mortality have an exponentially increasing age pattern in common. Theories of aging assert that a combination of intrinsic and extrinsic stressors underlies the increasing risk of death. Epidemiological and biological data support that the control of intrinsic as well...... as extrinsic stressors can alleviate the aging process. We argue that aging and death can be better explained by the interaction of intrinsic and extrinsic stressors than by classifying mortality itself as being either intrinsic or extrinsic. Recognition of the tight interaction between intrinsic and extrinsic...

  17. VMware view security essentials

    CERN Document Server

    Langenhan, Daniel

    2013-01-01

    A practical and fast-paced guide that gives you all the information you need to secure your virtual environment.This book is a ""how-to"" for the novice, a ""reference guide"" for the advanced user, and a ""go to"" for the experienced user in all the aspects of VMware View desktop virtualization security.

  18. Protein intrinsic disorder in plants.

    Science.gov (United States)

    Pazos, Florencio; Pietrosemoli, Natalia; García-Martín, Juan A; Solano, Roberto

    2013-09-12

    To some extent contradicting the classical paradigm of the relationship between protein 3D structure and function, now it is clear that large portions of the proteomes, especially in higher organisms, lack a fixed structure and still perform very important functions. Proteins completely or partially unstructured in their native (functional) form are involved in key cellular processes underlain by complex networks of protein interactions. The intrinsic conformational flexibility of these disordered proteins allows them to bind multiple partners in transient interactions of high specificity and low affinity. In concordance, in plants this type of proteins has been found in processes requiring these complex and versatile interaction networks. These include transcription factor networks, where disordered proteins act as integrators of different signals or link different transcription factor subnetworks due to their ability to interact (in many cases simultaneously) with different partners. Similarly, they also serve as signal integrators in signaling cascades, such as those related to response to external stimuli. Disordered proteins have also been found in plants in many stress-response processes, acting as protein chaperones or protecting other cellular components and structures. In plants, it is especially important to have complex and versatile networks able to quickly and efficiently respond to changing environmental conditions since these organisms cannot escape and have no other choice than adapting to them. Consequently, protein disorder can play an especially important role in plants, providing them with a fast mechanism to obtain complex, interconnected and versatile molecular networks.

  19. Protein intrinsic disorder in plants

    Directory of Open Access Journals (Sweden)

    Florencio ePazos

    2013-09-01

    Full Text Available To some extent contradicting the classical paradigm of the relationship between protein 3D structure and function, now it is clear that large portions of the proteomes, especially in higher organisms, lack a fixed structure and still perform very important functions. Proteins completely or partially unstructured in their native (functional form are involved in key cellular processes underlain by complex networks of protein interactions. The intrinsic conformational flexibility of these disordered proteins allows them to bind multiple partners in transient interactions of high specificity and low affinity. In concordance, in plants this type of proteins has been found in processes requiring these complex and versatile interaction networks. These include transcription factor networks, where disordered proteins act as integrators of different signals or link different transcription factor subnetworks due to their ability to interact (in many cases simultaneously with different partners. Similarly, they also serve as signal integrators in signalling cascades, such as those related to response to external stimuli. Disordered proteins have also been found in plants in many stress-response processes, acting as protein chaperones or protecting other cellular components and structures. In plants, it is especially important to have complex and versatile networks able to quickly and efficiently respond to changing environmental conditions since these organisms can not escape and have no other choice than adapting to them. Consequently, protein disorder can play an especially important role in plants, providing them with a fast mechanism to obtain complex, interconnected and versatile molecular networks.

  20. Fast neutrons dosimetry

    International Nuclear Information System (INIS)

    Rzyski, B.M.

    1977-01-01

    A proton recoil technique has been developed for inducing thermoluminescence with incident fast neutrons. CaF 2 was used as the TL phosphor, and cane sugar and polyethylene were used as proton radiators. The phosphor and the hydrogeneous material powders were well mixed, encapsulated in glass tubes and exposed to Am-Be sources, resulting in recoils from incident fast neutrons of energy between 0,25 and 11,25 MeV. The intrinsic response of pure CaF 2 to fast neutrons without a hydrogeneous radiator was checked by using LiF (TLD-700). Glow curves were recorded from room temperature up to 350 0 C after different doses of neutrons and gamma rays of 60 Co. First collision dose due to fast neutrons in tissue like materials such as cane sugar and polyethylene was also calculated [pt

  1. Percentage of Fast-Track Receipts

    Data.gov (United States)

    Social Security Administration — The dataset provides the percentage of fast-track receipts by state during the reporting fiscal year. Fast-tracked cases consist of those cases identified as Quick...

  2. Assessing and managing security risk in IT systems a structured methodology

    CERN Document Server

    McCumber, John

    2004-01-01

    SECURITY CONCEPTSUsing ModelsIntroduction: Understanding, Selecting, and Applying Models Understanding AssetsLayered Security Using Models in Security Security Models for Information Systems Shortcomings of Models in SecuritySecurity in Context Reference Defining Information SecurityConfidentiality, Integrity, and Availability Information AttributesIntrinsic versus Imputed Value Information as an Asset The Elements of Security Security Is Security Only in Context Information as an Asset Introduction Determining Value Managing Information Resources ReferencesUnderstanding Threat and Its Relatio

  3. Intrinsic Chevrolets at the SSC

    International Nuclear Information System (INIS)

    Brodsky, S.J.; Collins, J.C.; Ellis, S.D.; Gunion, J.F.; Mueller, A.H.

    1984-01-01

    The possibility of the production at high energy of heavy quarks, supersymmetric particles and other large mass colored systems via the intrinsic twist-six components in the proton wave function is discussed. While the existing data do not rule out the possible relevance of intrinsic charm production at present energies, the extrapolation of such intrinsic contributions to very high masses and energies suggests that they will not play an important role at the SSC

  4. Intrinsically dynamic population models

    Directory of Open Access Journals (Sweden)

    Robert Schoen

    2005-03-01

    Full Text Available Intrinsically dynamic models (IDMs depict populations whose cumulative growth rate over a number of intervals equals the product of the long term growth rates (that is the dominant roots or dominant eigenvalues associated with each of those intervals. Here the focus is on the birth trajectory produced by a sequence of population projection (Leslie matrices. The elements of a Leslie matrix are represented as straightforward functions of the roots of the matrix, and new relationships are presented linking the roots of a matrix to its Net Reproduction Rate and stable mean age of childbearing. Incorporating mortality changes in the rates of reproduction yields an IDM when the subordinate roots are held constant over time. In IDMs, the birth trajectory generated by any specified sequence of Leslie matrices can be found analytically. In the Leslie model with 15 year age groups, the constant subordinate root assumption leads to reasonable changes in the age pattern of fertility, and equations (27 and (30 provide the population size and structure that result from changing levels of net reproduction. IDMs generalize the fixed rate stable population model. They can characterize any observed population, and can provide new insights into dynamic demographic behavior, including the momentum associated with gradual or irregular paths to zero growth.

  5. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  6. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  7. A fast and reliable approach to simulating the output from an x-ray tube used for developing security backscatter imaging

    Science.gov (United States)

    Vella, A.; Munoz, A.; Healy, M. J. F.; Lane, D. W.; Lockley, D.; Zhou, J.

    2017-08-01

    The PENELOPE Monte Carlo simulation code was used alongside the SpekCalc code to simulate X-ray energy spectra from a VJ Technologies' X-ray generator at a range of anode voltages. The PENELOPE code is often utilised in medicine but is here applied to develop coded aperture and pinhole imaging systems for security purposes. The greater computational burden of PENELOPE over SpekCalc is warranted by its greater flexibility and output information. The model was designed using the PENGEOM sub-tool and consists of a tungsten anode and five layers of window materials. The photons generated by a mono-energetic electron beam are collected by a virtual detector placed after the last window layer, and this records the spatial, angular and energy distributions which are then used as the X-ray source for subsequent simulations. The process of storing X-ray outputs and using them as a virtual photon source can then be used efficiently for exploring a range of imaging conditions as the computationally expensive electron interactions in the anode need not be repeated. The modelled spectra were validated with experimentally determined spectra collected with an Amptek X-123 Cadmium Telluride detector placed in front of the source.

  8. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  9. Intrinsically Passive Handling and Grasping

    NARCIS (Netherlands)

    Stramigioli, Stefano; Scherpen, Jacquelien M.A.; Khodabandehloo, Koorosh

    2000-01-01

    The paper presents a control philosophy called Intrinsically Passive Control, which has the feature to properly behave during interaction with any passive objects. The controlled robot will never become unstable due to the physical structure of the controller.

  10. Android Applications Security

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2011-01-01

    Full Text Available The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the architecture of a mobile security system for Android devices.

  11. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  12. Intrinsic thermal expansion of crystal defects

    International Nuclear Information System (INIS)

    Ganne, J.-P.

    1981-02-01

    Although the phenomenon of thermal expansion has long been known, the intrinsic thermal expansion coefficient (ITEC) βsub(d) of a point defect, derived from its formation volume vsub(d), has never been measured directly. The differential dilatometer by interferometry built by ASTY and GILDER is described. It has allowed βsub(d) to be measured for several defects. Vacancies and small interstitial loops were produced in aluminium by low temperature (20 K) fast neutron irradiation followed by an anneal up to the beginning of stage III (160 K). The very high value of the measured ratio βsub(d)/β 0 (12+-4) is comparable with a lattice statics calculated (42) value (11.5 0 [fr

  13. Characterization of Partial Intrinsic Symmetries

    NARCIS (Netherlands)

    Shehu, Aurela; Brunton, Alan; Wuhrer, Stefanie; Wand, Michael

    2014-01-01

    We present a mathematical framework and algorithm for characterizing and extracting partial intrinsic symmetries of surfaces, which is a fundamental building block for many modern geometry processing algorithms. Our goal is to compute all “significant” symmetry information of the shape, which we

  14. Reading: Intrinsic versus Extrinsic Motivation.

    Science.gov (United States)

    Ediger, Marlow

    Much debate centers on motivating student in reading achievement. Should students feel motivated from within (intrinsic motivation), or is it better to have extrinsic motivation whereby external stimuli are used to help learners achieve optimally in reading? This paper aims to analyze the two points of view about motivating students in reading…

  15. Intrinsic volumes of symmetric cones

    OpenAIRE

    Amelunxen, Dennis; Bürgisser, Peter

    2012-01-01

    We compute the intrinsic volumes of the cone of positive semidefinite matrices over the real numbers, over the complex numbers, and over the quaternions, in terms of integrals related to Mehta's integral. Several applications for the probabilistic analysis of semidefinite programming are given.

  16. Acoustic resonance spectroscopy intrinsic seals

    International Nuclear Information System (INIS)

    Olinger, C.T.; Burr, T.; Vnuk, D.R.

    1994-01-01

    We have begun to quantify the ability of acoustic resonance spectroscopy (ARS) to detect the removal and replacement of the lid of a simulated special nuclear materials drum. Conceptually, the acoustic spectrum of a container establishcs a baseline fingerprint, which we refer to as an intrinsic seal, for the container. Simply removing and replacing the lid changes some of the resonant frequencies because it is impossible to exactly duplicate all of the stress patterns between the lid and container. Preliminary qualitative results suggested that the ARS intrinsic seal could discriminate between cases where a lid has or has not been removed. The present work is directed at quantifying the utility of the ARS intrinsic seal technique, including the technique's sensitivity to ''nuisance'' effects, such as temperature swings, movement of the container, and placement of the transducers. These early quantitative tests support the potential of the ARS intrinsic seal application, but also reveal a possible sensitivity to nuisance effects that could limit environments or conditions under which the technique is effective

  17. Intrinsic Motivation in Physical Education

    Science.gov (United States)

    Davies, Benjamin; Nambiar, Nathan; Hemphill, Caroline; Devietti, Elizabeth; Massengale, Alexandra; McCredie, Patrick

    2015-01-01

    This article describes ways in which educators can use Harter's perceived competence motivation theory, the achievement goal theory, and self-determination theory to develop students' intrinsic motivation to maintain physical fitness, as demonstrated by the Sound Body Sound Mind curriculum and proven effective by the 2013 University of…

  18. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  19. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  20. Security Expertise

    DEFF Research Database (Denmark)

    This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  1. Intrinsic disorder here, there, and everywhere, and nowhere to escape from it.

    Science.gov (United States)

    Uversky, Vladimir N

    2017-09-01

    The concept of protein intrinsic disorder persistently penetrates into all areas of modern protein science. It cannot be ignored anymore, and cannot be shrugged off, as it represents a vital feature (or, more correctly, a broad spectrum of important features), which, when added to and mixed with features arising from the well established protein structure-function paradigm, complete the picture of a functioning protein. The field of protein intrinsic disorder is very dynamic and fast developing. This Multi-Author Review represents a snapshot of this field by introducing some recent advances. Articles assembled in this Multi-Author Review introduce some of the new aspects of intrinsic disorder, outline some fascinating ideas related to the intrinsically disordered proteins, their structure, and functionality, and show challenges related to the analysis of proteins carrying intrinsic disorder.

  2. Moving towards Cloud Security

    OpenAIRE

    Edit Szilvia Rubóczki; Zoltán Rajnai

    2015-01-01

    Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment th...

  3. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  4. Detecting Nosocomial Intrinsic Infections through Relating Bacterial ...

    African Journals Online (AJOL)

    Sierra Leone Journal of Biomedical Research ... Surgical procedures often lead to both intrinsic and extrinsic infections. ... This study demonstrated surgical procedures as precursory to intrinsic infections and that bacterial pathogens found on wounds and endogenous indicators of surgery are links to intrinsic infection.

  5. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  6. Exploiting intrinsic fluctuations to identify model parameters.

    Science.gov (United States)

    Zimmer, Christoph; Sahle, Sven; Pahle, Jürgen

    2015-04-01

    Parameterisation of kinetic models plays a central role in computational systems biology. Besides the lack of experimental data of high enough quality, some of the biggest challenges here are identification issues. Model parameters can be structurally non-identifiable because of functional relationships. Noise in measured data is usually considered to be a nuisance for parameter estimation. However, it turns out that intrinsic fluctuations in particle numbers can make parameters identifiable that were previously non-identifiable. The authors present a method to identify model parameters that are structurally non-identifiable in a deterministic framework. The method takes time course recordings of biochemical systems in steady state or transient state as input. Often a functional relationship between parameters presents itself by a one-dimensional manifold in parameter space containing parameter sets of optimal goodness. Although the system's behaviour cannot be distinguished on this manifold in a deterministic framework it might be distinguishable in a stochastic modelling framework. Their method exploits this by using an objective function that includes a measure for fluctuations in particle numbers. They show on three example models, immigration-death, gene expression and Epo-EpoReceptor interaction, that this resolves the non-identifiability even in the case of measurement noise with known amplitude. The method is applied to partially observed recordings of biochemical systems with measurement noise. It is simple to implement and it is usually very fast to compute. This optimisation can be realised in a classical or Bayesian fashion.

  7. The fast encryption package

    Science.gov (United States)

    Bishop, Matt

    1988-01-01

    The organization of some tools to help improve passwork security at a UNIX-based site is described along with how to install and use them. These tools and their associated library enable a site to force users to pick reasonably safe passwords (safe being site configurable) and to enable site management to try to crack existing passworks. The library contains various versions of a very fast implementation of the Data Encryption Standard and of the one-way encryption functions used to encryp the password.

  8. Intrinsic cylindrical and spherical waves

    International Nuclear Information System (INIS)

    Ludlow, I K

    2008-01-01

    Intrinsic waveforms associated with cylindrical and spherical Bessel functions are obtained by eliminating the factors responsible for the inverse radius and inverse square radius laws of wave power per unit area of wavefront. The resulting expressions are Riccati-Bessel functions for both cases and these can be written in terms of amplitude and phase functions of order v and wave variable z. When z is real, it is shown that a spatial phase angle of the intrinsic wave can be defined and this, together with its amplitude function, is systematically investigated for a range of fixed orders and varying z. The derivatives of Riccati-Bessel functions are also examined. All the component functions exhibit different behaviour in the near field depending on the order being less than, equal to or greater than 1/2. Plots of the phase angle can be used to display the locations of the zeros of the general Riccati-Bessel functions and lead to new relations concerning the ordering of the real zeros of Bessel functions and the occurrence of multiple zeros when the argument of the Bessel function is fixed

  9. Inhibition of Intrinsic Thrombin Generation

    Directory of Open Access Journals (Sweden)

    Thomas W. Stief MD

    2006-01-01

    Full Text Available Background The contact phase of coagulation is of physiologic/pathophysiologic importance, whenever unphysiologic polynegative substances such as cell fragments (microparticles get in contact with blood. There are several clinically used inhibitors of intrinsic thrombin generation. Here the inhibitory concentrations 50% (IC50 of these anticoagulants are measured by the highly specific thrombin generation assay INCA. Methods Unfrozen pooled normal citrated plasma in polystyrole tubes was supplemented at 23°C in duplicate with 0–2 IU/ml low molecular weight heparin (dalteparin, 0–2 IU/ml unfractionated heparin, 0–500 KIU/ml aprotinin, or 0–40 mM arginine. 50 μl plasma or 1 IU/ml thrombin standard were pipetted into a polystyrole microtiter plate with flat bottom. 5 μl SiO 2 /CaCl 2 - reagent (INCA activator were added and after 0–30 min incubation at 37°C 100 μl 2.5 M arginine, pH 8.6, were added; arginine inhibits hemostasis activation and depolymerizes generated fibrin within 20 min at 23°C. The in the physiologic 37°C incubation phase generated thrombin was then chromogenically detected. The intra-assay CV values were < 5%. Results and Discussion The approximate IC50 were 0.01 IU/ml dalteparin, 0.02 IU/ml heparin, 25 KIU/ml aprotinin, and 12 mM arginine. The efficiency of any anticoagulant on intrinsic thrombin generation should be measured for each individual patient. Abbreviations IIa, thrombin; δA, increase in absorbance; APTT, activated partial thromboplastin time; CRT, coagulation reaction time (at 37°C in water-bath; F-wells, polystyrole microtiter plates with flat bottom; IC50, inhibitory concentration 50%; INCA, intrinsic coagulation activity assay; IU, international units; KIU, kallikrein inhibiting unis; LMWH, low molecular weight heparin; mA, milli-absorbance units; PSL, pathromtin SL®; RT, room temperature (23°C; U-wells, polystyrole microtiter plates with round bottom.

  10. Intrinsic rotation with gyrokinetic models

    International Nuclear Information System (INIS)

    Parra, Felix I.; Barnes, Michael; Catto, Peter J.; Calvo, Iván

    2012-01-01

    The generation of intrinsic rotation by turbulence and neoclassical effects in tokamaks is considered. To obtain the complex dependences observed in experiments, it is necessary to have a model of the radial flux of momentum that redistributes the momentum within the tokamak in the absence of a preexisting velocity. When the lowest order gyrokinetic formulation is used, a symmetry of the model precludes this possibility, making small effects in the gyroradius over scale length expansion necessary. These effects that are usually small become important for momentum transport because the symmetry of the lowest order gyrokinetic formulation leads to the cancellation of the lowest order momentum flux. The accuracy to which the gyrokinetic equation needs to be obtained to retain all the physically relevant effects is discussed.

  11. FAST scan

    DEFF Research Database (Denmark)

    Müller, Anna

    FAST-skanning er en metode, der har til formål at hurtigt diagnosticere fri væske i bughulen hos traumapatienter og andre akutte patienter. Denne skanningsteknik blev først introduceret til hunde i 2004, og omfatter ultralydsskanning af specifikke punkter i bughulen, hvor der er stor chance....../sorte) områder. I dag bruges FAST-skanning meget hyppigt indenfor human og veterinær akutmedicin. Det kan ses som et værktøj for dyrlæger som ikke arbejder med ultralyd til daglig. FAST-skanning har mange fordele; proceduren er effektiv og kan tage under 3 minutter, men har alligevel høj diagnostisk værdi. Det...... nødvendigt. Det skal dog understreges, at de abdominale organer ikke undersøges specifikt. Det kan være svært at skelne mellem væske i peritonealhulen og i det retroperitoneale rum. Man kan heller ikke karakterisere væsken og derved skelne mellem f.eks. blod, pus eller urin. Siden FAST-skanning blev...

  12. Fast ejendom

    DEFF Research Database (Denmark)

    Pagh, Peter

    Bogen omfatter en gennemgang af lovgivning, praksis og teori vedrørende køb af fast ejendom og offentligretlig og privatretlig regulering. Bogen belyser bl.a. de privatretlige emner: købers misligholdelsesbeføjelser, servitutter, naboret, hævd og erstatningsansvar for miljøskader samt den...

  13. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  14. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  15. Incentives and intrinsic motivation in healthcare

    Directory of Open Access Journals (Sweden)

    Mikel Berdud

    2016-11-01

    Conclusions: The conclusions could act as a guide to support the optimal design of incentive policies and schemes within health organisations when healthcare professionals are intrinsically motivated.

  16. Algebraic description of intrinsic modes in nuclei

    Energy Technology Data Exchange (ETDEWEB)

    Leviatan, A. (Los Alamos National Lab., NM (USA))

    1990-01-01

    We present a procedure for extracting normal modes in algebraic number-conserving systems of interacting bosons relevant for collective states in even-even nuclei. The Hamiltonian is resolved into intrinsic (bandhead related) and collective (in-band related) parts. Shape parameters are introduced through non-spherical boson bases. Intrinsic modes decoupled from the spurious modes are obtained from the intrinsic part of the Hamiltonian in the limit of large number of bosons. Intrinsic states are constructed and serve to evaluate electromagnetic transition rates. The method is illustrated for systems with one type of boson as well as with proton-neutron bosons. (author).

  17. Algebraic description of intrinsic modes in nuclei

    International Nuclear Information System (INIS)

    Leviatan, A.

    1990-01-01

    We present a procedure for extracting normal modes in algebraic number-conserving systems of interacting bosons relevant for collective states in even-even nuclei. The Hamiltonian is resolved into intrinsic (bandhead related) and collective (in-band related) parts. Shape parameters are introduced through non-spherical boson bases. Intrinsic modes decoupled from the spurious modes are obtained from the intrinsic part of the Hamiltonian in the limit of large number of bosons. Intrinsic states are constructed and serve to evaluate electromagnetic transition rates. The method is illustrated for systems with one type of boson as well as with proton-neutron bosons. (author)

  18. Distributed security in closed distributed systems

    DEFF Research Database (Denmark)

    Hernandez, Alejandro Mario

    in their design. There should always exist techniques for ensuring that the required security properties are met. This has been thoroughly investigated through the years, and many varied methodologies have come through. In the case of distributed systems, there are even harder issues to deal with. Many approaches...... have been taken towards solving security problems, yet many questions remain unanswered. Most of these problems are related to some of the following facts: distributed systems do not usually have any central controller providing security to the entire system; the system heterogeneity is usually...... reflected in heterogeneous security aims; the software life cycle entails evolution and this includes security expectations; the distribution is useful if the entire system is “open” to new (a priori unknown) interactions; the distribution itself poses intrinsically more complex security-related problems...

  19. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  20. Geochemical indicators of intrinsic bioremediation

    International Nuclear Information System (INIS)

    Borden, R.C.; Gomez, C.A.; Becker, M.T.

    1995-01-01

    A detailed field investigation has been completed at a gasoline-contaminated aquifer near Rocky Point, NC, to examine possible indicators of intrinsic bioremediation and identify factors that may significantly influence the rae and extent of bioremediation. The dissolved plume of benzene, toluene, ethylbenzene, and xylene (BTEX) in ground water is naturally degrading. Toluene and o-xylene are most rapidly degraded followed by m-, p-xylene, and benzene. Ethylbenzene appears to degrade very slowly under anaerobic conditions present in the center of the plume. The rate and extent of biodegradation appears to be strongly influenced by the type and quantity of electron acceptors present in the aquifer. At the upgradient edge of the plume, nitrate, ferric iron, and oxygen are used as terminal electron acceptors during hydrocarbon biodegradation. The equivalent of 40 to 50 mg/l of hydrocarbon is degraded based on the increase in dissolved CO 2 relative to background ground water. Immediately downgradient of the source area, sulfate and iron are the dominant electron acceptors. Toluene and o-xylene are rapidly removed in this region. Once the available oxygen, nitrate, and sulfate are consumed, biodegradation is limited and appears to be controlled by mixing and aerobic biodegradation at the plume fringes

  1. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  2. Secure Objectives for School Security

    Science.gov (United States)

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  3. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  4. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  5. LEADERSHIP STYLE AND EMPLOYEES' INTRINSIC JOB ...

    African Journals Online (AJOL)

    Abstract. This study investigates the impact of leadership style on employees' intrinsic job satisfaction in the Cross River State Newspaper Corporation, Calabar,. Nigeria. The study examined the problem of dissatisfaction in the work place as far as intrinsic factors of job satisfaction are concerned. Structured questionnaire ...

  6. Intrinsic bioremediation of landfills interim report

    International Nuclear Information System (INIS)

    Brigmon, R.L.; Fliermans, C.B.

    1997-01-01

    Intrinsic bioremediation is a risk management option that relies on natural biological and physical processes to contain the spread of contamination from a source. Evidence is presented in this report that intrinsic bioremediation is occurring at the Sanitary Landfill is fundamental to support incorportion into a Corrective Action Plan (CAP)

  7. Differential scanning microcalorimetry of intrinsically disordered proteins.

    Science.gov (United States)

    Permyakov, Sergei E

    2012-01-01

    Ultrasensitive differential scanning calorimetry (DSC) is an indispensable thermophysical technique enabling to get direct information on enthalpies accompanying heating/cooling of dilute biopolymer solutions. The thermal dependence of protein heat capacity extracted from DSC data is a valuable source of information on intrinsic disorder level of a protein. Application details and limitations of DSC technique in exploration of protein intrinsic disorder are described.

  8. Intrinsic bioremediation of landfills interim report

    Energy Technology Data Exchange (ETDEWEB)

    Brigmon, R.L. [Westinghouse Savannah River Company, Aiken, SC (United States); Fliermans, C.B.

    1997-07-14

    Intrinsic bioremediation is a risk management option that relies on natural biological and physical processes to contain the spread of contamination from a source. Evidence is presented in this report that intrinsic bioremediation is occurring at the Sanitary Landfill is fundamental to support incorportion into a Corrective Action Plan (CAP).

  9. An Intrinsic Coordinate System for Fingerprint Matching

    NARCIS (Netherlands)

    Bazen, A.M.; Gerez, Sabih H.; Bigun, J.; Smeraldi, F.

    2001-01-01

    In this paper, an intrinsic coordinate system is proposed for fingerprints. First the fingerprint is partitioned in regular regions, which are regions that contain no singular points. In each regular region, the intrinsic coordinate system is defined by the directional field. When using the

  10. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  11. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  12. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  13. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  14. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  15. Security Studies

    OpenAIRE

    ,

    2005-01-01

    Security Studies has firmly established itself as a leading journal on international security issues. The journal publishes theoretical, historical and policy-oriented articles on the causes and consequences of war, and the sources and conditions of peace. The journal has published articles on balancing vs. bandwagoning, deterrence in enduring rivalries, the Domino theory, nuclear weapons proliferation, civil-military relations, political reforms in China, strategic culture in Asia and the P...

  16. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  17. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  18. High-speed true random number generation based on paired memristors for security electronics

    Science.gov (United States)

    Zhang, Teng; Yin, Minghui; Xu, Changmin; Lu, Xiayan; Sun, Xinhao; Yang, Yuchao; Huang, Ru

    2017-11-01

    True random number generator (TRNG) is a critical component in hardware security that is increasingly important in the era of mobile computing and internet of things. Here we demonstrate a TRNG using intrinsic variation of memristors as a natural source of entropy that is otherwise undesirable in most applications. The random bits were produced by cyclically switching a pair of tantalum oxide based memristors and comparing their resistance values in the off state, taking advantage of the more pronounced resistance variation compared with that in the on state. Using an alternating read scheme in the designed TRNG circuit, the unbiasedness of the random numbers was significantly improved, and the bitstream passed standard randomness tests. The Pt/TaO x /Ta memristors fabricated in this work have fast programming/erasing speeds of ∼30 ns, suggesting a high random number throughput. The approach proposed here thus holds great promise for physically-implemented random number generation.

  19. Algebraic description of intrinsic modes in nuclei

    International Nuclear Information System (INIS)

    Leviatan, A.

    1989-01-01

    We present a procedure for extracting normal modes in algebraic number-conserving systems of interacting bosons relevant for collective states in even-even nuclei. The Hamiltonian is resolved into intrinsic (bandhead related) and collective (in-band related) parts. Shape parameters are introduced through non-spherical boson bases. Intrinsic modes decoupled from the spurious modes are obtained from the intinsic part of the Hamiltonian in the limit of large number of bosons. Intrinsic states are constructed and serve to evaluate electromagnetic transition rates. The method is illustrated for systems with one type of boson as well as with proton-neutron bosons. 28 refs., 1 fig

  20. Algebraic description of intrinsic modes in nuclei

    Energy Technology Data Exchange (ETDEWEB)

    Leviatan, A.

    1989-01-01

    We present a procedure for extracting normal modes in algebraic number-conserving systems of interacting bosons relevant for collective states in even-even nuclei. The Hamiltonian is resolved into intrinsic (bandhead related) and collective (in-band related) parts. Shape parameters are introduced through non-spherical boson bases. Intrinsic modes decoupled from the spurious modes are obtained from the intinsic part of the Hamiltonian in the limit of large number of bosons. Intrinsic states are constructed and serve to evaluate electromagnetic transition rates. The method is illustrated for systems with one type of boson as well as with proton-neutron bosons. 28 refs., 1 fig.

  1. Intrinsic endometriosis of ureter: a case report

    International Nuclear Information System (INIS)

    Hong, Myung Sun; Kim, Ho Chul; Yun, Ku Sup; Choi, Chul Soon; Bae, Sang Hoon; Kim, Sung Yong; Shin, Hyung Sik

    1995-01-01

    Endometriosis is a rare cause of an ureteral obstruction. We report a case of intrinsic ureteral endometriosis resulting in severe hydroureteronephrosis. The diagnosis of ureteral endometriosis may be considered in women with flank pain and ureteric obstruction within true pelvis

  2. The Intrinsic Dynamics of Psychological Process

    NARCIS (Netherlands)

    Vallacher, Robin R.; van Geert, Paul; Nowak, Andrzej

    2015-01-01

    Psychological processes unfold on various timescales in accord with internally generated patterns. The intrinsic dynamism of psychological process is difficult to investigate using traditional methods emphasizing cause–effect relations, however, and therefore is rarely incorporated into social

  3. Deuterium NMR, induced and intrinsic cholesteric lyomesophases

    International Nuclear Information System (INIS)

    Alcantara, M.R.

    1982-01-01

    Induced and intrinsic cholesteric lyotropic mesophases were studied. Induced cholesteric lyomesophases based on potassium laurate (KL) system, with small amounts of cholesterol added, were studied by deuterium NMR and by polarizing microscopy. Order profiles obtained from deuterium NMR of KL perdenderated chains in both induced cholesteric and normal mesophases were compared. The intrinsic cholesteric lyotropic mesophases were based on the amphiphile potassium N-lauroyl serinate (KLNS) in the resolved levo form. The study of the type I intrinsic cholesteric mesophase was made by optical microscopy under polarized light and the type II intrinsic cholesteric lyomesophase was characterized by deuterium NMR. The new texture was explained by the use of the theory of disclinations developed for thermotropic liquid crystals, specially for cholesteric type. (M.J.C.) [pt

  4. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  5. Intrinsic and acquired resistance mechanisms in enterococcus

    Science.gov (United States)

    Hollenbeck, Brian L.; Rice, Louis B.

    2012-01-01

    Enterococci have the potential for resistance to virtually all clinically useful antibiotics. Their emergence as important nosocomial pathogens has coincided with increased expression of antimicrobial resistance by members of the genus. The mechanisms underlying antibiotic resistance in enterococci may be intrinsic to the species or acquired through mutation of intrinsic genes or horizontal exchange of genetic material encoding resistance determinants. This paper reviews the antibiotic resistance mechanisms in Enterococcus faecium and Enterococcus faecalis and discusses treatment options. PMID:23076243

  6. The intrinsic resistome of bacterial pathogens

    Directory of Open Access Journals (Sweden)

    Jorge Andrés Olivares Pacheco

    2013-04-01

    Full Text Available Intrinsically resistant bacteria have emerged as a relevant health problem in the last years. Those bacterial species, several of them with an environmental origin, present naturally a low-level susceptibility to several drugs. It has been proposed that intrinsic resistance is mainly the consequence of the impermeability of cellular envelopes, the activity of multidrug efflux pumps or the lack of appropriate targets for a given family of drugs. However, recently published articles indicate that the characteristic phenotype of susceptibility to antibiotics of a given bacterial species depends on the concerted activity of several elements, what has been named as intrinsic resistome. These determinants comprise not just classical resistance genes. Other elements, several of them involved in basic bacterial metabolic processes, are of relevance for the intrinsic resistance of bacterial pathogens. In the present review we analyse recent publications on the intrinsic resistomes of Escherichia coli and Pseudomonas aeruginosa. We present as well information on the role that global regulators of bacterial metabolism, as Crc from P. aeruginosa, may have on modulating bacterial susceptibility to antibiotics. Finally, we discuss the possibility of searching inhibitors of the intrinsic resistome in the aim of improving the activity of drugs currently in use for clinical practice.

  7. Incentives and intrinsic motivation in healthcare.

    Science.gov (United States)

    Berdud, Mikel; Cabasés, Juan M; Nieto, Jorge

    It has been established in the literature that workers within public organisations are intrinsically motivated. This paper is an empirical study of the healthcare sector using methods of qualitative analysis research, which aims to answer the following hypotheses: 1) doctors are intrinsically motivated; 2) economic incentives and control policies may undermine doctors' intrinsic motivation; and 3) well-designed incentives may encourage doctors' intrinsic motivation. We conducted semi-structured interviews à-la-Bewley with 16 doctors from Navarre's Healthcare Service (Servicio Navarro de Salud-Osasunbidea), Spain. The questions were based on current theories of intrinsic motivation and incentives to test the hypotheses. Interviewees were allowed to respond openly without time constraints. Relevant information was selected, quantified and analysed by using the qualitative concepts of saturation and codification. The results seem to confirm the hypotheses. Evidence supporting hypotheses 1 and 2 was gathered from all interviewees, as well as indications of the validity of hypothesis 3 based on interviewees' proposals of incentives. The conclusions could act as a guide to support the optimal design of incentive policies and schemes within health organisations when healthcare professionals are intrinsically motivated. Copyright © 2016 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  8. COMPUTER SECURITY AND SECURITY TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Lazar Stošić

    2013-01-01

    Full Text Available With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information. A set of tools, procedures, policies and solutions to defend against attacks are collectively referred to as computer network security. It is necessary above all to define and learn about the concepts of attack, risk, threat, vulnerability and asset value. During the design and implementation of information systems should primarily take into account a set of measures to increase security and maintenance at an acceptable level of risk. In any case, there is a need to know the risks in the information system. Sources of potential security problems are challenges and attacks, while the risk relates to the probable outcome and its associated costs due to occurrence of certain events. There are numerous techniques help protect your computer: cryptography, authentication, checked the software, licenses and certificates, valid authorization... This paper explains some of the procedures and potential threats to break into the network and computers as well as potential programs that are used. Guidance and explanation of these programs is not to cause a break-in at someone else's computer, but to highlight the vulnerability of the computer's capabilities.

  9. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  10. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  11. Wearable Intrinsically Soft, Stretchable, Flexible Devices for Memories and Computing.

    Science.gov (United States)

    Rajan, Krishna; Garofalo, Erik; Chiolerio, Alessandro

    2018-01-27

    A recent trend in the development of high mass consumption electron devices is towards electronic textiles (e-textiles), smart wearable devices, smart clothes, and flexible or printable electronics. Intrinsically soft, stretchable, flexible, Wearable Memories and Computing devices (WMCs) bring us closer to sci-fi scenarios, where future electronic systems are totally integrated in our everyday outfits and help us in achieving a higher comfort level, interacting for us with other digital devices such as smartphones and domotics, or with analog devices, such as our brain/peripheral nervous system. WMC will enable each of us to contribute to open and big data systems as individual nodes, providing real-time information about physical and environmental parameters (including air pollution monitoring, sound and light pollution, chemical or radioactive fallout alert, network availability, and so on). Furthermore, WMC could be directly connected to human brain and enable extremely fast operation and unprecedented interface complexity, directly mapping the continuous states available to biological systems. This review focuses on recent advances in nanotechnology and materials science and pays particular attention to any result and promising technology to enable intrinsically soft, stretchable, flexible WMC.

  12. Digested disorder: Quarterly intrinsic disorder digest (July-August-September, 2013).

    Science.gov (United States)

    Reddy, Krishna D; DeForte, Shelly; Uversky, Vladimir N

    2014-01-01

    The current literature on intrinsically disordered proteins grows fast. To keep interested readers up to speed with this literature, we continue a "Digested Disorder" project and represent a new issue of reader's digest of the research papers and reviews on intrinsically disordered proteins. The only 2 criteria for inclusion in this digest are the publication date (a paper should be published within the covered time frame) and topic (a paper should be dedicated to any aspect of protein intrinsic disorder). The current digest issue covers papers published during the third quarter of 2013; i.e., during the period of June, July, and September of 2013. Similar to previous issues, the papers are grouped hierarchically by topics they cover, and for each of the included paper a short description is given on its major findings.

  13. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  14. Fast Convolution Module (Fast Convolution Module)

    National Research Council Canada - National Science Library

    Bierens, L

    1997-01-01

    This report describes the design and realisation of a real-time range azimuth compression module, the so-called 'Fast Convolution Module', based on the fast convolution algorithm developed at TNO-FEL...

  15. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  16. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  17. Fast solvers for concentrated elastic contact problems

    NARCIS (Netherlands)

    Zhao, J.

    2015-01-01

    Rail transportation plays an important role in our everyday life, and there is fast development and modernization in the railway industry to meet the growing demand for swifter, safer and more comfortable trains. At the same time, the security of train operation and the maintenance of rails have to

  18. Secure DBMS.

    Science.gov (United States)

    1982-02-01

    F30602-80-C- 0235 9. PERFORMING ORGANIZATION NAME AND ADDRESS I0. PROGRAM ELEMENT. PROJECT. TASK HARRIS CORPORATION AREA & WORK UNIT NUMBERS Government...performed for the Rome Air Development Center under Contract F30602-80-C- 0235 . The study was performed by the staff of the Hprris Corporation...processors from making TM - HP 6-31 simultaneous incompatable changes to the data base. However, the simple security rule prohibits a lower level

  19. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  20. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  1. Security Engineering

    Science.gov (United States)

    2012-01-31

    Clarkson, Chong, and Myers, 2008; Fujioka and Okamoto, 1992] across a diverse set of redundant components. For example, an automobile brake control...e.g., a radio frequency spectrum analyzer embedded in a subsystem’s hardware chassis , and listening for a wireless triggering command at the time of...S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage, Experimental security analysis of a modern automobile , IEEE Symposium on

  2. Intrinsic Risk Factors of Lateral Ankle Sprain: A Systematic Review and Meta-analysis.

    Science.gov (United States)

    Kobayashi, Takumi; Tanaka, Masashi; Shida, Masahiro

    2016-01-01

    Lateral ankle ligamentous sprain (LAS) is one of the most common injuries in recreational activities and competitive sports. Many studies have attempted to determine whether there are certain intrinsic factors that can predict LAS. However, no consensus has been reached on the predictive intrinsic factors. To identify the intrinsic risk factors of LAS by meta-analysis from data in randomized control trials and prospective cohort studies. A systematic computerized literature search of MEDLINE, CINAHL, ScienceDirect, SPORTDiscus, and Cochrane Register of Clinical Trials was performed. A computerized literature search from inception to January 2015 resulted in 1133 studies of the LAS intrinsic risk factors written in English. Systematic review. Level 4. The modified quality index was used to assess the quality of the design of the papers and the standardized mean difference was used as an index to pool included study outcomes. Eight articles were included in this systematic review. Meta-analysis results showed that body mass index, slow eccentric inversion strength, fast concentric plantar flexion strength, passive inversion joint position sense, and peroneus brevis reaction time correlated with LAS. Body mass index, slow eccentric inversion strength, fast concentric plantar flexion strength, passive inversion joint position sense, and the reaction time of the peroneus brevis were associated with significantly increased risk of LAS.

  3. Application of direct agglutination test (DAT) and fast agglutination screening test (FAST) for sero-diagnosis of visceral leishmaniasis in endemic area of Minas Gerais, Brazil

    NARCIS (Netherlands)

    Silva, Eduardo S.; Schoone, Gerard J.; Gontijo, Celia M. F.; Brazil, Reginaldo P.; Pacheco, Raquel S.; Schallig, Henk D. F. H.

    2005-01-01

    The direct agglutination test (DAT) has proved to be a very important sero-diagnostic tool combining high levels of intrinsic validity and ease of performance. Otherwise, fast agglutination screening test (FAST) utilises only one serum dilution making the test very suitable for the screening of

  4. Functions of intrinsic disorder in transmembrane proteins

    DEFF Research Database (Denmark)

    Kjaergaard, Magnus; Kragelund, Birthe B.

    2017-01-01

    mechanisms. (3) Trafficking of membrane proteins. (4) Transient membrane associations. (5) Post-translational modifications most notably phosphorylation and (6) disorder-linked isoform dependent function. We finish the review by discussing the future challenges facing the membrane protein community regarding......Intrinsic disorder is common in integral membrane proteins, particularly in the intracellular domains. Despite this observation, these domains are not always recognized as being disordered. In this review, we will discuss the biological functions of intrinsically disordered regions of membrane...... proteins, and address why the flexibility afforded by disorder is mechanistically important. Intrinsically disordered regions are present in many common classes of membrane proteins including ion channels and transporters; G-protein coupled receptors (GPCRs), receptor tyrosine kinases and cytokine...

  5. Management Control, Intrinsic Motivation and Creativity

    DEFF Research Database (Denmark)

    Godt Gregersen, Mikkel

    of the conclusion is that intrinsic motivation and management control can coexist under the conditions that all three basic needs, i.e. autonomy, competence and relatedness, are supported. This can happen when control takes point of departure in the individual employee. The second part of the conclusion......This thesis consists of a cape and three papers. The overall research question is: How can intrinsic motivation and management control coexist in a creative environment and how can coordination be possible in such a context? The cape ties together the research done in the three papers....... It is divided into six sections. The first section introduces the concepts of intrinsic motivation, creativity and management control. This is followed by a section on management control in a creative context. These two sections frame the thesis and introduce the setting in which the research has been done...

  6. Cell intrinsic control of axon regeneration

    Science.gov (United States)

    Mar, Fernando M; Bonni, Azad; Sousa, Mónica M

    2014-01-01

    Although neurons execute a cell intrinsic program of axonal growth during development, following the establishment of connections, the developmental growth capacity declines. Besides environmental challenges, this switch largely accounts for the failure of adult central nervous system (CNS) axons to regenerate. Here, we discuss the cell intrinsic control of axon regeneration, including not only the regulation of transcriptional and epigenetic mechanisms, but also the modulation of local protein translation, retrograde and anterograde axonal transport, and microtubule dynamics. We further explore the causes underlying the failure of CNS neurons to mount a vigorous regenerative response, and the paradigms demonstrating the activation of cell intrinsic axon growth programs. Finally, we present potential mechanisms to support axon regeneration, as these may represent future therapeutic approaches to promote recovery following CNS injury and disease. PMID:24531721

  7. Intrinsic radioactivity of KSr2I5:Eu2+

    International Nuclear Information System (INIS)

    Rust, M.; Melcher, C.; Lukosi, E.

    2016-01-01

    A current need in nuclear security is an economical, yet high energy resolution (near 2%), scintillation detector suitable for gamma-ray spectroscopy. For current scintillators on the market, there is an inverse relationship between scintillator energy resolution and cost of production. A new promising scintillator, KSr 2 I 5 :Eu 2+ , under development at the University of Tennessee, has achieved an energy resolution of 2.4% at 662 keV at room temperature, with potential growth rates exceeding several millimeters per hour. However, the internal background due to the 40 K content could present a hurdle for effective source detection/identification in nuclear security applications. As a first step in addressing this question, this paper reports on a computational investigation of the intrinsic differential pulse height spectrum (DPHS) generated by 40 K within the KSr 2 I 5 :Eu 2+ scintillator as a function of crystal geometry. It was found that the DPHS remains relatively equal to a constant multiplicative factor of the negatron emission spectrum with a direct increase of the 1.46 MeV photopeak relative height to the negatron spectrum with volume. Further, peak pileup does not readily manifest itself for practical KSr 2 I 5 :Eu 2+ volumes.

  8. Insulin aggregation tracked by its intrinsic TRES

    Science.gov (United States)

    Chung, Li Hung C.; Birch, David J. S.; Vyshemirsky, Vladislav; Ryadnov, Maxim G.; Rolinski, Olaf J.

    2017-12-01

    Time-resolved emission spectra (TRES) have been used to detect conformational changes of intrinsic tyrosines within bovine insulin at a physiological pH. The approach offers the ability to detect the initial stages of insulin aggregation at the molecular level. The data analysis has revealed the existence of at least three fluorescent species undergoing dielectric relaxation and significant spectral changes due to insulin aggregation. The results indicate the suitability of the intrinsic TRES approach for insulin studies and for monitoring its stability during storage and aggregation in insulin delivery devices.

  9. Intrinsic viscosity of a suspension of cubes

    KAUST Repository

    Mallavajula, Rajesh K.

    2013-11-06

    We report on the viscosity of a dilute suspension of cube-shaped particles. Irrespective of the particle size, size distribution, and surface chemistry, we find empirically that cubes manifest an intrinsic viscosity [η]=3.1±0.2, which is substantially higher than the well-known value for spheres, [η]=2.5. The orientation-dependent intrinsic viscosity of cubic particles is determined theoretically using a finite-element solution of the Stokes equations. For isotropically oriented cubes, these calculations show [η]=3.1, in excellent agreement with our experimental observations. © 2013 American Physical Society.

  10. Intrinsic entropy perturbations from the dark sector

    Science.gov (United States)

    Celoria, Marco; Comelli, Denis; Pilo, Luigi

    2018-03-01

    Perfect fluids are modeled by using an effective field theory approach which naturally gives a self-consistent and unambiguous description of the intrinsic non-adiabatic contribution to pressure variations. We study the impact of intrinsic entropy perturbation on the superhorizon dynamics of the curvature perturbation Script R in the dark sector. The dark sector, made of dark matter and dark energy is described as a single perfect fluid. The non-perturbative vorticity's dynamics and the Weinberg theorem violation for perfect fluids are also studied.

  11. A model of intrinsic symmetry breaking

    International Nuclear Information System (INIS)

    Ge, Li; Li, Sheng; George, Thomas F.; Sun, Xin

    2013-01-01

    Different from the symmetry breaking associated with a phase transition, which occurs when the controlling parameter is manipulated across a critical point, the symmetry breaking presented in this Letter does not need parameter manipulation. Instead, the system itself suddenly undergoes symmetry breaking at a certain time during its evolution, which is intrinsic symmetry breaking. Through a polymer model, it is revealed that the origin of the intrinsic symmetry breaking is nonlinearity, which produces instability at the instance when the evolution crosses an inflexion point, where this instability breaks the original symmetry

  12. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  13. Security-by-design handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  14. First results on fast baking

    Energy Technology Data Exchange (ETDEWEB)

    Visentin, B. [CEA-Saclay, DSM/DAPNIA/SACM - 91191 Gif/Yvette Cedex (France)]. E-mail: bvisentin@cea.fr; Gasser, Y. [CEA-Saclay, DSM/DAPNIA/SACM - 91191 Gif/Yvette Cedex (France); Charrier, J.P. [CEA-Saclay, DSM/DAPNIA/SACM - 91191 Gif/Yvette Cedex (France)

    2006-07-15

    High gradient performances of bulk niobium cavities go through a low-temperature baking during one or two days, the temperature parameter is adjusted in a narrow tuning range around 110 or 120deg, C. With such treatment, the intrinsic quality factor Q{sub 0} is improved at high fields. Assuming the oxygen diffusion is involved in this phenomenon, we have developed the 'fast baking' (145deg, C/3h) as an alternative method. Similar results have been achieved with this method compared to standard baking. Consequently, for the first time, a link between oxygen diffusion and high field Q-slope has been demonstrated. Furthermore, this method open the way to a simpler and better baking procedure for the large-scale cavity production due to:*time reduction and *possibility to combine baking and drying during cavity preparation.

  15. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  16. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    The inclusion of China, India, Japan, Singapore and Italy as permanent observers in the Arctic Council has increased the international status of this forum significantly. This chapter aims to explain the background for the increased international interest in the Arctic region through an analysis...... of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  17. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  18. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    and real defence of the country’s neutrality let alone a capability to support possible League of Nations action, should such need arise. The anti-militarist ideology of one party, led to regarding the armed services as harmful to designs for developing civic society and a waste of resources generally...... disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible and real defence of the country’s neutrality let alone a capability to support possible League of Nations action, should such need arise. The anti-militarist ideology...

  19. Frustration-induced protein intrinsic disorder.

    Science.gov (United States)

    Matsushita, Katsuyoshi; Kikuchi, Macoto

    2013-03-14

    Spontaneous folding into a specific native structure is the most important property of protein to perform their biological functions within organisms. Spontaneous folding is understood on the basis of an energy landscape picture based on the minimum frustration principle. Therefore, frustration seemingly only leads to protein functional disorder. However, frustration has recently been suggested to have a function in allosteric regulation. Functional frustration has the possibility to be a key to our deeper understanding of protein function. To explore another functional frustration, we theoretically examined structural frustration, which is designed to induce intrinsic disorder of a protein and its function through the coupled folding and binding. We extended the Wako-Saitô-Muñoz-Eaton model to take into account a frustration effect. With the model, we analyzed the binding part of neuron-restrictive silencer factor and showed that designed structural frustration in it induces intrinsic disorder. Furthermore, we showed that the folding and the binding are cooperative in interacting with a target protein. The cooperativity enables an intrinsically disordered protein to exhibit a sharp switch-like folding response to binding chemical potential change. Through this switch-like response, the structural frustration may contribute to the regulation function of interprotein interaction of the intrinsically disordered protein.

  20. Simple intrinsic defects in InAs :

    Energy Technology Data Exchange (ETDEWEB)

    Schultz, Peter Andrew

    2013-03-01

    This Report presents numerical tables summarizing properties of intrinsic defects in indium arsenide, InAs, as computed by density functional theory using semi-local density functionals, intended for use as reference tables for a defect physics package in device models.

  1. INTRINSIC AND EXTRINSIC MOTIVATION IN THE SELECTION ...

    African Journals Online (AJOL)

    A psychological perspective is considered that applies intrinsic and extrinsic motivational concepts to communication phenomena. The paper also tries to develop an analytical understanding of human communication-related behavior with respect to the two types of motives. Proposals are also put forward to communication ...

  2. Intrinsic and Extrinsic Motivation among Collegiate Instrumentalists

    Science.gov (United States)

    Diaz, Frank M.

    2010-01-01

    The purpose of this study was to gather and compare information on measures of intrinsic and extrinsic motivation among instrumentalists enrolled in collegiate ensembles. A survey instrument was developed to gather information concerning demographic data and responses to questions on motivational preference. Participants were undergraduate and…

  3. A rotational integral formula for intrinsic volumes

    DEFF Research Database (Denmark)

    Jensen, Eva Bjørn Vedel; Rataj, J.

    2008-01-01

    A rotational version of the famous Crofton formula is derived. The motivation for deriving the formula comes from local stereology, a new branch of stereology based on sections through fixed reference points. The formula shows how rotational averages of intrinsic volumes measured on sections...

  4. Original Paper Detecting Nosocomial Intrinsic Infections through ...

    African Journals Online (AJOL)

    2011-04-20

    Apr 20, 2011 ... Key Words: Bacterial pathogens, Endogenous indicators, NosocomiaI infection, Surgery. Received 30 October 2010/ Accepted 30 March 2011. INTRODUCTION. Micro-organisms from intrinsic and extrinsic sources have been known to cause nosocomial infections (CDC, 1991). The human body enables.

  5. Organisational Learning and Employees' Intrinsic Motivation

    Science.gov (United States)

    Remedios, Richard; Boreham, Nick

    2004-01-01

    This study examined the effects of organisational learning initiatives on employee motivation. Four initiatives consistent with theories of organisational learning were a priori ranked in terms of concepts that underpin intrinsic-motivation theory. Eighteen employees in a UK petrochemical company were interviewed to ascertain their experiences of…

  6. Intrinsic Motivation, Organizational Justice, and Creativity

    Science.gov (United States)

    Hannam, Kalli; Narayan, Anupama

    2015-01-01

    For employees to generate creative ideas that are not only original, but also useful to their company, they must interact with their workplace environment to determine organizational needs. Therefore, it is important to consider aspects of the individual as well as their environment when studying creativity. Intrinsic motivation, a predictor of…

  7. Discovery of Intrinsic Primitives on Triangle Meshes

    KAUST Repository

    Solomon, Justin

    2011-04-01

    The discovery of meaningful parts of a shape is required for many geometry processing applications, such as parameterization, shape correspondence, and animation. It is natural to consider primitives such as spheres, cylinders and cones as the building blocks of shapes, and thus to discover parts by fitting such primitives to a given surface. This approach, however, will break down if primitive parts have undergone almost-isometric deformations, as is the case, for example, for articulated human models. We suggest that parts can be discovered instead by finding intrinsic primitives, which we define as parts that posses an approximate intrinsic symmetry. We employ the recently-developed method of computing discrete approximate Killing vector fields (AKVFs) to discover intrinsic primitives by investigating the relationship between the AKVFs of a composite object and the AKVFs of its parts. We show how to leverage this relationship with a standard clustering method to extract k intrinsic primitives and remaining asymmetric parts of a shape for a given k. We demonstrate the value of this approach for identifying the prominent symmetry generators of the parts of a given shape. Additionally, we show how our method can be modified slightly to segment an entire surface without marking asymmetric connecting regions and compare this approach to state-of-the-art methods using the Princeton Segmentation Benchmark. © 2011 The Author(s).

  8. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    of Europe, in the early 1920s the prospects for peace looked promising. Under these circumstances, buttressed by pacifism as the logical reaction to the carnage of the Great War, many a Danish politician on the Left believed that the provisions of the Covenant calling for nations to disarm should...... of the Great War, many a Danish politician on the Left believed that the provisions of the Covenant calling for nations to disarm should be implemented, the sooner the better. In order to accelerate peaceful development, and because their armed forces were seen rather as harmful than conducive to security...... to the international milieu and to the European trend towards reconciliation. New issues assumed prominence as a consequence of the post-war quest for peace and prosperity. Reconstruction of society and increased emphasis on welfare measures brought economy into focus of political canvassing. The League of Nations...

  9. Identifying the neural substrates of intrinsic motivation during task performance.

    Science.gov (United States)

    Lee, Woogul; Reeve, Johnmarshall

    2017-10-01

    Intrinsic motivation is the inherent tendency to seek out novelty and challenge, to explore and investigate, and to stretch and extend one's capacities. When people imagine performing intrinsically motivating tasks, they show heightened anterior insular cortex (AIC) activity. To fully explain the neural system of intrinsic motivation, however, requires assessing neural activity while people actually perform intrinsically motivating tasks (i.e., while answering curiosity-inducing questions or solving competence-enabling anagrams). Using event-related functional magnetic resonance imaging, we found that the neural system of intrinsic motivation involves not only AIC activity, but also striatum activity and, further, AIC-striatum functional interactions. These findings suggest that subjective feelings of intrinsic satisfaction (associated with AIC activations), reward processing (associated with striatum activations), and their interactions underlie the actual experience of intrinsic motivation. These neural findings are consistent with the conceptualization of intrinsic motivation as the pursuit and satisfaction of subjective feelings (interest and enjoyment) as intrinsic rewards.

  10. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  11. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  12. Intrinsic Motivation in Open Source Software Development

    DEFF Research Database (Denmark)

    Bitzer, J.; W., Schrettl,; Schröder, Philipp

    2004-01-01

    This papers sheds light on the puzzling evidence that even though open source software (OSS) is a public good, it is developed for free by highly qualified, young and motivated individuals, and evolves at a rapid pace. We show that once OSS development is understood as the private provision...... of a public good, these features emerge quite naturally. We adapt a dynamic private-provision-of-public-goods model to reflects key aspects of the OSS phenomenon. In particular, instead of relying on extrinsic motives for programmers (e.g. signaling) the present model is driven by intrinsic motives of OSS...... programmers, such as user-programmers, play value or \\emph{homo ludens} payoff, and gift culture benefits. Such intrinsic motives feature extensively in the wider OSS literature and turn out to add new insights to the economic analysis....

  13. Does Aerobic Exercise Influence Intrinsic Brain Activity?

    DEFF Research Database (Denmark)

    Flodin, Pär; Jonasson, Lars S; Riklund, Katrin

    2017-01-01

    Previous studies have indicated that aerobic exercise could reduce age related decline in cognition and brain functioning. Here we investigated the effects of aerobic exercise on intrinsic brain activity. Sixty sedentary healthy males and females (64-78 years) were randomized into either an aerobic...... exercise group or an active control group. Both groups recieved supervised training, 3 days a week for 6 months. Multimodal brain imaging data was acquired before and after the intervention, including 10 min of resting state brain functional magnetic resonance imaging (rs-fMRI) and arterial spin labeling...... group improved more. Contrary to our hypothesis, we did not observe any significant group by time interactions with regard to any measure of intrinsic activity. To further probe putative relationships between fitness and brain activity, we performed post hoc analyses disregarding group belongings...

  14. Documentation Requirements, Intrinsic Motivation, and Worker Absence

    DEFF Research Database (Denmark)

    Andersen, Lotte Bøgh; Kristensen, Nicolai; Pedersen, Lene Holm

    2015-01-01

    Command systems are widely used to monitor public service provision, but little is known about unintended effects on individual workers’ motivation and work effort. Using insights from motivation crowding theory, we estimate a SEM model that captures how Danish childcare assistants and social...... and higher sickness absence. The association is statistically significant, but very small in substantive terms. The result is nevertheless consistent with the expectation in motivation crowding theory and contributes to the literature by including a new, reliable behavioral variable—sickness absence....../healthcare assistants perceive documentation requirements. We analyze how this perception relates to intrinsic motivation measured in a survey and sickness absence as reported in administrative registers, and find that individuals who perceive documentation requirements as controlling have lower intrinsic motivation...

  15. Extrinsic and intrinsic determinants of nerve regeneration

    Directory of Open Access Journals (Sweden)

    Toby A. Ferguson

    2011-01-01

    Full Text Available After central nervous system (CNS injury axons fail to regenerate often leading to persistent neurologic deficit although injured peripheral nervous system (PNS axons mount a robust regenerative response that may lead to functional recovery. Some of the failures of CNS regeneration arise from the many glial-based inhibitory molecules found in the injured CNS, whereas the intrinsic regenerative potential of some CNS neurons is actively curtailed during CNS maturation and limited after injury. In this review, the molecular basis for extrinsic and intrinsic modulation of axon regeneration within the nervous system is evaluated. A more complete understanding of the factors limiting axonal regeneration will provide a rational basis, which is used to develop improved treatments for nervous system injury.

  16. Intrinsic point defects in aluminum antimonide

    OpenAIRE

    Åberg, Daniel; Erhart, Paul; Williamson, Andrew J.; Lordi, Vincenzo

    2010-01-01

    Calculations within density functional theory on the basis of the local density approximation are carried out to study the properties of intrinsic point defects in aluminum antimonide. Special care is taken to address finite-size effects, band gap error, and symmetry reduction in the defect structures. The correction of the band gap is based on a set of GW calculations. The most important defects are identified to be the aluminum interstitial $Al_{i,Al}^{1+}$, the antimony antisites $Sb_{Al}^...

  17. Intrinsic luminescence of alkali silicate glasses

    Energy Technology Data Exchange (ETDEWEB)

    Arbuzov, V.I.; Grabovskis, V.Y.; Tolstoi, M.N.; Vitol, I.K.

    1986-09-01

    This study obtains additional information on L centers and their role in electron excitation and intrinsic luminescence of a whole series. (Li, Na, K, Rb, and Cs) of alkali silicate glasses. The authors compare the features of the interaction with radiation of specimens of glass and crystal of a similar chemical composition, since silicates of alkali metals can be obtained in both the glassy and crystalline states.

  18. Intrinsic work motivation and pension reform acceptance

    OpenAIRE

    Heinemann, Friedrich; Hennighausen, Tanja; Moessinger, Marc-Daniel

    2011-01-01

    Although demographic change leaves pay-as-you-go pension systems unsustainable, reforms, such as a higher pension age, are highly unpopular. This contribution looks into the role of intrinsic motivation as a driver for pension reform acceptance. Theoretical reasoning suggests that this driver should be relevant: The choice among different pension reform options (increasing pension age, increasing contributions, cutting pensions) can be analyzed within the framework of an optimal job separatio...

  19. A structural model of intrinsic motivation

    OpenAIRE

    Aguilar, Javier; González, Daniel; Aguilar, Amira

    2017-01-01

    The main purpose of this research was to develop and test a structural model of intrinsic motivation among students of the University of Sonora to the curriculum of their careers. A secondary objective was to overcome the limitations of the model developed among students of the UNAM. Eight psychometric scales developed by the authors in previous studies were used, which showed satisfactory reliability and validity values. The model tested was similar to the sample of the UNAM, except for the ...

  20. Moral Distress, Workplace Health, and Intrinsic Harm.

    Science.gov (United States)

    Weber, Elijah

    2016-05-01

    Moral distress is now being recognized as a frequent experience for many health care providers, and there's good evidence that it has a negative impact on the health care work environment. However, contemporary discussions of moral distress have several problems. First, they tend to rely on inadequate characterizations of moral distress. As a result, subsequent investigations regarding the frequency and consequences of moral distress often proceed without a clear understanding of the phenomenon being discussed, and thereby risk substantially misrepresenting the nature, frequency, and possible consequences of moral distress. These discussions also minimize the intrinsically harmful aspects of moral distress. This is a serious omission. Moral distress doesn't just have a negative impact on the health care work environment; it also directly harms the one who experiences it. In this paper, I claim that these problems can be addressed by first clarifying our understanding of moral distress, and then identifying what makes moral distress intrinsically harmful. I begin by identifying three common mistakes that characterizations of moral distress tend to make, and explaining why these mistakes are problematic. Next, I offer an account of moral distress that avoids these mistakes. Then, I defend the claim that moral distress is intrinsically harmful to the subject who experiences it. I conclude by explaining how acknowledging this aspect of moral distress should reshape our discussions about how best to deal with this phenomenon. © 2015 John Wiley & Sons Ltd.

  1. Intrinsic electron trapping in amorphous oxide

    Science.gov (United States)

    Strand, Jack; Kaviani, Moloud; Afanas’ev, Valeri V.; Lisoni, Judit G.; Shluger, Alexander L.

    2018-03-01

    We demonstrate that electron trapping at intrinsic precursor sites is endemic in non-glass-forming amorphous oxide films. The energy distributions of trapped electron states in ultra-pure prototype amorphous (a)-HfO2 insulator obtained from exhaustive photo-depopulation experiments demonstrate electron states in the energy range of 2–3 eV below the oxide conduction band. These energy distributions are compared to the results of density functional calculations of a-HfO2 models of realistic density. The experimental results can be explained by the presence of intrinsic charge trapping sites formed by under-coordinated Hf cations and elongated Hf–O bonds in a-HfO2. These charge trapping states can capture up to two electrons, forming polarons and bi-polarons. The corresponding trapping sites are different from the dangling-bond type defects responsible for trapping in glass-forming oxides, such as SiO2, in that the traps are formed without bonds being broken. Furthermore, introduction of hydrogen causes formation of somewhat energetically deeper electron traps when a proton is immobilized next to the trapped electron bi-polaron. The proposed novel mechanism of intrinsic charge trapping in a-HfO2 represents a new paradigm for charge trapping in a broad class of non-glass-forming amorphous insulators.

  2. Learning intrinsic excitability in medium spiny neurons.

    Science.gov (United States)

    Scheler, Gabriele

    2013-01-01

    We present an unsupervised, local activation-dependent learning rule for intrinsic plasticity (IP) which affects the composition of ion channel conductances for single neurons in a use-dependent way. We use a single-compartment conductance-based model for medium spiny striatal neurons in order to show the effects of parameterization of individual ion channels on the neuronal membrane potential-curent relationship (activation function). We show that parameter changes within the physiological ranges are sufficient to create an ensemble of neurons with significantly different activation functions. We emphasize that the effects of intrinsic neuronal modulation on spiking behavior require a distributed mode of synaptic input and can be eliminated by strongly correlated input. We show how modulation and adaptivity in ion channel conductances can be utilized to store patterns without an additional contribution by synaptic plasticity (SP). The adaptation of the spike response may result in either "positive" or "negative" pattern learning. However, read-out of stored information depends on a distributed pattern of synaptic activity to let intrinsic modulation determine spike response. We briefly discuss the implications of this conditional memory on learning and addiction.

  3. An introduction to information security and ISO27001:2013

    CERN Document Server

    Watkins, Steve

    2013-01-01

    Up to date with the latest version of the Standard (ISO27001:2013), An Introduction to information security and ISO27001:2013 is the perfect solution for anyone wanting an accurate, fast, easy-to-read primer on information security from an acknowledged expert on ISO27001.

  4. Scaling up: Expanding the impact of food security and nutrition ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Corey Piccioni

    Together with partners, IDRC is scaling up proven food security and nutrition solutions to benefit ... of complementary approaches to achieve large-scale positive change in food security and nutrition: ... Precooked beans are an affordable and fast-cooking new product that is boosting the consumption of nutritious pulses.

  5. Rural social security for Zimbabwe: Challenges and opportunities for ...

    African Journals Online (AJOL)

    For them, the remaining sources of livelihood now reside in non-formal social security arrangements anchored upon a staggering cultural base being eroded by the fast encroaching tide of neoliberal individualistic ways of life. Regrettably, government has got no institutional framework to promote non-formal security ...

  6. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  7. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  8. Endpoint Security Using Biometric Authentication for Secure Remote Mission Operations

    Science.gov (United States)

    Donohue, John T.; Critchfield, Anna R.

    2000-01-01

    We propose a flexible security authentication solution for the spacecraft end-user, which will allow the user to interact over Internet with the spacecraft, its instruments, or with the ground segment from anywhere, anytime based on the user's pre-defined set of privileges. This package includes biometrics authentication products, such as face, voice or fingerprint recognition, authentication services and procedures, such as: user registration and verification over the Internet and user database maintenance, with a configurable schema of spacecraft users' privileges. This fast and reliable user authentication mechanism will become an integral part of end-to-end ground-to-space secure Internet communications and migration from current practice to the future. All modules and services of the proposed package are commercially available and built to the NIST BioAPI standard, which facilitates "pluggability" and interoperability.

  9. Kinetics of agonist-induced intrinsic fluorescence changes in the Torpedo acetylcholine receptor.

    Science.gov (United States)

    Kawai, Hideki; Raftery, Michael A

    2010-05-01

    The nicotinic acetylcholine receptor from Torpedo electric organs is a ligand-gated ion channel that undergoes conformational transitions for activation and/or desensitization. Earlier work suggested that intrinsic fluorescence changes of the receptor monitors kinetic transitions toward the high-affinity, desensitized state. Here, using highly purified membrane preparations to minimize contaminating fluorescence, we examined kinetic mechanisms of the receptor as monitored by its intrinsic fluorescence. Fluorescence changes were specific to the receptor as they were blocked by alpha-bungarotoxin and were induced by agonists, but not by the antagonist hexamethonium. Acetylcholine, carbamylcholine and suberyldicholine showed only one kinetic phase with relatively fast rates (t(1/2) = 0.2-1.2 s). Effective dissociation constants were at least an order of magnitude higher than the high affinity, equilibrium binding constants for these agonists. A semirigid agonist isoarecolone-methiodide, whose activation constant was approximately 3-fold lower than acetylcholine, induced an additional slow phase (t(1/2) = 4.5-9 s) with apparent rates that increased and then decreased in a concentration dependent manner, revealing a branched mechanism for conformational transitions. We propose that the intrinsic fluorescence changes of the receptor describe a process(es) toward a fast desensitization state prior to the formation of the high affinity state.

  10. Seamless and secure communications over heterogeneous wireless networks

    CERN Document Server

    Cao, Jiannong

    2014-01-01

    This brief provides an overview of the requirements, challenges, design issues and major techniques for seamless and secure communications over heterogeneous wireless networks. It summarizes and provides detailed insights into the latest research on handoff management, mobility management, fast authentication and security management to support seamless and secure roaming for mobile clients. The reader will also learn about the challenges in developing relevant technologies and providing ubiquitous Internet access over heterogeneous wireless networks. The authors have extensive experience in im

  11. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  12. Extrinsic vs intrinsic labeling of the calcium in whole-wheat flour.

    Science.gov (United States)

    Weaver, C M; Heaney, R P; Martin, B R; Fitzsimmons, M L

    1992-02-01

    Fractional absorption of calcium from bread made either from intrinsically or extrinsically labeled whole-wheat flour was compared in 11 healthy adult women. The intrinsic label was provided by 45Ca injected individually into stems of wheat plants during growth. The extrinsic tag was introduced by adding 45Ca to unlabeled flour via the water used in dough making. The two labeled breads were tested in a randomized crossover design using a standardized breakfast administered after an overnight fast. Approximately 80 g labeled bread was consumed by each subject, providing a total calcium load of 13.3 mg. Fractional absorption from the intrinsically labeled bread averaged 0.812 +/- 0.130 (mean +/- SE) and from the extrinsically labeled bread 0.792 +/- 0.113. The mean difference, within subject, was only 0.025 +/- 0.016 and was not significantly different from zero. Extrinsic labeling of the calcium of whole-wheat flour results in a degree of labeling homogeneity equivalent to that of intrinsic labeling, at least for a leavened bread product.

  13. Identification of a Time-Varying, Box-Jenkins Model of Intrinsic Joint Compliance.

    Science.gov (United States)

    Guarin, Diego L; Kearney, Robert E

    2017-08-01

    The mechanical properties of a joint are determined by the combination of intrinsic and reflex mechanisms. However, in some situations the reflex contributions are small so that intrinsic mechanisms play the dominant role in the control of posture and movement. The intrinsic mechanisms, characterized by the joint compliance, can be described well by a second order, linear model for small perturbations around an operating point defined by mean position and torque. However, the compliance parameters depend strongly on the operating point. Thus, for functional activities, such as walking, where position and torque undergo large, rapid changes, the joint compliance will also present large, fast changes and so will appear to be Time-Varying (TV). Therefore, a TV system identification algorithm must be used to characterize these changes. This paper introduces a novel TV system identification algorithm that achieves this. The method extends an instrumental-variable based algorithm for the identification of linear, TV, parametric, Box-Jenkins models to use periodic data. Simulation studies demonstrate that the new algorithm accurately tracks the changes in intrinsic joint compliance expected during walking. Moreover, the method performs well with the complex noise encountered in practice. Consequently the new method should be a valuable tool for the study of joint mechanics during functional activities.

  14. Acid-fast stain

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/003766.htm Acid-fast stain To use the sharing features on this page, please enable JavaScript. The acid-fast stain is a laboratory test that determines ...

  15. Fast food (image)

    Science.gov (United States)

    Fast foods are quick, reasonably priced, and readily available alternatives to home cooking. While convenient and economical for a busy lifestyle, fast foods are typically high in calories, fat, saturated fat, ...

  16. Fast food tips (image)

    Science.gov (United States)

    ... challenge to eat healthy when going to a fast food place. In general, avoiding items that are deep ... challenge to eat healthy when going to a fast food place. In general, avoiding items that are deep ...

  17. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  18. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  19. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  20. Design Principles for Security

    National Research Council Canada - National Science Library

    Benzel, Terry V; Irvine, Cynthia E; Levin, Timothy E; Bhaskara, Ganesha; Nguyen, Thuy D; Clark, Paul C

    2005-01-01

    As a prelude to the clean-slate design for the SecureCore project, the fundamental security principles from more than four decades of research and development in information security technology were reviewed...

  1. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  2. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  3. Development of Food Security Information System Based on Business Intelligence in Food Security Agency, Ministry of Agriculture, Indonesia

    OpenAIRE

    Hendrawaty, Manise; Harisno, Harisno

    2014-01-01

    Food is the main basic need of human, because of that fulfillment of human need of food has to be fulfilled. So it can fulfill that need, then government institution, Food Security Agency (BKP) is formed so it can monitor fulfillment of food need of society. The goals of this writing are to develop food security information system that provides dashboard facility based on business intelligence, to develop food security information system that can give fast, precise and real time information a...

  4. Importance and challenges of measuring intrinsic foot muscle strength

    Science.gov (United States)

    2012-01-01

    Background Intrinsic foot muscle weakness has been implicated in a range of foot deformities and disorders. However, to establish a relationship between intrinsic muscle weakness and foot pathology, an objective measure of intrinsic muscle strength is needed. The aim of this review was to provide an overview of the anatomy and role of intrinsic foot muscles, implications of intrinsic weakness and evaluate the different methods used to measure intrinsic foot muscle strength. Method Literature was sourced from database searches of MEDLINE, PubMed, SCOPUS, Cochrane Library, PEDro and CINAHL up to June 2012. Results There is no widely accepted method of measuring intrinsic foot muscle strength. Methods to estimate toe flexor muscle strength include the paper grip test, plantar pressure, toe dynamometry, and the intrinsic positive test. Hand-held dynamometry has excellent interrater and intrarater reliability and limits toe curling, which is an action hypothesised to activate extrinsic toe flexor muscles. However, it is unclear whether any method can actually isolate intrinsic muscle strength. Also most methods measure only toe flexor strength and other actions such as toe extension and abduction have not been adequately assessed. Indirect methods to investigate intrinsic muscle structure and performance include CT, ultrasonography, MRI, EMG, and muscle biopsy. Indirect methods often discriminate between intrinsic and extrinsic muscles, but lack the ability to measure muscle force. Conclusions There are many challenges to accurately measure intrinsic muscle strength in isolation. Most studies have measured toe flexor strength as a surrogate measure of intrinsic muscle strength. Hand-held dynamometry appears to be a promising method of estimating intrinsic muscle strength. However, the contribution of extrinsic muscles cannot be excluded from toe flexor strength measurement. Future research should clarify the relative contribution of intrinsic and extrinsic muscles

  5. Physiology of Ramadan fasting

    OpenAIRE

    Shokoufeh Bonakdaran

    2016-01-01

    Considering the emphasis of Islam on the importance of fasting, Muslims attempt to fast from dawn until sunset during the holy month of Ramadan. Fasting is associated with several benefits for normal and healthy individuals. However, it could pose high risks to the health of diabetic patients due to certain physiological changes. This study aimed to compare the physiological changes associated with fasting in healthy individuals and diabetic patients during Ramadan. Furthermore, we reviewed t...

  6. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  7. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  8. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  9. Ramadan, fasting and pregnancy

    DEFF Research Database (Denmark)

    Ahmed, Urfan Zahoor; Lykke, Jacob Alexander

    2014-01-01

    In Islam, the month of Ramadan is a period of fasting lasting 29 or 30 days. Epidemiological studies among Muslims in Denmark have not been conducted, but studies show, that fasting among pregnant Muslim women is common. Fasting does not increase the risk of growth restriction or preterm delivery...

  10. Positive consequences of intrinsically rewarding work: A model to ...

    African Journals Online (AJOL)

    This study sought to empirically test a theoretical model outlining the relationships between intrinsic rewards, intrinsic motivation, work engagement and intention to quit, in an attempt to empirically assess whether intrinsic rewards result in improved levels of motivation, engagement and retention. Using a sample of 587 ...

  11. The value of nature: Economic, intrinsic, or both?

    Science.gov (United States)

    There has been a long standing argument that ecosystems have intrinsic value and therefore there is no need to put a price tag on Mother Nature. The concept of intrinsic value reflects the perspective that nature has value in its own right, independent of human uses. Intrinsic va...

  12. Personalizing Sample Databases with Facebook Information to Increase Intrinsic Motivation

    Science.gov (United States)

    Marzo, Asier; Ardaiz, Oscar; Sanz de Acedo, María Teresa; Sanz de Acedo, María Luisa

    2017-01-01

    Motivation is fundamental for students to achieve successful and complete learning. Motivation can be extrinsic, i.e., driven by external rewards, or intrinsic, i.e., driven by internal factors. Intrinsic motivation is the most effective and must be inspired by the task at hand. Here, a novel strategy is presented to increase intrinsic motivation…

  13. Intrinsic Motivation: An Overlooked Component for Student Success

    Science.gov (United States)

    Augustyniak, Robert A.; Ables, Adrienne Z.; Guilford, Philip; Lujan, Heidi L.; Cortright, Ronald N.; DiCarlo, Stephen E.

    2016-01-01

    Intrinsic motivation to learn involves engaging in learning opportunities because they are seen as enjoyable, interesting, or relevant to meeting one's core psychological needs. As a result, intrinsic motivation is associated with high levels of effort and task performance. Students with greater levels of intrinsic motivation demonstrate strong…

  14. The Development of Intrinsic Motivation for Physical Activity

    Science.gov (United States)

    2005-07-01

    The Development of Intrinsic Motivation for Physical Activity by James Dunigan Beaty Bachelor of Science Central Washington...2. REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE The Development of Intrinsic Motivation for Physical Activity 5a. CONTRACT...Government." 3 ABSTRACT The Development of Intrinsic Motivation for Physical Activity by James Dunigan Beaty Cynthia Carruthers, Ph.D

  15. Elements of the Competitive Situation That Affect Intrinsic Motivation.

    Science.gov (United States)

    Reeve, Johnmarshall; Deci, Edward L.

    1996-01-01

    Explores the effects of three elements of the competitive situation (competitive set, competitive outcome, and interpersonal context) on intrinsic motivation in a sample of college students (n=100). Competitive outcome and interpersonal context affected intrinsic motivation: winning increased intrinsic motivation, while pressured interpersonal…

  16. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  17. Comprehensive large-scale assessment of intrinsic protein disorder.

    Science.gov (United States)

    Walsh, Ian; Giollo, Manuel; Di Domenico, Tomás; Ferrari, Carlo; Zimmermann, Olav; Tosatto, Silvio C E

    2015-01-15

    Intrinsically disordered regions are key for the function of numerous proteins. Due to the difficulties in experimental disorder characterization, many computational predictors have been developed with various disorder flavors. Their performance is generally measured on small sets mainly from experimentally solved structures, e.g. Protein Data Bank (PDB) chains. MobiDB has only recently started to collect disorder annotations from multiple experimental structures. MobiDB annotates disorder for UniProt sequences, allowing us to conduct the first large-scale assessment of fast disorder predictors on 25 833 different sequences with X-ray crystallographic structures. In addition to a comprehensive ranking of predictors, this analysis produced the following interesting observations. (i) The predictors cluster according to their disorder definition, with a consensus giving more confidence. (ii) Previous assessments appear over-reliant on data annotated at the PDB chain level and performance is lower on entire UniProt sequences. (iii) Long disordered regions are harder to predict. (iv) Depending on the structural and functional types of the proteins, differences in prediction performance of up to 10% are observed. The datasets are available from Web site at URL: http://mobidb.bio.unipd.it/lsd. Supplementary data are available at Bioinformatics online. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  18. Innate and intrinsic antiviral immunity in skin.

    Science.gov (United States)

    Kawamura, Tatsuyoshi; Ogawa, Youichi; Aoki, Rui; Shimada, Shinji

    2014-09-01

    As the body's most exposed interface with the environment, the skin is constantly challenged by potentially pathogenic microbes, including viruses. To sense the invading viruses, various types of cells resident in the skin express many different pattern-recognition receptors (PRRs) such as C-type lectin receptors (CLRs), Toll-like receptors (TLRs), nucleotide-binding oligomerization domain (NOD)-like receptors (NLRs), retinoic acid-inducible gene I (RIG-I)-like receptors (RLRs) and cytosolic DNA sensors, that can detect the pathogen-associated molecular patterns (PAMPs) of the viruses. The detection of viral PAMPs initiates two major innate immune signaling cascades: the first involves the activation of the downstream transcription factors, such as interferon regulatory factors (IRFs), nuclear factor kappa B (NF-κB) and activator protein 1 (AP-1), which cooperate to induce the transcription of type I interferons and pro-inflammatory cytokines. The second signaling pathway involves the caspase-1-mediated processing of IL-1β and IL-18 through the formation of an inflammasome complex. Cutaneous innate immunity including the production of the innate cytokines constitutes the first line of host defence that limits the virus dissemination from the skin, and also plays an important role in the activation of adaptive immune response, which represents the second line of defence. More recently, the third immunity "intrinsic immunity" has emerged, that provides an immediate and direct antiviral defense mediated by host intrinsic restriction factors. This review focuses on the recent advances regarding the antiviral immune systems, highlighting the innate and intrinsic immunity against the viral infections in the skin, and describes how viral components are recognized by cutaneous immune systems. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  19. Metacognitive mastery and intrinsic motivation in schizophrenia.

    Science.gov (United States)

    Vohs, Jenifer L; Lysaker, Paul H

    2014-01-01

    Deficits in intrinsic motivation (IM) have been linked to poorer outcome in schizophrenia, but its proximal mechanisms remain poorly understood. This study examined whether metacognitive mastery, or the capacity to use knowledge of self, others, and context to identify and cope with psychological difficulties, predicted levels of IM for 6 months among 75 participants with prolonged schizophrenia. Repeated-measures analysis of variance revealed that high metacognitive mastery predicted consistently higher levels of IM; however, intermediate and low mastery did not produce unique IM profiles. The findings suggest that metacognitive mastery may have an important role in IM over time and could be a meaningful treatment target.

  20. Symplectic Structure of Intrinsic Time Gravity

    Directory of Open Access Journals (Sweden)

    Eyo Eyo Ita

    2016-08-01

    Full Text Available The Poisson structure of intrinsic time gravity is analysed. With the starting point comprising a unimodular three-metric with traceless momentum, a trace-induced anomaly results upon quantization. This leads to a revision of the choice of momentum variable to the (mixed index traceless momentric. This latter choice unitarily implements the fundamental commutation relations, which now take on the form of an affine algebra with SU(3 Lie algebra amongst the momentric variables. The resulting relations unitarily implement tracelessness upon quantization. The associated Poisson brackets and Hamiltonian dynamics are studied.

  1. Intrinsically conductive polymer thin film piezoresistors

    DEFF Research Database (Denmark)

    Lillemose, Michael; Spieser, Martin; Christiansen, N.O.

    2008-01-01

    We report on the piezoresistive effect in the intrinsically conductive polymer, polyaniline. A process recipe for indirect patterning of thin film polyaniline has been developed. Using a specially designed chip, the polyaniline thin films have been characterised with respect to resistivity...... and strain sensitivity using two- and four-point measurement method. We have found that polyaniline has a negative gauge factor of K = -4.9, which makes it a candidate for piezoresistive read-out in polymer based MEMS-devices. (C) 2007 Elsevier B.V. All rights reserved....

  2. Intrinsic chirp of single-cycle pulses

    International Nuclear Information System (INIS)

    Lin Qiang; Zheng Jian; Dai Jianming; Ho, I-Chen; Zhang, X.-C.

    2010-01-01

    The Fourier transform-limited electromagnetic pulse has been regarded to be free of chirps for a long time. This is no longer true if the pulse duration goes down to or less than one optical cycle. We report the experimental observation of intrinsic chirps in such pulses with the sub-single-cycle terahertz (THz) waveforms obtained with a standard THz time-domain spectroscopy system. The results confirm the break down of the carrier-envelope (CE) expression for single-cycle optical pulses, and may influence the experimental measurements and theoretical modeling with single-cycle pulses.

  3. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  4. Ramadan, faste og graviditet

    DEFF Research Database (Denmark)

    Ahmed, Urfan Zahoor; Lykke, Jacob Alexander

    2014-01-01

    In Islam, the month of Ramadan is a period of fasting lasting 29 or 30 days. Epidemiological studies among Muslims in Denmark have not been conducted, but studies show, that fasting among pregnant Muslim women is common. Fasting does not increase the risk of growth restriction or preterm delivery......, but there are reports of decreased foetal movements. Furthermore, the fasting may have long-term health consequences for the offspring, especially when they reach their middle age. According to Islam and the interpretation, pregnant and breast-feeding women are allowed to postpone the fasting of the month of Ramadan...

  5. The energy gap and the fast reactor

    International Nuclear Information System (INIS)

    Hill, J.

    1977-01-01

    The background to the development of fast reactors is summarized. In Britain, the results of the many experiments performed, the operation of the Dounreay Fast Reactor for the past 18 years and the first year's operation of the larger Prototype Fast Reactor have all been very encouraging, in that they demonstrated that the performance corresponded well with predictions, breeding is possible, and the system is exceptionally stable in operation. The next step in fast reactor engineering is to build a full-scale fast reactor power station. There would seem to be little reason to expect more trouble than could reasonably be expected in constructing any large project of this general nature. However, from an engineering point of view continuity of experience is required. If a decision to build a commercial fast reactor were taken today there would be a 14-year gap between strating this and the start of the Prototype Fast Reactor. This is already much too long. From an environmental standpoint we have to demonstrate that we can manufacture and reprocess fast reacctor fuel for a substantial programme in a way that does not lead to pollution of the environment, and that plutonium-containing fuel can be transported in the quantities required in safety and in a way that does not attract terrorists or require a private army to ensure its security. Finally, we have to find a way to allow many countries to obtain the energy they need from fast reactors, without leading to the proliferation of nuclear weapons or weapons capability. (author)

  6. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  7. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  8. The Neglected Intrinsic Resistome of Bacterial Pathogens

    Science.gov (United States)

    Fajardo, Alicia; Martínez-Martín, Nadia; Mercadillo, María; Galán, Juan C.; Ghysels, Bart; Matthijs, Sandra; Cornelis, Pierre; Wiehlmann, Lutz; Tümmler, Burkhard; Baquero, Fernando; Martínez, José L.

    2008-01-01

    Bacteria with intrinsic resistance to antibiotics are a worrisome health problem. It is widely believed that intrinsic antibiotic resistance of bacterial pathogens is mainly the consequence of cellular impermeability and activity of efflux pumps. However, the analysis of transposon-tagged Pseudomonas aeruginosa mutants presented in this article shows that this phenotype emerges from the action of numerous proteins from all functional categories. Mutations in some genes make P. aeruginosa more susceptible to antibiotics and thereby represent new targets. Mutations in other genes make P. aeruginosa more resistant and therefore define novel mechanisms for mutation-driven acquisition of antibiotic resistance, opening a new research field based in the prediction of resistance before it emerges in clinical environments. Antibiotics are not just weapons against bacterial competitors, but also natural signalling molecules. Our results demonstrate that antibiotic resistance genes are not merely protective shields and offer a more comprehensive view of the role of antibiotic resistance genes in the clinic and in nature. PMID:18286176

  9. A tonoplast intrinsic protein in Gardenia jasminoides

    Science.gov (United States)

    Gao, Lan; Li, Hao-Ming

    2017-08-01

    Physiological and molecular studies proved that plasma membrane intrinsic proteins (PIPs) and tonoplast intrinsic proteins (TIPs) subfamily of aquaporins play key functions in plant water homeostasis. Five specialized subgroups (TIP1-5) of TIPs have been found in higher plants, in which the TIP1 and TIP2 isoforms are the largest arbitrary groups. TIPs have high water-transport activity than PIPs, some TIPs can transport other small molecule such as urea, ammonia, hydrogen peroxide, and carbon dioxide. In this work, the structure of the putative tonoplast aquaporin from Gardenia jasminoides (GjTIP) was analyzed. Its transcript level has increased during fruit maturation. A phylogenetic analysis indicates that the protein belongs to TIP1 subfamily. A three-dimensional model structure of GjTIP was built based on crystal structure of an ammonia-permeable AtTIP2-1 from Arabidopsis thaliana. The model structure displayed as a homo-tetramer, each monomer has six trans-membrane and two half-membrane-spanning α helices. The data suggests that the GjTIP has tendency to be a mixed function aquaporin, might involve in water, urea and hydrogen peroxide transport, and the gating machanism founded in some AQPs involving pH and phosphorylation response have not been proved in GjTIP.

  10. Intrinsic regulation of enteroendocrine fate by Numb.

    Science.gov (United States)

    Sallé, Jérémy; Gervais, Louis; Boumard, Benjamin; Stefanutti, Marine; Siudeja, Katarzyna; Bardin, Allison J

    2017-07-03

    How terminal cell fates are specified in dynamically renewing adult tissues is not well understood. Here we explore terminal cell fate establishment during homeostasis using the enteroendocrine cells (EEs) of the adult Drosophila midgut as a paradigm. Our data argue against the existence of local feedback signals, and we identify Numb as an intrinsic regulator of EE fate. Our data further indicate that Numb, with alpha-adaptin, acts upstream or in parallel of known regulators of EE fate to limit Notch signaling, thereby facilitating EE fate acquisition. We find that Numb is regulated in part through its asymmetric and symmetric distribution during stem cell divisions; however, its de novo synthesis is also required during the differentiation of the EE cell. Thus, this work identifies Numb as a crucial factor for cell fate choice in the adult Drosophila intestine. Furthermore, our findings demonstrate that cell-intrinsic control mechanisms of terminal cell fate acquisition can result in a balanced tissue-wide production of terminally differentiated cell types. © 2017 The Authors.

  11. Intrinsic position uncertainty impairs overt search performance.

    Science.gov (United States)

    Semizer, Yelda; Michel, Melchi M

    2017-08-01

    Uncertainty regarding the position of the search target is a fundamental component of visual search. However, due to perceptual limitations of the human visual system, this uncertainty can arise from intrinsic, as well as extrinsic, sources. The current study sought to characterize the role of intrinsic position uncertainty (IPU) in overt visual search and to determine whether it significantly limits human search performance. After completing a preliminary detection experiment to characterize sensitivity as a function of visual field position, observers completed a search task that required localizing a Gabor target within a field of synthetic luminance noise. The search experiment included two clutter conditions designed to modulate the effect of IPU across search displays of varying set size. In the Cluttered condition, the display was tiled uniformly with feature clutter to maximize the effects of IPU. In the Uncluttered condition, the clutter at irrelevant locations was removed to attenuate the effects of IPU. Finally, we derived an IPU-constrained ideal searcher model, limited by the IPU measured in human observers. Ideal searchers were simulated based on the detection sensitivity and fixation sequences measured for individual human observers. The IPU-constrained ideal searcher predicted performance trends similar to those exhibited by the human observers. In the Uncluttered condition, performance decreased steeply as a function of increasing set size. However, in the Cluttered condition, the effect of IPU dominated and performance was approximately constant as a function of set size. Our findings suggest that IPU substantially limits overt search performance, especially in crowded displays.

  12. The neglected intrinsic resistome of bacterial pathogens.

    Directory of Open Access Journals (Sweden)

    Alicia Fajardo

    Full Text Available Bacteria with intrinsic resistance to antibiotics are a worrisome health problem. It is widely believed that intrinsic antibiotic resistance of bacterial pathogens is mainly the consequence of cellular impermeability and activity of efflux pumps. However, the analysis of transposon-tagged Pseudomonas aeruginosa mutants presented in this article shows that this phenotype emerges from the action of numerous proteins from all functional categories. Mutations in some genes make P. aeruginosa more susceptible to antibiotics and thereby represent new targets. Mutations in other genes make P. aeruginosa more resistant and therefore define novel mechanisms for mutation-driven acquisition of antibiotic resistance, opening a new research field based in the prediction of resistance before it emerges in clinical environments. Antibiotics are not just weapons against bacterial competitors, but also natural signalling molecules. Our results demonstrate that antibiotic resistance genes are not merely protective shields and offer a more comprehensive view of the role of antibiotic resistance genes in the clinic and in nature.

  13. Intrinsic terminators in Mycoplasma hyopneumoniae transcription.

    Science.gov (United States)

    Fritsch, Tiago Ebert; Siqueira, Franciele Maboni; Schrank, Irene Silveira

    2015-04-08

    Mycoplasma hyopneumoniae, an important pathogen of swine, exhibits a low guanine and cytosine (GC) content genome. M. hyopneumoniae genome is organised in long transcriptional units and promoter sequences have been mapped upstream of all transcription units. These analysis provided insights into the gene organisation and transcription initiation at the genome scale. However, the presence of transcriptional terminator sequences in the M. hyopneumoniae genome is poorly understood. In silico analyses demonstrated the presence of putative terminators in 82% of the 33 monocistronic units (mCs) and in 74% of the 116 polycistronic units (pCs) considering different classes of terminators. The functional activity of 23 intrinsic terminators was confirmed by RT-PCR and qPCR. Analysis of all terminators found by three software algorithms, combined with experimental results, allowed us to propose a pattern of RNA hairpin formation during the termination process and to predict the location of terminators in the M. hyopneumoniae genome sequence. The stem-loop structures of intrinsic terminators of mycoplasma diverge from the pattern of terminators found in other bacteria due the low content of guanine and cytosine. In M. hyopneumoniae, transcription can end after a transcriptional unit and before its terminator sequence and can also continue past the terminator sequence with RNA polymerases gradually releasing the RNA.

  14. Intrinsically disordered proteins drive membrane curvature.

    Science.gov (United States)

    Busch, David J; Houser, Justin R; Hayden, Carl C; Sherman, Michael B; Lafer, Eileen M; Stachowiak, Jeanne C

    2015-07-24

    Assembly of highly curved membrane structures is essential to cellular physiology. The prevailing view has been that proteins with curvature-promoting structural motifs, such as wedge-like amphipathic helices and crescent-shaped BAR domains, are required for bending membranes. Here we report that intrinsically disordered domains of the endocytic adaptor proteins, Epsin1 and AP180 are highly potent drivers of membrane curvature. This result is unexpected since intrinsically disordered domains lack a well-defined three-dimensional structure. However, in vitro measurements of membrane curvature and protein diffusivity demonstrate that the large hydrodynamic radii of these domains generate steric pressure that drives membrane bending. When disordered adaptor domains are expressed as transmembrane cargo in mammalian cells, they are excluded from clathrin-coated pits. We propose that a balance of steric pressure on the two surfaces of the membrane drives this exclusion. These results provide quantitative evidence for the influence of steric pressure on the content and assembly of curved cellular membrane structures.

  15. The Neuroscience of Growth Mindset and Intrinsic Motivation.

    Science.gov (United States)

    Ng, Betsy

    2018-01-26

    Our actions can be triggered by intentions, incentives or intrinsic values. Recent neuroscientific research has yielded some results about the growth mindset and intrinsic motivation. With the advances in neuroscience and motivational studies, there is a global need to utilize this information to inform educational practice and research. Yet, little is known about the neuroscientific interplay between growth mindset and intrinsic motivation. This paper attempts to draw on the theories of growth mindset and intrinsic motivation, together with contemporary ideas in neuroscience, outline the potential for neuroscientific research in education. It aims to shed light on the relationship between growth mindset and intrinsic motivation in terms of supporting a growth mindset to facilitate intrinsic motivation through neural responses. Recent empirical research from the educational neuroscience perspective that provides insights into the interplay between growth mindset and intrinsic motivation will also be discussed.

  16. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  17. Chapter 3: Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  18. Securing XML Documents

    Directory of Open Access Journals (Sweden)

    Charles Shoniregun

    2004-11-01

    Full Text Available XML (extensible markup language is becoming the current standard for establishing interoperability on the Web. XML data are self-descriptive and syntax-extensible; this makes it very suitable for representation and exchange of semi-structured data, and allows users to define new elements for their specific applications. As a result, the number of documents incorporating this standard is continuously increasing over the Web. The processing of XML documents may require a traversal of all document structure and therefore, the cost could be very high. A strong demand for a means of efficient and effective XML processing has posed a new challenge for the database world. This paper discusses a fast and efficient indexing technique for XML documents, and introduces the XML graph numbering scheme. It can be used for indexing and securing graph structure of XML documents. This technique provides an efficient method to speed up XML data processing. Furthermore, the paper explores the classification of existing methods impact of query processing, and indexing.

  19. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  20. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  1. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  2. Structural vs. intrinsic carriers: contrasting effects of cation chemistry and disorder on ionic conductivity in pyrochlores

    International Nuclear Information System (INIS)

    Perriot, Romain; Uberuaga, Blas P.

    2015-01-01

    We use molecular dynamics simulations to investigate the role of cation disorder on oxygen diffusion in Gd 2 Zr 2 O 7 (GZO) and Gd 2 Ti 2 O 7 (GTO) pyrochlores, a class of complex oxides which contain a structural vacancy relative to the basic fluorite structure. The introduction of disorder has distinct effects depending on the chemistry of the material, increasing the mobility of structural carriers by up to four orders of magnitude in GZO. In contrast, in GTO, there is no mobility at zero or low disorder on the ns timescale, but higher disorder liberates the otherwise immobile carriers, allowing diffusion with rates comparable to GZO for the fully disordered material. Here, we show that the cation disorder enhances the diffusivity by both increasing the concentration of mobile structural carriers and their individual mobility. The disorder also influences the diffusion in materials containing intrinsic carriers, such as additional vacancies VO or oxygen interstitials OI. And while in ordered GZO and GTO the contribution of the intrinsic carriers dominates the overall diffusion of oxygen, OI in GZO contributes along with structural carriers, and the total diffusion rate can be calculated by assuming simple additive contributions from the two sources. Although the disorder in the materials with intrinsic defects usually enhances the diffusivity as in the defect-free case, in low concentrations, cation antisites AB or BA, where A = Gd and B = Zr or Ti, can act as traps for fast intrinsic defects. The trapping results in a lowering of the diffusivity, and causes a non-monotonic behavior of the diffusivity with disorder. Conversely, in the case of slow intrinsic defects, the main effect of the disorder is to liberate the structural carriers, resulting in an increase of the diffusivity regardless of the defect trapping.

  3. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  4. Fast Evaluation of the Reliability of Container Securing Arrangements

    DEFF Research Database (Denmark)

    Mansour, A.E.; Jensen, Jørgen Juncher; Olsen, Anders Smærup

    2004-01-01

    In this paper closed form expressions for the transfer functions for the motions and accelerations are used to generate linear transfer functions for forces in lashed and unlashed containers located anywhere in a ship. Long term statistics for these forces are derived by application of a proper...... operational profile and a scatter diagram for the specific route, taking into account the effect of weather routing. Wind forces are added to the wave inertia and gravity loads to determine the limit state equations for evaluating the re-liability of a stack of containers against damage or loss. Several modes...... of container failures are considered including racking and corner post failure. The associated probability of failure is determined using a FORM approach. The procedure can easily be programmed in a simple spreadsheet and the calculation time is very short due to the use of analytical transfer functions...

  5. WORKSTATION SECURITY ENSURANCE

    OpenAIRE

    Hudoklin, Alenka; Stadler, Alenka

    1998-01-01

    A methodology for the ensured security of a workstation connected in a computer network with in an organization is presented. A technique for the determination of the required security level for a workstation's tangible and intangible components is described. A set of security measures for each security level of the workstation's tangible and intangible components is selected. The methodology is applied to workstations in the computer network of a Slovenian state agency. The required security...

  6. Information Security and People: A Conundrum for Compliance

    Directory of Open Access Journals (Sweden)

    Hiep Cong Pham

    2017-01-01

    Full Text Available This evaluation of end-users and IT experts/managers’ attitudes towards performing IT security tasks indicates important differences between their perspectives on what is and is not necessary to establish a secure corporate IT environment. Through a series of case studies, this research illustrates that making it easier for end-users to comply does not necessarily equate to enhanced implementation of security measures. End-users want to be autonomous, competent, self-motivated and active participants in the development of secure environments. However, managers and experts want to limit autonomy to ensure that procedures are followed closely, rather than permitting flexibility. This results in the creation of environments that are intrinsically de-motivating rather than motivating end-users to become self-determined and self-regulating co-creators of a secure IT environment. The paper also discusses alternative approaches to developing a human system that works for end-users and experts.

  7. Fast clustering using adaptive density peak detection.

    Science.gov (United States)

    Wang, Xiao-Feng; Xu, Yifan

    2017-12-01

    Common limitations of clustering methods include the slow algorithm convergence, the instability of the pre-specification on a number of intrinsic parameters, and the lack of robustness to outliers. A recent clustering approach proposed a fast search algorithm of cluster centers based on their local densities. However, the selection of the key intrinsic parameters in the algorithm was not systematically investigated. It is relatively difficult to estimate the "optimal" parameters since the original definition of the local density in the algorithm is based on a truncated counting measure. In this paper, we propose a clustering procedure with adaptive density peak detection, where the local density is estimated through the nonparametric multivariate kernel estimation. The model parameter is then able to be calculated from the equations with statistical theoretical justification. We also develop an automatic cluster centroid selection method through maximizing an average silhouette index. The advantage and flexibility of the proposed method are demonstrated through simulation studies and the analysis of a few benchmark gene expression data sets. The method only needs to perform in one single step without any iteration and thus is fast and has a great potential to apply on big data analysis. A user-friendly R package ADPclust is developed for public use.

  8. The fast breeder reactor

    International Nuclear Information System (INIS)

    Collier, J.

    1990-01-01

    The arguments for and against the fast breeder reactor are debated. The case for the fast reactor is that the world energy demand will increase due to increasing population over the next forty years and that the damage to the global environment from burning fossil fuels which contribute to the greenhouse effect. Nuclear fission is the only large scale energy source which can achieve a cut in the use of carbon based fuels although energy conservation and renewable sources will also be important. Fast reactors produce more energy from uranium than other types of (thermal) reactors such as AGRs and PWRs. Fast reactors would be important from about 2020 onwards especially as by then many thermal reactors will need to be replaced. Fast reactors are also safer than normal reactors. The arguments against fast reactors are largely economic. The cost, especially the capital cost is very high. The viability of the technology is also questioned. (UK)

  9. Combining security risk assessment and security testing

    OpenAIRE

    Großmann, Jürgen; Seehusen, Fredrik

    2014-01-01

    Complex networked systems have become an integral part of our supply infrastructure. Mobile devices, home automation, smart grids and even vehicles are connected via the Internet and becoming accessible and thus vulnerable to hacker attacks. While the number of security incidents drastically increases, we are more than ever dependent on a secure and mature ICT infrastructure. One of the keys to maintain such a secure and dependable infrastructure are mature, systematic and capable proactive m...

  10. Quantum synchronization effects in intrinsic Josephson junctions

    International Nuclear Information System (INIS)

    Machida, M.; Kano, T.; Yamada, S.; Okumura, M.; Imamura, T.; Koyama, T.

    2008-01-01

    We investigate quantum dynamics of the superconducting phase in intrinsic Josephson junctions of layered high-T c superconductors motivated by a recent experimental observation for the switching rate enhancement in the low temperature quantum regime. We pay attention to only the capacitive coupling between neighboring junctions and perform large-scale simulations for the Schroedinger equation derived from the Hamiltonian considering the capacitive coupling alone. The simulation focuses on an issue whether the switching of a junction induces those of the other junctions or not. The results reveal that the superconducting phase dynamics show synchronous behavior with increasing the quantum character, e.g., decreasing the junction plane area and effectively the temperature. This is qualitatively consistent with the experimental result

  11. Intrinsic topological superfluidity - fluctuations and response

    Science.gov (United States)

    Levin, K.; Wu, Chien-Te; Anderson, Brandon; Boyack, Rufus

    Recent interest in topological superconductivity is based primarily on exploiting proximity effects to obtain this important phase. However, in cold gases it is possible to contemplate ``intrinsic'' topological superfluidity produced with a synthetic spin-orbit coupling and Zeeman field. It is important for such future experiments to establish how low in temperature one needs to go to reach the ordered phase. Similarly, it will be helpful to have a probe of the normal (pseudogap) phase to determine if the ultimate superfluid order will be topological or trivial. In this talk, we address these issues by considering fluctuation effects in such a superfluid, and calculate the critical transition temperature and response functions. We see qualitative signatures of topological superfluidity in spin and charge response functions. We also explore the suppression of superfluidity due to fluctuations, and importantly find that the temperature scales necessary to reach topological superfluidity are reasonably accessible

  12. Major Intrinsic Proteins in Biomimetic Membranes

    DEFF Research Database (Denmark)

    Helix Nielsen, Claus

    2010-01-01

    will generally have finite permeabilities to both electrolytes and non-electrolytes. The feasibility of a biomimetic MIP device thus depends on the relative transport contribution from both protein and biomimetic support matrix. Also the biomimetic matrix must be encapsulated in order to protect it and make....../separation technology, a unique class of membrane transport proteins is especially interesting the major intrinsic proteins (MIPs). Generally, MIPs conduct water molecules and selected solutes in and out of the cell while preventing the passage of other solutes, a property critical for the conservation of the cells...... it sufficiently stable in a final application. Here, I specifically discuss the feasibility of developing osmotic biomimetic MIP membranes, but the technical issues are of general concern in the design of biomimetic membranes capable of supporting selective transmembrane fluxes....

  13. Intrinsic densitometry: In-plant evaluation

    International Nuclear Information System (INIS)

    Nishida, K.; Kurosawa, A.; Masui, J.; Hsue, S.T.

    1994-11-01

    A measurement of the plutonium concentration in a sample is always necessary for nuclear material control and accounting. This report describes the testing of the intrinsic densitometry (ID) technique for implant applications. The authors found that the ID method can determine the plutonium concentrations to between 2 and 3% at concentrations of 100 g/l to 200 g/l with quartz cells and a measurement time of 3600 s. The precision can be improved to 1 to 2% with a higher counting rate. The authors also found that nitric acid concentration and the impurity level of uranium in the product plutonium solution do not affect the concentration measurement. When this technique is applied to plutonium solutions in stainless steel pipes, they found that similar precision in plutonium concentration can be achieved using a high-count-rate detector. The precision, however, is reduced with aged plutonium solutions

  14. On the intrinsic colours of cepheids

    International Nuclear Information System (INIS)

    Efremov, Yu.N.

    1979-01-01

    Some consequences from new data on the photometrically obtained intrinsic colours are considered. It is shown that the small amplitude and almost sinusoidal light-curve cepheids (Cs-subtype) increase their pulsation amplitude towards the red instability strip edge, differing from the other galactic cepheids. This feature is discussed in connection with Efremov's (1968) hypothesis that the Cs-cepheids first cross the instability strip from left to right. The galactic cepheid period-colour relation obtained by Dean, Warren and Cousins (1978) satisfies rather well the LMC cepheid observations and, consequently, considerations for the period-luminosity relations are made. The residuals from the PL relation proposed by us correlate with the colour residuals from the DWC period-colour relation ΔV/delta(B-V) being equal to 2.7. The luminosity effect as a possible cause of the discrepancy between the spectroscopic cepheid colours and the photometric colours is briefly discussed. (Auth.)

  15. Intrinsic Dynamics of Quantum-Dash Lasers

    KAUST Repository

    Chen, Cheng

    2011-10-01

    Temperature-dependent intrinsic modulation response of InAs/InAlGaAs quantum-dash lasers was investigated by using pulse optical injection modulation to minimize the effects of parasitics and self-heating. Compared to typical quantum-well lasers, the quantum-dash lasers were found to have comparable differential gain but approximately twice the gain compression factor, probably due to carrier heating by free-carrier absorption, as opposed to stimulated transition. Therefore, the narrower modulation bandwidth of the quantum-dash lasers than that of quantum-well lasers was attributed to their higher gain compression factor. In addition, as expected, quantum-dash lasers with relatively long and uniform dashes exhibit higher temperature stability than quantum-well lasers. However, the lasers with relatively short and nonuniform dashes exhibit stronger temperature dependence, probably due to their higher surface-to-volume ratio and nonuniform dash sizes. © 2011 IEEE.

  16. Intrinsic thermoelectric power of group VB metals

    Directory of Open Access Journals (Sweden)

    Gunadhor Singh Okram

    2012-03-01

    Full Text Available We have reinvestigated the thermopower of group VB metals in polycrystalline forms in the temperature range of 6-300K, taking into account the critical nature of the sample surface and heat treatment especially for niobium. Strikingly small magnitude, negative sign, phonon drag dip and superconductivity not reported previously were observed in surface-cleaned single crystalline Nb. However, while thermopower magnitudes are small, mixed signs were found in the polycrystalline V, Nb and Ta samples. These properties were therefore interpreted as their intrinsic properties and were briefly discussed taking into account of the existing theory by fitting also the data that give the Fermi energies of 10.94 eV, 5.08 eV and 1.86eV, respectively.

  17. Computer Simulations of Intrinsically Disordered Proteins

    Science.gov (United States)

    Chong, Song-Ho; Chatterjee, Prathit; Ham, Sihyun

    2017-05-01

    The investigation of intrinsically disordered proteins (IDPs) is a new frontier in structural and molecular biology that requires a new paradigm to connect structural disorder to function. Molecular dynamics simulations and statistical thermodynamics potentially offer ideal tools for atomic-level characterizations and thermodynamic descriptions of this fascinating class of proteins that will complement experimental studies. However, IDPs display sensitivity to inaccuracies in the underlying molecular mechanics force fields. Thus, achieving an accurate structural characterization of IDPs via simulations is a challenge. It is also daunting to perform a configuration-space integration over heterogeneous structural ensembles sampled by IDPs to extract, in particular, protein configurational entropy. In this review, we summarize recent efforts devoted to the development of force fields and the critical evaluations of their performance when applied to IDPs. We also survey recent advances in computational methods for protein configurational entropy that aim to provide a thermodynamic link between structural disorder and protein activity.

  18. Intrinsic Ambipolarity and Rotation in Stellarators

    International Nuclear Information System (INIS)

    Helander, P.; Simakov, A. N.

    2008-01-01

    It is shown that collisional plasma transport is intrinsically ambipolar only in quasiaxisymmetric or quasihelically symmetric magnetic configurations. Only in such fields can the plasma rotate freely, and then only in the direction of quasisymmetry. In a non-quasi-symmetric magnetic field, the average radial electric field is determined by parallel viscosity, which in turn is usually governed by collisional processes. Locally, the radial electric field may be affected by turbulent Reynolds stress producing zonal flows, but on a radial average taken over several ion gyroradii, it is determined by parallel viscosity, at least if the turbulence is electrostatic and obeys the conventional gyrokinetic orderings. This differs from the situation in a tokamak, where there is no flow damping by parallel viscosity in the symmetry direction and the turbulent Reynolds stress may affect the global radial electric field

  19. IMPACT OF BARYONIC PHYSICS ON INTRINSIC ALIGNMENTS

    Energy Technology Data Exchange (ETDEWEB)

    Tenneti, Ananth; Gnedin, Nickolay Y. [Particle Astrophysics Center, Fermi National Accelerator Laboratory, Batavia, IL 60510 (United States); Feng, Yu, E-mail: vat@andrew.cmu.edu [Berkeley Center for Cosmological Physics, Department of Physics, University of California Berkeley, Berkeley, CA 94720 (United States)

    2017-01-10

    We explore the effects of specific assumptions in the subgrid models of star formation and stellar and active galactic nucleus feedback on intrinsic alignments of galaxies in cosmological simulations of the “MassiveBlack-II” family. Using smaller-volume simulations, we explore the parameter space of the subgrid star formation and feedback model and find remarkable robustness of the observable statistical measures to the details of subgrid physics. The one observational probe most sensitive to modeling details is the distribution of misalignment angles. We hypothesize that the amount of angular momentum carried away by the galactic wind is the primary physical quantity that controls the orientation of the stellar distribution. Our results are also consistent with a similar study by the EAGLE simulation team.

  20. Fast breeder reactors

    International Nuclear Information System (INIS)

    Heinzel, V.

    1975-01-01

    The author gives a survey of 'fast breeder reactors'. In detail the process of breeding, the reasons for the development of fast breeders, the possible breeder reactors, the design criteria, fuels, cladding, coolant, and safety aspects are reported on. Design data of some experimental reactors already in operation are summarized in stabular form. 300 MWe Prototype-Reactors SNR-300 and PFR are explained in detail and data of KWU helium-cooled fast breeder reactors are given. (HR) [de

  1. Islamic fasting and health.

    Science.gov (United States)

    Azizi, Fereidoun

    2010-01-01

    Muslims fast from sunrise to sunset during the month of Ramadan, the 9th lunar month. The duration of fasting varies from 13 to 18 h/day. Fasting includes avoidance of drinking liquids and eating foods. The aim of this article is to review health-related aspects of Ramadan fasting. Related abstracts from 1960 to 2009 were obtained from Medline and local journals in Islamic countries. One hundred and thirteen articles meeting the criteria for paper selection were reviewed in depth to identify details of related materials. During the fasting days of Ramadan glucose homeostasis is maintained by meals taken before dawn and by liver glycogen stores. Changes in serum lipids are variable and depend on the quality and quantity of food consumption and changes in weight. Compliant, well-controlled type 2 diabetics may observe Ramadan fasting, but fasting is not recommended for type 1, noncompliant, poorly controlled and pregnant diabetics. There are no adverse effects of Ramadan fasting on the heart, lung, liver, kidney, eyes, hematologic profile, endocrine and neuropsychiatric functions. Although Ramadan fasting is safe for all healthy individuals, those with various diseases should consult their physicians and follow scientific recommendations.

  2. Intrinsic spin-relaxation induced negative tunnel magnetoresistance in a single-molecule magnet

    Science.gov (United States)

    Xie, Haiqing; Wang, Qiang; Xue, Hai-Bin; Jiao, HuJun; Liang, J.-Q.

    2013-06-01

    We investigate theoretically the effects of intrinsic spin-relaxation on the spin-dependent transport through a single-molecule magnet (SMM), which is weakly coupled to ferromagnetic leads. The tunnel magnetoresistance (TMR) is obtained by means of the rate-equation approach including not only the sequential but also the cotunneling processes. It is shown that the TMR is strongly suppressed by the fast spin-relaxation in the sequential region and can vary from a large positive to slight negative value in the cotunneling region. Moreover, with an external magnetic field along the easy-axis of SMM, a large negative TMR is found when the relaxation strength increases. Finally, in the high bias voltage limit the TMR for the negative bias is slightly larger than its characteristic value of the sequential region; however, it can become negative for the positive bias caused by the fast spin-relaxation.

  3. Proposal for PS beam tests of a fast rich detector

    CERN Document Server

    Séguinot, Jacques; Ypsilantis, Thomas; CERN. Geneva. Detector Research and Development Committee

    1993-01-01

    A full scale prototype Fast RICH detector with pad readout for unambiguous imaging has been constructed for operation in a high luminosity environment. It uses the best photosensitive gas capable of fast response (TEA) or the intrinsically fast solid photocathode (CsI/TMAE), developed specifically for this purpose. It can be used at e+e- or hadron colliders as well as at fixed target facilities. It has time resolution of 20 ns with a 1.3 microsecond pipeline and parallel readout of 4000 pad sectors. Fast digital VLSI electronics has been developed for readout and 24000 channels have been tested. The prototype device (12000 pad channels) is assembled and ready for beam tests in 1993.

  4. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  5. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  6. Personality traits associated with intrinsic academic motivation in medical students.

    Science.gov (United States)

    Tanaka, Masaaki; Mizuno, Kei; Fukuda, Sanae; Tajima, Seiki; Watanabe, Yasuyoshi

    2009-04-01

    Motivation is one of the most important psychological concepts in education and is related to academic outcomes in medical students. In this study, the relationships between personality traits and intrinsic academic motivation were examined in medical students. The study group consisted of 119 Year 2 medical students at Osaka City University Graduate School of Medicine. They completed questionnaires dealing with intrinsic academic motivation (the Intrinsic Motivation Scale toward Learning) and personality (the Temperament and Character Inventory [TCI]). On simple regression analyses, the TCI dimensions of persistence, self-directedness, co-operativeness and self-transcendence were positively associated with intrinsic academic motivation. On multiple regression analysis adjusted for age and gender, the TCI dimensions of persistence, self-directedness and self-transcendence were positively associated with intrinsic academic motivation. The temperament dimension of persistence and the character dimensions of self-directedness and self-transcendence are associated with intrinsic academic motivation in medical students.

  7. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  8. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  9. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...... as a particular approach that seeks to limit the scope of security to one’s community – be it the ‘nation-state’ or ‘civilization’. I will suggest that arguing against ‘security communitarianism’ requires paying further attention to the postcolonial critique of cosmopolitanism....

  10. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  11. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  12. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  13. Sources of intrinsic rotation in the low-flow ordering

    International Nuclear Information System (INIS)

    Parra, Felix I.; Barnes, Michael; Catto, Peter J.

    2011-01-01

    A low flow, δf gyrokinetic formulation to obtain the intrinsic rotation profiles is presented. The momentum conservation equation in the low-flow ordering contains new terms, neglected in previous first-principles formulations, that may explain the intrinsic rotation observed in tokamaks in the absence of external sources of momentum. The intrinsic rotation profile depends on the density and temperature profiles and on the up-down asymmetry.

  14. Increased intrinsic mitochondrial function in humans with mitochondrial haplogroup H

    DEFF Research Database (Denmark)

    Larsen, Steen; Díez-Sánchez, Carmen; Rabøl, Rasmus

    2014-01-01

    and determined their mitochondrial haplogroup, mitochondrial oxidative phosphorylation capacity (OXPHOS), mitochondrial content (citrate synthase (CS)) and VO2max. Intrinsic mitochondrial function is calculated as mitochondrial OXPHOS capacity divided by mitochondrial content (CS). Haplogroup H showed a 30......% higher intrinsic mitochondrial function compared with the other haplo group U. There was no relationship between haplogroups and VO2max. In skeletal muscle from men with mitochondrial haplogroup H, an increased intrinsic mitochondrial function is present....

  15. The effects of extrinsic rewards on children's intrinsic motivation

    OpenAIRE

    大槻, 千秋

    1981-01-01

    An experiment was conducted with preschool children to test whether a person's intrinsic motivation in an activity may be decreased by extrinsic salient rewards in Japan like in America. Children solved some jigsaw puzzles and received assorted candies, then they were observed how long they did other jigsaw puzzles. The results showed that the effects of extrinsic rewards on intrinsic motivation in an activity varied with the subject's social background. In uptown children's intrinsic motivat...

  16. Do intrinsic and extrinsic motivation relate differently to employee outcomes?

    OpenAIRE

    Kuvaas, Bard; Buch, Robert; Weibel, Antoinette; Dysvik, Anders; Nerstad, Christina

    2017-01-01

    In most theories that address how individual financial incentives affect work performance, researchers have assumed that two types of motivation—intrinsic and extrinsic—mediate the relationship between incentives and performance. Empirically, however, extrinsic motivation is rarely investigated. To explore the predictive validity of these theories of intrinsic and extrinsic motivation in work settings, we tested how both intrinsic and extrinsic motivation affected supervisor-ra...

  17. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  18. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  19. An Overview of DRAM-Based Security Primitives

    Directory of Open Access Journals (Sweden)

    Nikolaos Athanasios Anagnostopoulos

    2018-03-01

    Full Text Available Recent developments have increased the demand for adequate security solutions, based on primitives that cannot be easily manipulated or altered, such as hardware-based primitives. Security primitives based on Dynamic Random Access Memory (DRAM can provide cost-efficient and practical security solutions, especially for resource-constrained devices, such as hardware used in the Internet of Things (IoT, as DRAMs are an intrinsic part of most contemporary computer systems. In this work, we present a comprehensive overview of the literature regarding DRAM-based security primitives and an extended classification of it, based on a number of different criteria. In particular, first, we demonstrate the way in which DRAMs work and present the characteristics being exploited for the implementation of security primitives. Then, we introduce the primitives that can be implemented using DRAM, namely Physical Unclonable Functions (PUFs and True Random Number Generators (TRNGs, and present the applications of each of the two types of DRAM-based security primitives. We additionally proceed to assess the security such primitives can provide, by discussing potential attacks and defences, as well as the proposed security metrics. Subsequently, we also compare these primitives to other hardware-based security primitives, noting their advantages and shortcomings, and proceed to demonstrate their potential for commercial adoption. Finally, we analyse our classification methodology, by reviewing the criteria employed in our classification and examining their significance.

  20. Hamiltonian reductions in plasma physics about intrinsic gyrokinetic

    International Nuclear Information System (INIS)

    Guillebon de Resnes, L. de

    2013-01-01

    Gyrokinetic is a key model for plasma micro-turbulence, commonly used for fusion plasmas or small-scale astrophysical turbulence, for instance. The model still suffers from several issues, which could imply to reconsider the equations. This thesis dissertation clarifies three of them. First, one of the coordinates caused questions, both from a physical and from a mathematical point of view; a suitable constrained coordinate is introduced, which removes the issues from the theory and explains the intrinsic structures underlying the questions. Second, the perturbative coordinate transformation for gyrokinetic was computed only at lowest orders; explicit induction relations are obtained to go arbitrary order in the expansion. Third, the introduction of the coupling between the plasma and the electromagnetic field was not completely satisfactory; using the Hamiltonian structure of the dynamics, it is implemented in a more appropriate way, with strong consequences on the gyrokinetic equations, especially about their Hamiltonian structure. In order to address these three main points, several other results are obtained, for instance about the origin of the guiding-center adiabatic invariant, about a very efficient minimal guiding center transformation, or about an intermediate Hamiltonian model between Vlasov-Maxwell and gyrokinetic, where the characteristics include both the slow guiding-center dynamics and the fast gyro-angle dynamics. In addition, various reduction methods are used, introduced or developed, e.g. a Lie-transform of the equations of motion, a lifting method to transfer particle reductions to the corresponding Hamiltonian field dynamics, or a truncation method related both to Dirac's theory of constraints and to a projection onto a Lie-subalgebra. Besides gyrokinetic, this is useful to clarify other Hamiltonian reductions in plasma physics, for instance for incompressible or electrostatic dynamics, for magnetohydrodynamics, or for fluid closures

  1. Interventions for primary (intrinsic tracheomalacia in children

    Directory of Open Access Journals (Sweden)

    Vikas Goyal

    Full Text Available BACKGROUNDTracheomalacia, a disorder of the large airways where the trachea is deformed or malformed during respiration, is commonly seen in tertiary paediatric practice. It is associated with a wide spectrum of respiratory symptoms from life-threatening recurrent apnoea to common respiratory symptoms such as chronic cough and wheeze. Current practice following diagnosis of tracheomalacia includes medical approaches aimed at reducing associated symptoms of tracheomalacia, ventilation modalities of continuous positive airway pressure (CPAP and bi-level positive airway pressure (BiPAP, and surgical approaches aimed at improving the calibre of the airway (airway stenting, aortopexy, tracheopexy.OBJECTIVESTo evaluate the efficacy of medical and surgical therapies for children with intrinsic (primary tracheomalacia.METHODSSearchThe Cochrane Airways Group searched the Cochrane Central Register of Controlled Trials (CENTRAL, the Cochrane Airways Group's Specialized Register, Medline and Embase databases. The Cochrane Airways Group performed the latest searches in March 2012.Selection criteriaAll randomized controlled trials (RCTs of therapies related to symptoms associated with primary or intrinsic tracheomalacia.Data collection and analysisTwo reviewers extracted data from the included study independently and resolved disagreements by consensus.MAIN RESULTSWe included one RCT that compared nebulized recombinant human deoxyribonuclease (rhDNase with placebo in 40 children with airway malacia and a respiratory tract infection. We assessed it to be a RCT with overall low risk of bias. Data analyzed in this review showed that there was no significant difference between groups for the primary outcome of proportion cough-free at two weeks (odds ratio (OR 1.38; 95% confidence interval (CI 0.37 to 5.14. However, the mean change in night time cough diary scores significantly favoured the placebo group (mean difference (MD 1.00; 95% CI 0.17 to 1.83, P = 0

  2. Islamic Fasting and Diabetes

    Directory of Open Access Journals (Sweden)

    Fereidoun Azizi

    2013-07-01

    Full Text Available The aim of this article is to review health-related aspects of Ramadan fasting in normal individuals and diabetics. During fasting days of Ramadan, glucose homeostasis is maintained by meal taken bepore dawn and by liver glycogen stores. Changes in serum lipids are variable and defend on the quality and quantity of food consumption and changes in weight. Compliant, well controlled type 2 diabetics may observe Ramadan fasting; but fasting is not recommended for type 1, non complaint, poorly controlled and pregnant diabetics. Although Ramadan fasting is safe for all healthy individuals and well controlled diabetics, those with uncontrolled diabetics and diabetics with complications should consult physicians and follow scientific recommendations.

  3. Fast Spectrum Reactors

    CERN Document Server

    Todd, Donald; Tsvetkov, Pavel

    2012-01-01

    Fast Spectrum Reactors presents a detailed overview of world-wide technology contributing to the development of fast spectrum reactors. With a unique focus on the capabilities of fast spectrum reactors to address nuclear waste transmutation issues, in addition to the well-known capabilities of breeding new fuel, this volume describes how fast spectrum reactors contribute to the wide application of nuclear power systems to serve the global nuclear renaissance while minimizing nuclear proliferation concerns. Readers will find an introduction to the sustainable development of nuclear energy and the role of fast reactors, in addition to an economic analysis of nuclear reactors. A section devoted to neutronics offers the current trends in nuclear design, such as performance parameters and the optimization of advanced power systems. The latest findings on fuel management, partitioning and transmutation include the physics, efficiency and strategies of transmutation, homogeneous and heterogeneous recycling, in addit...

  4. Fast ejendom III

    DEFF Research Database (Denmark)

    Munk-Hansen, Carsten

    Bogen er det tredje bind af tre planlagte bind om fast ejendom: I Overdragelsen, II Bolighandlen og III Ejerbeføjelsen. Fremstillingens giver et grundigt overblik over centrale områder af en omfattende regulering af fast ejendom, med angivelse af litteratur, hvor læseren kan søge yderligere...... oplysning. En ejer af fast ejendom er på særdeles mange områder begrænset i sin råden sammenlignet med ejeren af et formuegode i almindelighed. Fremstillingen tager udgangspunkt i ejerens perspektiv (fremfor samfundets eller myndighedernes). Både den privatretlige og offentligretlige regulering behandles......, eksempelvis ejendomsdannelsen, servitutter, naboretten, hævd, zoneinddelingen, den fysiske planlægning, beskyttelse af natur, beskyttelse af kultur, forurening fra fast ejendom, erstatning for forurening, jordforurening, ekspropriation, byggeri og adgang til fast ejendom....

  5. Intrinsically active and pacemaker neurons in pluripotent stem cell-derived neuronal populations.

    Science.gov (United States)

    Illes, Sebastian; Jakab, Martin; Beyer, Felix; Gelfert, Renate; Couillard-Despres, Sébastien; Schnitzler, Alfons; Ritter, Markus; Aigner, Ludwig

    2014-03-11

    Neurons generated from pluripotent stem cells (PSCs) self-organize into functional neuronal assemblies in vitro, generating synchronous network activities. Intriguingly, PSC-derived neuronal assemblies develop spontaneous activities that are independent of external stimulation, suggesting the presence of thus far undetected intrinsically active neurons (IANs). Here, by using mouse embryonic stem cells, we provide evidence for the existence of IANs in PSC-neuronal networks based on extracellular multielectrode array and intracellular patch-clamp recordings. IANs remain active after pharmacological inhibition of fast synaptic communication and possess intrinsic mechanisms required for autonomous neuronal activity. PSC-derived IANs are functionally integrated in PSC-neuronal populations, contribute to synchronous network bursting, and exhibit pacemaker properties. The intrinsic activity and pacemaker properties of the neuronal subpopulation identified herein may be particularly relevant for interventions involving transplantation of neural tissues. IANs may be a key element in the regulation of the functional activity of grafted as well as preexisting host neuronal networks.

  6. A review of IPv6 security concerns

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-08-01

    Full Text Available . ? Offset: The Offset is a 13-bit field that specifies the offset of a particular fragment relative to the beginning of the original unfragmenteddatagram. The first fragment has an offset of zero. ? TTL: The TTL (Time to Live) reflects historical intention... while staying connected is growing fast. Here again the implementation of IPsec is especially important. Take note of the new Mobile Internet Protocol(MIP)implementation. 3.8 Conscientious Security This concern is with the users and more...

  7. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  8. Social Security Administration

    Science.gov (United States)

    ... a my Social Security account. Newsroom Social Security's Fiscal Year (FY) 2017 Agency Financial Report (AFR) Our ... Us Accessibility FOIA Open Government Glossary Privacy Report Fraud, Waste or Abuse Site Map Other Government Websites: ...

  9. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard......’ experiences of security influence the way they make sense of, assess, and handle IT security mechanisms. Moreover, I studied cases in which the users handled IT security sensitive technology in a secure way, but still had unwanted experiences of security. Through the developed design methods I was able...... to activate and access study participants’ prior experiences of making sense of IT security sensitive technology. Moreover, the methods helped clarify users’ immediate experience in an encounter with IT security sensitive technology. The findings were integrated into the design of a digital signature solution...

  10. Privatising security and war

    Directory of Open Access Journals (Sweden)

    José L Gómez del Prado

    2011-03-01

    Full Text Available State security functions normally carried out by national armies or police forces are being outsourced to private military and security companies in countries where conflict is displacing many people....

  11. Privatising security and war

    OpenAIRE

    José L Gómez del Prado

    2011-01-01

    State security functions normally carried out by national armies or police forces are being outsourced to private military and security companies in countries where conflict is displacing many people....

  12. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  13. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  14. Air Cargo Security

    Science.gov (United States)

    2007-07-30

    security identification display areas ( SIDAs ). This effectively elevates the required security measures for these cargo handling areas and requires...monitoring. Additional technologies, such as computer algorithms for highlighting potential threat objects, may also be considered to aid human observers

  15. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  16. Secure DTN Communications Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Innoflight proposes to implement and perform an on-orbit demonstration of a Secure DTN communications suite on the SCaN Testbed aboard the ISS. Secure DTN is a...

  17. Understanding oceanic migrations with intrinsic biogeochemical markers.

    Directory of Open Access Journals (Sweden)

    Raül Ramos

    2009-07-01

    Full Text Available Migratory marine vertebrates move annually across remote oceanic water masses crossing international borders. Many anthropogenic threats such as overfishing, bycatch, pollution or global warming put millions of marine migrants at risk especially during their long-distance movements. Therefore, precise knowledge about these migratory movements to understand where and when these animals are more exposed to human impacts is vital for addressing marine conservation issues. Because electronic tracking devices suffer from several constraints, mainly logistical and financial, there is emerging interest in finding appropriate intrinsic markers, such as the chemical composition of inert tissues, to study long-distance migrations and identify wintering sites. Here, using tracked pelagic seabirds and some of their own feathers which were known to be grown at different places and times within the annual cycle, we proved the value of biogeochemical analyses of inert tissue as tracers of marine movements and habitat use. Analyses of feathers grown in summer showed that both stable isotope signatures and element concentrations can signal the origin of breeding birds feeding in distinct water masses. However, only stable isotopes signalled water masses used during winter because elements mainly accumulated during the long breeding period are incorporated into feathers grown in both summer and winter. Our findings shed new light on the simple and effective assignment of marine organisms to distinct oceanic areas, providing new opportunities to study unknown migration patterns of secretive species, including in relation to human-induced mortality on specific populations in the marine environment.

  18. Does intrinsic motivation enhance motor cortex excitability?

    Science.gov (United States)

    Radel, Rémi; Pjevac, Dusan; Davranche, Karen; d'Arripe-Longueville, Fabienne; Colson, Serge S; Lapole, Thomas; Gruet, Mathieu

    2016-11-01

    Intrinsic motivation (IM) is often viewed as a spontaneous tendency for action. Recent behavioral and neuroimaging evidence indicate that IM, in comparison to extrinsic motivation (EM), solicits the motor system. Accordingly, we tested whether IM leads to greater excitability of the motor cortex than EM. To test this hypothesis, we used two different tasks to induce the motivational orientation using either words representing each motivational orientation or pictures previously linked to each motivational orientation through associative learning. Single-pulse transcranial magnetic stimulation over the motor cortex was applied when viewing the stimuli. Electromyographic activity was recorded on the contracted first dorsal interosseous muscle. Two indexes of corticospinal excitability (the amplitude of motor-evoked potential and the length of cortical silent period) were obtained through unbiased automatic detection and analyzed using a mixed model that provided both statistical power and a high level of control over all important individual, task, and stimuli characteristics. Across the two tasks and the two indices of corticospinal excitability, the exposure to IM-related stimuli did not lead to a greater corticospinal excitability than EM-related stimuli or than stimuli with no motivational valence (ps > .20). While these results tend to dismiss the advantage of IM at activating the motor cortex, we suggest alternative hypotheses to explain this lack of effect, which deserves further research. © 2016 Society for Psychophysiological Research.

  19. Dynamic Neural Fields with Intrinsic Plasticity.

    Science.gov (United States)

    Strub, Claudius; Schöner, Gregor; Wörgötter, Florentin; Sandamirskaya, Yulia

    2017-01-01

    Dynamic neural fields (DNFs) are dynamical systems models that approximate the activity of large, homogeneous, and recurrently connected neural networks based on a mean field approach. Within dynamic field theory, the DNFs have been used as building blocks in architectures to model sensorimotor embedding of cognitive processes. Typically, the parameters of a DNF in an architecture are manually tuned in order to achieve a specific dynamic behavior (e.g., decision making, selection, or working memory) for a given input pattern. This manual parameters search requires expert knowledge and time to find and verify a suited set of parameters. The DNF parametrization may be particular challenging if the input distribution is not known in advance, e.g., when processing sensory information. In this paper, we propose the autonomous adaptation of the DNF resting level and gain by a learning mechanism of intrinsic plasticity (IP). To enable this adaptation, an input and output measure for the DNF are introduced, together with a hyper parameter to define the desired output distribution. The online adaptation by IP gives the possibility to pre-define the DNF output statistics without knowledge of the input distribution and thus, also to compensate for changes in it. The capabilities and limitations of this approach are evaluated in a number of experiments.

  20. Diffuse intrinsic pontine glioma: poised for progress

    International Nuclear Information System (INIS)

    Warren, Katherine E.

    2012-01-01

    Diffuse intrinsic pontine gliomas (DIPGs) are amongst the most challenging tumors to treat. Surgery is not an option, the effects of radiation therapy are temporary, and no chemotherapeutic agent has demonstrated significant efficacy. Numerous clinical trials of new agents and novel therapeutic approaches have been performed over the course of several decades in efforts to improve the outcome of children with DIPG, yet without success. The diagnosis of DIPG is based on radiographic findings in the setting of a typical clinical presentation, and tissue is not routinely obtained as the standard of care. The paradigm for treating children with these tumors has been based on that for supratentorial high-grade gliomas in adults as the biology of these lesions were presumed to be similar. However, recent pivotal studies demonstrate that DIPGs appear to be their own entity. Simply identifying this fact releases a number of constraints and opens opportunities for biologic investigation of these lesions, setting the stage to move forward in identifying DIPG-specific treatments. This review will summarize the current state of knowledge of DIPG, discuss obstacles to therapy, and summarize results of recent biologic studies.

  1. Intrinsic gain modulation and adaptive neural coding.

    Directory of Open Access Journals (Sweden)

    Sungho Hong

    2008-07-01

    Full Text Available In many cases, the computation of a neural system can be reduced to a receptive field, or a set of linear filters, and a thresholding function, or gain curve, which determines the firing probability; this is known as a linear/nonlinear model. In some forms of sensory adaptation, these linear filters and gain curve adjust very rapidly to changes in the variance of a randomly varying driving input. An apparently similar but previously unrelated issue is the observation of gain control by background noise in cortical neurons: the slope of the firing rate versus current (f-I curve changes with the variance of background random input. Here, we show a direct correspondence between these two observations by relating variance-dependent changes in the gain of f-I curves to characteristics of the changing empirical linear/nonlinear model obtained by sampling. In the case that the underlying system is fixed, we derive relationships relating the change of the gain with respect to both mean and variance with the receptive fields derived from reverse correlation on a white noise stimulus. Using two conductance-based model neurons that display distinct gain modulation properties through a simple change in parameters, we show that coding properties of both these models quantitatively satisfy the predicted relationships. Our results describe how both variance-dependent gain modulation and adaptive neural computation result from intrinsic nonlinearity.

  2. Toward a tripartite model of intrinsic motivation.

    Science.gov (United States)

    Carbonneau, Noémie; Vallerand, Robert J; Lafrenière, Marc-André K

    2012-10-01

    Intrinsic motivation (IM) refers to engaging in an activity for the pleasure inherent in the activity. The present article presents a tripartite model of IM consisting of IM to know (i.e., engaging in an activity to experience pleasure while learning and trying to understand something new), IM toward accomplishment (i.e., engaging in an activity for the pleasure experienced when attempting task mastery), and IM to experience stimulation (i.e., engaging in an activity for feelings of sensory pleasure). The tripartite model of IM posits that each type of IM can result from task, situational, and personality determinants and can lead to specific types of cognitive, affective, and behavioral outcomes. The purpose of this research was to test some predictions derived from this model. Across 4 studies (Study 1: N = 331; Study 2: N = 113; Study 3: N = 58; Study 4: N = 135), the 3 types of IM as well as potential determinants and consequences were assessed. Results revealed that experiencing one type of IM over the others depends in part on people's personality styles. Also, each type of IM was found to predict specific outcomes (i.e., affective states and behavioral choices). The implications of the tripartite model of IM for motivation research are discussed. © 2011 The Authors. Journal of Personality © 2011, Wiley Periodicals, Inc.

  3. Rates, intrinsic linkages, and multistate population dynamics.

    Science.gov (United States)

    Schoen, Robert

    2017-01-01

    Demographic analyses of multistate populations are commonplace, as are situations where population stocks are known but population flows are not. Still, demographic models for multistate populations with changing rates remain at an early stage of development, limiting dynamic analyses and analytical projections. Here, a new approach, the Intrinsic Linkage-Rate Ratio (IL-RR) model, is presented and explored. The key IL parameter, w , is a simple weight for projecting populations. Using the ultimate state composition implied by the prevailing rates, the IL-RR model provides new relationships that connect multistate populations over time and allow analytical population projections. Parameter w reflects population metabolism and scales the level of the transfer rates. Compositional change is driven by the sequence of implicit stable population compositions. The IL-RR approach also provides a new method for estimating transfer rates within an interval from population numbers at the beginning and end of the interval. The new relationships developed advance the ability of demographers to model multistate populations with changing rates and to relate population stocks and flows.

  4. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  5. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  6. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  7. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  8. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  9. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables, ... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  10. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  11. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  12. Introduction to Hardware Security

    OpenAIRE

    Yier Jin

    2015-01-01

    Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain an...

  13. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  14. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  15. Web Security Testing Cookbook

    CERN Document Server

    Hope, Paco

    2008-01-01

    Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite.

  16. Surgical Treatment Guidelines for Digital Deformity Associated With Intrinsic Muscle Spasticity (Intrinsic Plus Foot) in Adults With Cerebral Palsy.

    Science.gov (United States)

    Boffeli, Troy J; Collier, Rachel C

    2015-01-01

    Intrinsic plus foot deformity has primarily been associated with cerebral palsy and involves spastic contracture of the intrinsic musculature with resultant toe deformities. Digital deformity is caused by a dynamic imbalance between the intrinsic muscles in the foot and extrinsic muscles in the lower leg. Spastic contracture of the toes frequently involves curling under of the lesser digits or contracture of the hallux into valgus or plantarflexion deformity. Patients often present with associated pressure ulcers, deformed toenails, shoe or brace fitting challenges, and pain with ambulation or transfers. Four different patterns of intrinsic plus foot deformity have been observed by the authors that likely relate to the different patterns of muscle involvement. Case examples are provided of the 4 patterns of intrinsic plus foot deformity observed, including global intrinsic plus lesser toe deformity, isolated intrinsic plus lesser toe deformity, intrinsic plus hallux valgus deformity, and intrinsic plus hallux flexus deformity. These case examples are presented to demonstrate each type of deformity and our approach for surgical management according to the contracture pattern. The surgical approach has typically involved tenotomy, capsulotomy, or isolated joint fusion. The main goals of surgical treatment are to relieve pain and reduce pressure points through digital realignment in an effort to decrease the risk of pressure sores and allow more effective bracing to ultimately improve the patient's mobility. Copyright © 2015 American College of Foot and Ankle Surgeons. Published by Elsevier Inc. All rights reserved.

  17. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  18. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  19. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  20. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  1. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  2. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  3. Fast track-hoftealloplastik

    DEFF Research Database (Denmark)

    Hansen, Torben Bæk; Gromov, Kirill; Kristensen, Billy B

    2017-01-01

    Fast-track surgery implies a coordinated perioperative approach aimed at reducing surgical stress and facilitating post-operative recovery. The fast-track programme has reduced post-operative length of stay and has led to shorter convalescence with more rapid functional recovery and decreased...... morbidity and mortality in total hip arthroplasty. It should now be a standard total hip arthroplasty patient pathway, but fine tuning of the multiple factors in the fast-track pathway is still needed in patients with special needs or high comorbidity burden....

  4. Fast Breeder Reactor studies

    International Nuclear Information System (INIS)

    Till, C.E.; Chang, Y.I.; Kittel, J.H.; Fauske, H.K.; Lineberry, M.J.; Stevenson, M.G.; Amundson, P.I.; Dance, K.D.

    1980-07-01

    This report is a compilation of Fast Breeder Reactor (FBR) resource documents prepared to provide the technical basis for the US contribution to the International Nuclear Fuel Cycle Evaluation. The eight separate parts deal with the alternative fast breeder reactor fuel cycles in terms of energy demand, resource base, technical potential and current status, safety, proliferation resistance, deployment, and nuclear safeguards. An Annex compares the cost of decommissioning light-water and fast breeder reactors. Separate abstracts are included for each of the parts

  5. Fast Breeder Reactor studies

    Energy Technology Data Exchange (ETDEWEB)

    Till, C.E.; Chang, Y.I.; Kittel, J.H.; Fauske, H.K.; Lineberry, M.J.; Stevenson, M.G.; Amundson, P.I.; Dance, K.D.

    1980-07-01

    This report is a compilation of Fast Breeder Reactor (FBR) resource documents prepared to provide the technical basis for the US contribution to the International Nuclear Fuel Cycle Evaluation. The eight separate parts deal with the alternative fast breeder reactor fuel cycles in terms of energy demand, resource base, technical potential and current status, safety, proliferation resistance, deployment, and nuclear safeguards. An Annex compares the cost of decommissioning light-water and fast breeder reactors. Separate abstracts are included for each of the parts.

  6. Adolescents' Perceptions of Family Connectedness, Intrinsic Religiosity, and Depressed Mood

    Science.gov (United States)

    Houltberg, Benjamin J.; Henry, Carolyn S.; Merten, Michael J.; Robinson, Linda C.

    2011-01-01

    Using a sample of 248 ninth and tenth grade students at public high schools, we examined adolescents' perceptions of family connectedness, intrinsic religiosity, and adolescents' gender in relation to depressed mood and whether intrinsic religiosity and gender moderated the association of aspects of family connectedness to adolescent depressed…

  7. Palatalization and Intrinsic Prosodic Vowel Features in Russian

    Science.gov (United States)

    Ordin, Mikhail

    2011-01-01

    The presented study is aimed at investigating the interaction of palatalization and intrinsic prosodic features of the vowel in CVC (consonant+vowel+consonant) syllables in Russian. The universal nature of intrinsic prosodic vowel features was confirmed with the data from the Russian language. It was found that palatalization of the consonants…

  8. Self-Determination Theory: Intrinsic Motivation and Behavioral Change.

    Science.gov (United States)

    Flannery, Marie

    2017-03-01

    Motivation is a central concept in behavioral change. This article reviews the self-determination theory with an emphasis on "intrinsic motivation," which is facilitated when three basic psychological needs (autonomy, competence, and relatedness) are met. Intrinsic motivation is associated with improved well-being and sustained behavioral change.

  9. Elderly Taiwanese's Intrinsic Risk Factors for Fall-related Injuries

    Directory of Open Access Journals (Sweden)

    In-Fun Li

    2016-09-01

    Conclusion: Elderly Taiwanese inpatients with existing intrinsic conditions of cancer, vertigo, and lower leg weakness were at high risk of falling, resulting in severe injuries. Additional research including controlled trials is necessary to further identify treatable, causal intrinsic risk factors for this elderly group.

  10. Intrinsic antecedents of academic research productivity of a large ...

    African Journals Online (AJOL)

    Kirstam

    Intrinsic antecedents of academic research productivity of a large South African university. 175 influences as given, certain theory predicts that individual intrinsic differences can be associated with differences in individual job performance. Positive affectivity, or affect, can contribute to job satisfaction, as a result of the fit.

  11. Intrinsic religiosity reduces intergroup hostility under mortality salience

    NARCIS (Netherlands)

    De Zavala, Agnieszka Golec; Cichocka, Aleksandra; Orehek, Edward; Abdollahi, Abdolhossein

    Results of three studies indicate that intrinsic religiosity and mortality salience interact to predict intergroup hostility. Study 1, conducted among 200 American Christians and Jews, reveals that under mortality salience, intrinsic (but not extrinsic or quest) religiosity is related to decreased

  12. Extrinsic Rewards and Intrinsic Motivation in Children. Final Report.

    Science.gov (United States)

    Lepper, Mark R.

    Three experiments were conducted to examine the effects of providing extrinsic rewards for engaging in an activity on children's subsequent intrinsic interest in that activity. In each study, preschool children were asked to engage in an activity of initial intrinsic interest in individual experimental sessions. The children agreed to engage in…

  13. Creativity as Mediator for Intrinsic Motivation and Sales Performance

    Science.gov (United States)

    Bodla, Mahmood A.; Naeem, Basharat

    2014-01-01

    Substantial theoretical and empirical literature indicates inconsistent performance implications of intrinsic motivation, suggesting the possibility of some explanatory mechanisms. However, little is known about the factors that might explain intrinsic motivation and sales force performance relation, particularly in highly competitive and…

  14. Intrinsic Motivation and Flow Condition on the Music Teacher's Performance

    Science.gov (United States)

    Torres Delgado, Gabriela

    2017-01-01

    The aim of these research is to identify if music teachers and teachers from other areas are intrinsically or extrinsically motivated, to identify the dimensions of the flow state, and to identify if there is a relationship between intrinsic motivation and flow state in these teachers. The sample was made up of 738 active teachers. The presence of…

  15. Intrinsic antecedents of academic research productivity of a large ...

    African Journals Online (AJOL)

    Across different contexts, the human resources literature suggests that a range of intrinsic factors – typically measured as psychographic, or intrinsic, variables – are antecedents of individual job performance. What is not clear from this literature, however, is the relative contribution of different dimensions of these factors to ...

  16. Senescence-associated intrinsic mechanisms of osteoblast dysfunctions

    DEFF Research Database (Denmark)

    Kassem, Moustapha; Trinquier, Anne Marie-Pierre Emilie

    2011-01-01

    factors, and intrinsic mechanisms caused by the osteoblast cellular senescence. The aim of this review is to provide a summary of the intrinsic senescence mechanisms affecting osteoblastic functions and how they can be targeted in order to abolish age-related osteoblastic dysfunction and bone loss...

  17. Cooperative motion of intrinsic and actuated semiflexible swimmers

    NARCIS (Netherlands)

    Llopis, I.; Pagonabarraga, I.; Lagomarsino, M.C.; Lowe, C.P.

    2013-01-01

    We examine the phenomenon of hydrodynamic-induced cooperativity for pairs of flagellated micro-organism swimmers, of which spermatozoa cells are an example. We consider semiflexible swimmers, where inextensible filaments are driven by an internal intrinsic force and torque-free mechanism (intrinsic

  18. Leadership style and employees' intrinsic job satisfaction in the ...

    African Journals Online (AJOL)

    This study investigates the impact of leadership style on employees' intrinsic job satisfaction in the Cross River State Newspaper Corporation, Calabar, Nigeria. The study examined the problem of dissatisfaction in the work place as far as intrinsic factors of job satisfaction are concerned. Structured questionnaire was used ...

  19. Development of fuels and structural materials for fast breeder reactors

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    technology for the energy security of India in the 21st century. Keywords. Fast breeder reactor .... The design of the nuclear fuel is an important aspect which has to be optimised for efficient, economic and safe ..... Recycling of plutonium present in the irradiated fuel with minimum delay is important to ensure rapid growth of ...

  20. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  1. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  2. Secure Transportation Management

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  3. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  4. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  5. Intrinsic motivation and sportsmanship: mediating role of interpersonal relationships.

    Science.gov (United States)

    Núñez, Juan L; Martín-Albo, José; Navarro, José G; Sánchez, Juana M; González-Cutre, David

    2009-06-01

    This study analyzed the mediating role of interpersonal relations between intrinsic motivation and sportsmanship. Athletes (98 men, 97 women), ages 11 to 43 years, completed measures of intrinsic motivation toward sports, self-concept of social and family relations, and sportsmanship orientation. A structural equation model indicated that self-concept of interpersonal relations mediated the relation between intrinsic motivation and sportsmanship. Also, intrinsic motivation was directly and positively associated with self-concept of interpersonal relations, which, in turn, was positively and significantly related to sportsmanship. Variances explained by self-concept of interpersonal relations and by sportsmanship were 32 and 56%, respectively. The motivational interaction between the context of interpersonal relations and the sports context proposed in the hierarchical model of intrinsic and extrinsic motivation was discussed.

  6. Motivating crowding theory - opening the black box of intrinsic motivation

    DEFF Research Database (Denmark)

    Jacobsen, Christian Bøtcher

    2010-01-01

    Public employees work for many other reasons than because they are paid for it. In other words, intrinsic motivation is an important determinant for their performance. Nonetheless, public sector organizations increasingly rely on extrinsic motivation factors such as monetary incentives to motivate...... employees. Motivation crowding theory claims that this may be at the expense of intrinsic motivation, if the extrinsic motivation factor is perceived to be controlling. On the other hand, intrinsic motivation will be enhanced (crowded in), if the extrinsic motivation factor is perceived to be supportive....... Studies have found support for the motivation crowding claim, but have neglected intrinsic motivation. This study opens the black box of intrinsic motivation and finds a meaningful distinction between task motivation and public service motivation. Among 2,772 physiotherapists in the Danish public sector...

  7. Intrinsic Evaporative Cooling by Hygroscopic Earth Materials

    Directory of Open Access Journals (Sweden)

    Alexandra R. Rempel

    2016-08-01

    Full Text Available The phase change of water from liquid to vapor is one of the most energy-intensive physical processes in nature, giving it immense potential for cooling. Diverse evaporative cooling strategies have resulted worldwide, including roof ponds and sprinklers, courtyard fountains, wind catchers with qanats, irrigated green roofs, and fan-assisted evaporative coolers. These methods all require water in bulk liquid form. The evaporation of moisture that has been sorbed from the atmosphere by hygroscopic materials is equally energy-intensive, however, yet has not been examined for its cooling potential. In arid and semi-arid climates, hygroscopic earth buildings occur widely and are known to maintain comfortable indoor temperatures, but evaporation of moisture from their walls and roofs has been regarded as unimportant since water scarcity limits irrigation and rainfall; instead, their cool interiors are attributed to well-established mass effects in delaying the transmission of sensible gains. Here, we investigate the cooling accomplished by daily cycles of moisture sorption and evaporation which, requiring only ambient humidity, we designate as “intrinsic” evaporative cooling. Connecting recent soil science to heat and moisture transport studies in building materials, we use soils, adobe, cob, unfired earth bricks, rammed earth, and limestone to reveal the effects of numerous parameters (temperature and relative humidity, material orientation, thickness, moisture retention properties, vapor diffusion resistance, and liquid transport properties on the magnitude of intrinsic evaporative cooling and the stabilization of indoor relative humidity. We further synthesize these effects into concrete design guidance. Together, these results show that earth buildings in diverse climates have significant potential to cool themselves evaporatively through sorption of moisture from humid night air and evaporation during the following day’s heat. This finding

  8. Secure physical layer using dynamic permutations in cognitive OFDMA systems

    DEFF Research Database (Denmark)

    Meucci, F.; Wardana, Satya Ardhy; Prasad, Neeli R.

    2009-01-01

    of the permutations are analyzed for several DSA patterns. Simulations are performed according to the parameters of the IEEE 802.16e system model. The securing mechanism proposed provides intrinsic PHY layer security and it can be easily implemented in the current IEEE 802.16 standard applying almost negligible......This paper proposes a novel lightweight mechanism for a secure Physical (PHY) layer in Cognitive Radio Network (CRN) using Orthogonal Frequency Division Multiplexing (OFDM). User's data symbols are mapped over the physical subcarriers with a permutation formula. The PHY layer is secured...... with a random and dynamic subcarrier permutation which is based on a single pre-shared information and depends on Dynamic Spectrum Access (DSA). The dynamic subcarrier permutation is varying over time, geographical location and environment status, resulting in a very robust protection that ensures...

  9. Fast and pure

    Science.gov (United States)

    De Franceschi, Silvano

    2018-02-01

    Removing nuclear spins by means of isotopically purified silicon, and introducing magnetic field gradients by means of microfabricated ferromagnets yields electron spin qubits with enhanced fidelity and fast electrical control.

  10. Fast Optimal Motion Planning

    Data.gov (United States)

    National Aeronautics and Space Administration — Computationally-efficient, fast and real-time, and provably-optimal motion planner for systems with highly nonlinear dynamics that can be extended for cooperative...

  11. CMS Fast Facts

    Data.gov (United States)

    U.S. Department of Health & Human Services — CMS has developed a new quick reference statistical summary on annual CMS program and financial data. CMS Fast Facts includes summary information on total program...

  12. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three of these ......The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  13. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  14. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  15. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  16. Brug af faste vendinger

    DEFF Research Database (Denmark)

    Bergenholtz, Henning; Bjærge, Esben

    Ordbogen indelholder tekstproduktionsangivelser til ca. 17.000 idiomer, ordsprog, bevingede ord og andre faste vendinger. Det drejer sig bl.a. om angivelser til betydningen, grammatik, kollokationer, eksempler, synonymer og antonymer.......Ordbogen indelholder tekstproduktionsangivelser til ca. 17.000 idiomer, ordsprog, bevingede ord og andre faste vendinger. Det drejer sig bl.a. om angivelser til betydningen, grammatik, kollokationer, eksempler, synonymer og antonymer....

  17. Fast focus field calculations

    OpenAIRE

    Leutenegger, M.; Rao, R.; Leitgeb, R. A.; Lasser, T.

    2006-01-01

    We present a fast calculation of the electromagnetic field near the focus of an objective with a high numerical aperture (NA). Instead of direct integration, the vectorial Debye diffraction integral is evaluated with the fast Fourier transform for calculating the electromagnetic field in the entire focal region. We generalize this concept with the chirp z transform for obtaining a flexible sampling grid and an additional gain in computation speed. Under ...

  18. Fasting and Urinary Stones

    Directory of Open Access Journals (Sweden)

    Ali Shamsa

    2013-11-01

    Full Text Available Introduction: Fasting is considered as one of the most important practices of Islam, and according to Prophet Mohammad, fasting is obligatory upon Muslims. The aim of this study is to evaluate the effects of fasting on urinary stones. Materials and Methods: Very few studies have been carried out on urinary stones and the effect of Ramadan fasting. The sources of the present study are Medline and articles presented by local and Muslim researchers. Meanwhile, since we are acquainted with three well-known researchers in the field of urology, we contacted them via email and asked for their professional opinions. Results: The results of studies about the relationship of urinary stones and their incidence in Ramadan are not alike, and are even sometimes contradictory. Some believe that increased incidence of urinary stones in Ramadan is related not to fasting, but to the rise of weather temperature in hot months, and an increase in humidity. Conclusion: Numerous biological and behavioral changes occur in people who fast in Ramadan and some researchers believe that urinary stone increases during this month.

  19. 76 FR 46603 - Security Ratings

    Science.gov (United States)

    2011-08-03

    ... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 200, 229, 230, 232, 239, 240, and 249 [Release No. 33-9245; 34-64975; File No. S7-18-08] RIN 3235-AK18 Security Ratings AGENCY: Securities and Exchange... requirements under the Securities Act of 1933 and the Securities Exchange Act of 1934 for securities offering...

  20. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  1. Trend of development of fast breeder reactors

    Energy Technology Data Exchange (ETDEWEB)

    Murakami, S. (Science and Technology Agency, Tokyo (Japan). Atomic Energy Bureau)

    1982-01-01

    The development of nuclear power is indispensable as the core of the substitute energy for petroleum. It is the urgent subject for world advanced countries to develop fast breeder reactors which can utilize uranium resources efficiently, to breed nuclear fuel resources, and to secure the stable supply of energy for long term in future. In Japan, the development of fast breeder reactors has been advanced independently and efficiently as a national project mainly by the Power Reactor and Nuclear Fuel Development Corp. The experimental reactor ''Joyo'' attained the criticality in April, 1977, and has been operated at the thermal output of 75,000 kW. As for the prototype reactor ''Monju'', the application for the permission to install it was submitted in December, 1980, and now, the safety examination is in progress. The present state of the development of fast breeder reactors in USA, Great Britain, France, West Germany, USSR and Japan is explained. In order to advance fast breeder reactors to the stage of full-scale practical use, a number of the reactors of 1 million kW class including the demonstration reactor will be constructed and operated to demonstrate and learn the technology of power generation plants in practical scale, to improve the performance, and to establish the economical efficiency. The schedule of development, the organization and the sharing of roles, the research and development in the demonstration stage are described.

  2. Overview of security culture

    International Nuclear Information System (INIS)

    Matulanya, M. A.

    2014-04-01

    Nuclear Security culture concept has been aggressively promoted over the past several years as a tool to improve the physical protection of the nuclear and radioactive materials due to growing threats of catastrophic terrorism and other new security challenges. It is obvious that, the scope of nuclear security and the associated cultures need to be extended beyond the traditional task of protecting weapons-usable materials. The role of IAEA is to strengthen the nuclear security framework globally and in leading the coordination of international activities in this field. Therefore all governments should work closely with the IAEA to take stronger measures to ensure the physical protection, the safety and security of the nuclear and radioactive materials. In the effort to reflect this new realities and concerns, the IAEA in 2008 came up with the document, the Nuclear Security Culture, Nuclear Security Series No. 7, Implementing Guide to the member states which urged every member state to take appropriate measures to promote security culture with respect to nuclear and radioactive materials. The document depicted this cultural approach as the way to protect individual, society and the environment. Among other things, the document defined nuclear security culture as characteristics and attitudes in organizations and of individuals which establishes that, nuclear security issues receives attention warranted by their significance. (au)

  3. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  4. VELOCITY EVOLUTION AND THE INTRINSIC COLOR OF TYPE Ia SUPERNOVAE

    International Nuclear Information System (INIS)

    Foley, Ryan J.; Sanders, Nathan E.; Kirshner, Robert P.

    2011-01-01

    To understand how best to use observations of Type Ia supernovae (SNe Ia) to obtain precise and accurate distances, we investigate the relations between spectra of SNe Ia and their intrinsic colors. Using a sample of 1630 optical spectra of 255 SNe, based primarily on data from the CfA Supernova Program, we examine how the velocity evolution and line strengths of Si II λ6355 and Ca II H and K are related to the B – V color at peak brightness. We find that the maximum-light velocity of Si II λ6355 and Ca II H and K and the maximum-light pseudo-equivalent width of Si II λ6355 are correlated with intrinsic color, with intrinsic color having a linear relation with the Si II λ6355 measurements. Ca II H and K does not have a linear relation with intrinsic color, but lower-velocity SNe tend to be intrinsically bluer. Combining the spectroscopic measurements does not improve intrinsic color inference. The intrinsic color scatter is larger for higher-velocity SNe Ia—even after removing a linear trend with velocity—indicating that lower-velocity SNe Ia are more 'standard crayons'. Employing information derived from SN Ia spectra has the potential to improve the measurements of extragalactic distances and the cosmological properties inferred from them.

  5. Some chaotic features of intrinsically coupled Josephson junctions

    International Nuclear Information System (INIS)

    Kolahchi, M.R.; Shukrinov, Yu.M.; Hamdipour, M.; Botha, A.E.; Suzuki, M.

    2013-01-01

    Highlights: ► Intrinsically coupled Josephson junctions model a high-T c superconductor. ► Intrinsically coupled Josephson junctions can act as a chaotic nonlinear system. ► Chaos could be due to resonance overlap. ► Avoiding parameters that lead to chaos is important for the design of resonators. -- Abstract: We look for chaos in an intrinsically coupled system of Josephson junctions. This study has direct applications for the high-T c resonators which require coherence amongst the junctions

  6. Congenital hypertrophy of multiple intrinsic muscles of the foot.

    Science.gov (United States)

    Shiraishi, Tomohiro; Park, Susam; Niu, Atushi; Hasegawa, Hiromi

    2014-12-01

    Congenital hypertrophy of a single intrinsic muscle of the foot is rare, and as far as we know, only six cases have been reported. We describe a case of congenital anomaly that showed hypertrophy of multiple intrinsic muscles of the foot; the affected muscles were all the intrinsic muscles of the foot except the extensor digitorum brevis or extensor hallucis. Other tissues such as adipose tissue, nervous tissue, or osseous tissue showed no abnormalities. To reduce the volume of the foot we removed parts of the enlarged muscles.

  7. Simple intrinsic defects in GaAs : numerical supplement.

    Energy Technology Data Exchange (ETDEWEB)

    Schultz, Peter Andrew

    2012-04-01

    This Report presents numerical tables summarizing properties of intrinsic defects in gallium arsenide, GaAs, as computed by density functional theory. This Report serves as a numerical supplement to the results published in: P.A. Schultz and O.A. von Lilienfeld, 'Simple intrinsic defects in GaAs', Modelling Simul. Mater. Sci Eng., Vol. 17, 084007 (2009), and intended for use as reference tables for a defect physics package in device models. The numerical results for density functional theory calculations of properties of simple intrinsic defects in gallium arsenide are presented.

  8. Helical propensity in an intrinsically disordered protein accelerates ligand binding

    DEFF Research Database (Denmark)

    Iesmantavicius, Vytautas; Dogan, Jakob; Jemth, Per

    2014-01-01

    domain of the activator for thyroid hormone and retinoid receptors (ACTR) is intrinsically disordered and folds upon binding to the nuclear coactivator binding domain (NCBD) of the CREB binding protein. A number of mutants was designed that selectively perturbs the amount of secondary structure......Many intrinsically disordered proteins fold upon binding to other macromolecules. The secondary structure present in the well-ordered complex is often formed transiently in the unbound state. The consequence of such transient structure for the binding process is, however, not clear. The activation...... the notion of preformed secondary structure as an important determinant for molecular recognition in intrinsically disordered proteins....

  9. Intrinsic and collective structure in the interacting boson model

    International Nuclear Information System (INIS)

    Leviatan, A.

    1987-01-01

    A general non-spherical boson basis is introduced to study the excitation modes in the interacting boson model (IBM). A prescription for construction of intrinsic states is presented. The general IBM Hamiltonian is resolved exactly into intrinsic and collective parts. The limit of large boson number is discussed analytically for spectrum and transitions. The method of analysis reveals an underlying intrinsic and collective structure closely linked with symmetry considerations. The suggested new approach seems to be adequate as a tool to obtain the physical content and normal modes in any number conserving algebraic bosonic system. copyright 1987 Academic Press, Inc

  10. Intrinsic and collective structure in the interacting boson model

    Energy Technology Data Exchange (ETDEWEB)

    Leviatan, A.

    1987-11-01

    A general non-spherical boson basis is introduced to study the excitation modes in the interacting boson model (IBM). A prescription for construction of intrinsic states is presented. The general IBM Hamiltonian is resolved exactly into intrinsic and collective parts. The limit of large boson number is discussed analytically for spectrum and transitions. The method of analysis reveals an underlying intrinsic and collective structure closely linked with symmetry considerations. The suggested new approach seems to be adequate as a tool to obtain the physical content and normal modes in any number conserving algebraic bosonic system. copyright 1987 Academic Press, Inc.

  11. While working around security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result......This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  12. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t ... in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...

  13. Materialism and food security.

    Science.gov (United States)

    Allen, M W; Wilson, M

    2005-12-01

    The present studies examined if materialists have an elevated concern about food availability, presumably stemming from a general survival security motivation. Study 1 found that materialists set a greater life goal of food security, and reported more food insecurity during their childhood. Materialists reported less present-day food insecurity. Study 2 revealed that materialists stored/hoarded more food at home, and that obese persons endorsed materialism more than low/normal weight persons. Study 3 found that experimentally decreasing participants' feelings of survival security (via a mortality salience manipulation) led to greater endorsement of materialism, food security as goal, and using food for emotional comfort. The results imply that materialists overcame the food insecurity of their childhood by making food security a top life goal, but that materialists' current concerns about food security may not wholly stem from genuine threats to their food supply.

  14. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  15. PRIVATE SECURITY IN SPORT

    Directory of Open Access Journals (Sweden)

    Dragan Vukasović

    2011-09-01

    Full Text Available Given the importance of sport for international integration, affirmation, a sense of belonging and other values of general interest, in order to maintain and open new prospects of development, it is necessary to form the private security system along with state security system, with a view to creating conditions for development sports athletes to achieve better results both in domestic and international competitions. Private security is only one element of an integrated security system which, with its efficient organization with the use of adequate means and measures should provide answers to new challenges, risks and threats. Private security in line with the new understanding of the concept of security has an important role in providing athletes.

  16. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  17. Fast breeder reactors

    International Nuclear Information System (INIS)

    Waltar, A.E.; Reynolds, A.B.

    1981-01-01

    This book describes the major design features of fast breeder reactors and the methods used for their design and analysis. The foremost objective of this book is to fulfill the need for a textbook on Fast Breeder Reactor (FBR) technology at the graduate level or the advanced undergraduate level. It is assumed that the reader has an introductory understanding of reactor theory, heat transfer, and fluid mechanics. The book is expected to be used most widely for a one-semester general course on fast breeder reactors, with the extent of material covered to vary according to the interest of the instructor. The book could also be used effectively for a two-quarter or a two-semester course. In addition, the book could serve as a text for a course on fast reactor safety since many topics other than those appearing in the safety chapters relate to FBR safety. Methodology in fast reactor design and analysis, together with physical descriptions of systems, is emphasized in this text more than numerical results. Analytical and design results continue to change with the ongoing evolution of FBR design whereas many design methods have remained fundamentally unchanged for a considerable time

  18. Fast reactor programme

    International Nuclear Information System (INIS)

    Plakman, J.C.

    1982-01-01

    This progress report summarizes the fast reactor research carried out by ECN during the period covering the year 1980. This research is mainly concerned with the cores of sodium-cooled breeders, in particular the SNR-300, and its related safety aspects. It comprises six items: A programme to determine relevant nuclear data of fission- and corrosion-products; A fuel performance programme comprising in-pile cladding failure experiments and a study of the consequences of loss-of-cooling and overpower; Basic research on fuel; Investigation of the changes in the mechanical properties of austenitic stainless steel DIN 1.4948 due to fast neutron doses, this material has been used in the manufacture of the reactor vessel and its internal components; Study of aerosols which could be formed at the time of a fast reactor accident and their progressive behaviour on leaking through cracks in the concrete containment; Studies on heat transfer in a sodium-cooled fast reactor core. As fast breeders operate at high power densities, an accurate knowledge of the heat transfer phenomena under single-phase and two-phase conditions is sought. (Auth.)

  19. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  20. Assessment of plutonium security effect using import premium method

    International Nuclear Information System (INIS)

    Ohkubo, Hiroo; Aoyagi, Tadashi; Kikuchi, Masahiro; Suzuki, Atsuyuki.

    1994-01-01

    A mathematical formulation was developed to describe the concept of import premium method, which can quantify a security effect of demand reduction of imports by introducing the alternative before its supply disruption (or variation) may happen. Next, by using this formula, a security value of plutonium use (especially, fast breeder reactor), defined as a contributor to reduction of possibilities of disruption (or variation) of natural uranium supply was estimated. From these studies, it is concluded that although the formula proposed here is simplified, it may be available for assessing an energy security if only we prepare the data concerning future motions of supply and demand curves. (author)

  1. Towards Information Security Awareness

    OpenAIRE

    Marius Petrescu; Delia Mioara Popescu; Nicoleta Sirbu

    2010-01-01

    Information security has come to be recognized as increasingly important because global communication and information systems allow a potentially large number of unauthorized users to access and possibly alter information from around the world. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity, no matter if it is a company or a public institution. Information security involves both technology and people. Any securi...

  2. ITIL® and information security

    International Nuclear Information System (INIS)

    Jašek, Roman; Králík, Lukáš; Popelka, Miroslav

    2015-01-01

    This paper discusses the context of ITIL framework and management of information security. It is therefore a summary study, where the first part is focused on the safety objectives in connection with the ITIL framework. First of all, there is a focus on ITIL process ISM (Information Security Management), its principle and system management. The conclusion is about link between standards, which are related to security, and ITIL framework

  3. Wireless physical layer security

    OpenAIRE

    Poor, H. Vincent; Schaefer, Rafael F.

    2016-01-01

    Security is a very important issue in the design and use of wireless networks. Traditional methods of providing security in such networks are impractical for some emerging types of wireless networks due to the light computational abilities of some wireless devices [such as radio-frequency identification (RFID) tags, certain sensors, etc.] or to the very large scale or loose organizational structure of some networks. Physical layer security has the potential to address these concerns by taking...

  4. Addressing Software Security

    Science.gov (United States)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  5. Intercorporate Security Event Correlation

    Directory of Open Access Journals (Sweden)

    D. O. Kovalev

    2010-03-01

    Full Text Available Security controls are prone to false positives and false negatives which can lead to unwanted reputation losses for the bank. The reputational database within the security operations center (SOC and intercorporate correlation of security events are offered as a solution to increase attack detection fidelity. The theses introduce the definition and structure of the reputation, architectures of reputational exchange and the place of intercorporate correlation in overall SOC correlation analysis.

  6. Declining job security

    OpenAIRE

    Robert G. Valletta

    1998-01-01

    Although common belief and recent evidence point to a decline in "job security," the academic literature to date has been noticeably silent regarding the behavioral underpinnings of declining job security. In this paper, I define job security in the context of implicit contracts designed to overcome incentive problems in the employment relationship. Contracts of this nature imply the possibility of inefficient separations in response to adverse shocks, and they generate predictions concerning...

  7. Outsourcing information security

    CERN Document Server

    Axelrod, Warren

    2004-01-01

    This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

  8. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  9. Wireless Networks Security

    OpenAIRE

    Jenko, Marko

    2016-01-01

    In this thesis we deal with security, penetration testing and different types of attacks on wireless networks. We theoretically familiarize with the field of wireless networks, security mechanisms and the most used security standards. Then we systematically overview the field of penetration testing. We divide the penetration testing on types and different methodologies. We explain the tasks of the provider and the subscriber in penetration testing. Description of the process of conducting the...

  10. Secure Virtual Enclaves

    National Research Council Canada - National Science Library

    Shands, Deborah

    2002-01-01

    The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application resources, while respecting organizational autonomy over local resources...

  11. Governing for Enterprise Security

    National Research Council Canada - National Science Library

    Allen, Julia

    2005-01-01

    ... business. If an organization's management -- including boards of directors, senior executives, and all managers -- does not establish and reinforce the business need for effective enterprise security...

  12. Linux Security Cookbook

    CERN Document Server

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  13. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  14. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  15. Chemical Security Analysis Center

    Data.gov (United States)

    Federal Laboratory Consortium — In 2006, by Presidential Directive, DHS established the Chemical Security Analysis Center (CSAC) to identify and assess chemical threats and vulnerabilities in the...

  16. VoIP Security

    OpenAIRE

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  17. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  18. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  19. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  20. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  1. Adopting preoperative fasting guidelines.

    Science.gov (United States)

    Anderson, Megan; Comrie, Rhonda

    2009-07-01

    In 1999, the American Society of Anesthesiologists adopted preoperative fasting guidelines to enhance the quality and efficiency of patient care. Guidelines suggest that healthy, non-pregnant patients should fast six hours from solids and two hours from liquids. Although these guidelines are in place, studies suggest that providers are still using the blanket statement "NPO after midnight" without regard to patient characteristics, the procedure, or the time of the procedure. Using theory to help change provider's beliefs may help make change more successful. Rogers' Theory of Diffusion of Innovations can assist in changing long-time practice by laying the groundwork for an analysis of the benefits and disadvantages of proposed changes, such as changes to fasting orders, while helping initiate local protocols instead of additional national guidelines.

  2. Bigdata Driven Cloud Security: A Survey

    Science.gov (United States)

    Raja, K.; Hanifa, Sabibullah Mohamed

    2017-08-01

    Cloud Computing (CC) is a fast-growing technology to perform massive-scale and complex computing. It eliminates the need to maintain expensive computing hardware, dedicated space, and software. Recently, it has been observed that massive growth in the scale of data or big data generated through cloud computing. CC consists of a front-end, includes the users’ computers and software required to access the cloud network, and back-end consists of various computers, servers and database systems that create the cloud. In SaaS (Software as-a-Service - end users to utilize outsourced software), PaaS (Platform as-a-Service-platform is provided) and IaaS (Infrastructure as-a-Service-physical environment is outsourced), and DaaS (Database as-a-Service-data can be housed within a cloud), where leading / traditional cloud ecosystem delivers the cloud services become a powerful and popular architecture. Many challenges and issues are in security or threats, most vital barrier for cloud computing environment. The main barrier to the adoption of CC in health care relates to Data security. When placing and transmitting data using public networks, cyber attacks in any form are anticipated in CC. Hence, cloud service users need to understand the risk of data breaches and adoption of service delivery model during deployment. This survey deeply covers the CC security issues (covering Data Security in Health care) so as to researchers can develop the robust security application models using Big Data (BD) on CC (can be created / deployed easily). Since, BD evaluation is driven by fast-growing cloud-based applications developed using virtualized technologies. In this purview, MapReduce [12] is a good example of big data processing in a cloud environment, and a model for Cloud providers.

  3. Proton Fast Ignition

    International Nuclear Information System (INIS)

    Key, M H; Freeman, R R; Hatchett, S P; MacKinnon, A J; Patel, P K; Snavely, R A; Stephens, R B

    2006-04-01

    Fast ignition (FI) by a laser generated ballistically focused proton beam is a more recently proposed alternative to the original concept of FI by a laser generated beam of relativistic electrons. It has potential advantages in less complex energy transport into dense plasma. Recent successful target heating experiments motivate further investigation of the feasibility of proton fast ignition. The concept, the physics and characteristics of the proton beams, the recent experimental work on focusing of the beams and heating of solid targets and the overall prospects for proton FI are discussed

  4. A Fast Hermite Transform.

    Science.gov (United States)

    Leibon, Gregory; Rockmore, Daniel N; Park, Wooram; Taintor, Robert; Chirikjian, Gregory S

    2008-12-17

    We present algorithms for fast and stable approximation of the Hermite transform of a compactly supported function on the real line, attainable via an application of a fast algebraic algorithm for computing sums associated with a three-term relation. Trade-offs between approximation in bandlimit (in the Hermite sense) and size of the support region are addressed. Numerical experiments are presented that show the feasibility and utility of our approach. Generalizations to any family of orthogonal polynomials are outlined. Applications to various problems in tomographic reconstruction, including the determination of protein structure, are discussed.

  5. Fast breeder project (PSB)

    International Nuclear Information System (INIS)

    1976-07-01

    Activities performed during the 1st quarter of 1976 at or on behalf of the Gesellschaft fuer Kernforschung mbH, Karlsruhe, within the framework of the Fast Breeder Project are given a survey. The following project subdivisions are dealt with: Fuel rod development; materials testing and developments; corrosion studies and coolant analyses; physical experiments; reactor theory; safety of fast breeders; instrumentation and signal processing for core monitoring; effects on the environment; sodium technology tests; thermodynamic and fluid flow tests in gas. (HR) [de

  6. Fast neutron dosimetry

    International Nuclear Information System (INIS)

    DeLuca, P.M. Jr.; Pearson, D.W.

    1993-01-01

    Research concentrated on three major areas during the last twelve months: (1) investigations of energy fluence and absorbed dose measurements using crystalline and hot pressed TLD materials exposes to ultrasoft beams of photons, (2) fast neutron kerma factor measurements for several important elements as well as NE-213 scintillation material response function determinations at the intense ''white'' source available at the WNR facility at LAMPF, and (3) kerma factor ratio determinations for carbon and oxygen to A-150 tissue equivalent plastic at the clinical fast neutron radiation facility at Harper Hospital, Detroit, MI. Progress summary reports of these efforts are given in this report

  7. Moms og fast ejendom

    DEFF Research Database (Denmark)

    Edlund, Hans Henrik

    1999-01-01

    I artiklen gives et overblik over, hvorledes fast ejendom behandles momsmæssigt. Derfor findes en kort skitsering af reglerne for moms på byggearbejder, afgrænsningen mellem momspligtig og momsfri udlejning, muligheden for frivillig registrering af udlejning samt opgørelse af reguleringsforpligte......I artiklen gives et overblik over, hvorledes fast ejendom behandles momsmæssigt. Derfor findes en kort skitsering af reglerne for moms på byggearbejder, afgrænsningen mellem momspligtig og momsfri udlejning, muligheden for frivillig registrering af udlejning samt opgørelse af...

  8. Fast ejendom II

    DEFF Research Database (Denmark)

    Munk-Hansen, Carsten

    Fremstillingen påviser, at lov om forbrugerbeskyttelse ved erhvervelse af fast ejendom mv. lider af en række svagheder og at ankenævnspraksis bevæger sig væk fra retspraksis på en række områder.......Fremstillingen påviser, at lov om forbrugerbeskyttelse ved erhvervelse af fast ejendom mv. lider af en række svagheder og at ankenævnspraksis bevæger sig væk fra retspraksis på en række områder....

  9. Intrinsically motivated learning in natural and artificial systems

    CERN Document Server

    Baldassarre, Gianluca

    2013-01-01

    This book presents the state of the art in research on intrinsically motivated learning and presents novel tools for research. It also identifies related scientific and technological open challenges as well as promising research directions.

  10. Recent Advances in Intrinsic Self-Healing Cementitious Materials.

    Science.gov (United States)

    Li, Wenting; Dong, Biqin; Yang, Zhengxian; Xu, Jing; Chen, Qing; Li, Haoxin; Xing, Feng; Jiang, Zhengwu

    2018-03-25

    Self-healing is a natural phenomenon whereby living organisms respond to damage. Recently, considerable research efforts have been invested in self-healing cementitious materials that are capable of restoring structural integrity and mechanical properties after being damaged. Inspired by nature, a variety of creative approaches are explored here based on the intrinsic or extrinsic healing mechanism. Research on new intrinsic self-healing cementitious materials with biomimetic features is on the forefront of material science, which provides a promising way to construct resilient and sustainable concrete infrastructures. Here, the current advances in the development of the intrinsic healing cementitious materials are described, and a new definition of intrinsic self-healing discussed. The methods to assess the efficiency of different healing mechanisms are briefly summarized. The critical insights are emphasized to guide the future research on the development of new self-healing cementitious materials. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  11. Intrinsic and extrinsic motivation for stereotypic and repetitive behavior.

    Science.gov (United States)

    Joosten, Annette V; Bundy, Anita C; Einfeld, Stewart L

    2009-03-01

    This study provides evidence for intrinsic and extrinsic motivators for stereotypical and repetitive behavior in children with autism and intellectual disability and children with intellectual disability alone. We modified the Motivation Assessment Scale (MAS) (1988b); dividing it into intrinsic and extrinsic measures and adding items to assess anxiety as an intrinsic motivator. Rasch analysis of data from 279 MASs (74 children) revealed that the items formed two unidimensional scales. Anxiety was a more likely intrinsic motivator than sensory seeking for children with dual diagnoses; the reverse was true for children with intellectual disability only. Escape and gaining a tangible object were the most common extrinsic motivators for those with dual diagnoses and attention and escape for children with intellectual disability.

  12. Values, Norms, and Intrinsic Motivation to Act Proenvironmentally

    NARCIS (Netherlands)

    Steg, Linda

    2016-01-01

    Environmental problems can be reduced if people more consistently engage in proenvironmental actions. In this article, I discuss factors that motivate or inhibit individuals to act proenvironmentally. Many people are intrinsically motivated to engage in proenvironmental actions, because protecting

  13. What is Intrinsic Motivation? A Typology of Computational Approaches.

    Science.gov (United States)

    Oudeyer, Pierre-Yves; Kaplan, Frederic

    2007-01-01

    Intrinsic motivation, centrally involved in spontaneous exploration and curiosity, is a crucial concept in developmental psychology. It has been argued to be a crucial mechanism for open-ended cognitive development in humans, and as such has gathered a growing interest from developmental roboticists in the recent years. The goal of this paper is threefold. First, it provides a synthesis of the different approaches of intrinsic motivation in psychology. Second, by interpreting these approaches in a computational reinforcement learning framework, we argue that they are not operational and even sometimes inconsistent. Third, we set the ground for a systematic operational study of intrinsic motivation by presenting a formal typology of possible computational approaches. This typology is partly based on existing computational models, but also presents new ways of conceptualizing intrinsic motivation. We argue that this kind of computational typology might be useful for opening new avenues for research both in psychology and developmental robotics.

  14. Exploring the link between intrinsic motivation and quality

    Science.gov (United States)

    Christy, Steven M.

    1992-12-01

    This thesis proposes that it is workers' intrinsic motivation that leads them to produce quality work. It reviews two different types of evidence- expert opinion and empirical studies--to attempt to evaluate a link between intrinsic motivation and work quality. The thesis reviews the works of Total Quality writers and behavioral scientists for any connection they might have made between intrinsic motivation and quality. The thesis then looks at the works of Deming and his followers in an attempt to establish a match between Deming's motivational assumptions and the four task rewards in the Thomas/Tymon model of intrinsic motivation: choice, competence, meaningfulness, and progress. Based upon this analysis, it is proposed that the four Thomas/Tymon task rewards are a promising theoretical foundation for explaining the motivational basis of quality for workers in Total Quality organizations.

  15. Does displayed enthusiasm favour recall, intrinsic motivation and time estimation?

    Science.gov (United States)

    Moè, Angelica

    2016-11-01

    Displayed enthusiasm has been shown to relate to intrinsic motivation, vitality, and positive affect, but its effects on recall performance and time estimation have not yet been explored. This research aimed at studying the effects of a delivery style characterised by High Enthusiasm (HE) on recall, time estimation, and intrinsic motivation. In line with previous studies, effects on intrinsic motivation were expected. In addition, higher recall and lower time estimations were hypothesised. In two experiments, participants assigned to a HE condition or to a normal reading control condition listened to a narrative and to a descriptive passage. Then, they were asked to rate perceived time, enthusiasm, pleasure, interest, enjoyment and curiosity, before writing a free recall. Experiment 1 showed that in the HE condition, participants recalled more, were more intrinsically motivated, and expressed lower time estimations compared to the control condition. Experiment 2 confirmed the positive effects of HE reading compared to normal reading, using different passages and a larger sample.

  16. Intrinsic and extrinsic factors influencing large African herbivore movements

    NARCIS (Netherlands)

    Venter, J.A.; Prins, H.H.T.; Mashanova, A.; Boer, de W.F.; Slotow, R.

    2015-01-01

    Understanding environmental as well as anthropogenic factors that influence large herbivore ecological patterns and processes should underpin their conservation and management. We assessed the influence of intrinsic, extrinsic environmental and extrinsic anthropogenic factors on movement behaviour

  17. The Development of Intrinsic Motivation for Physical Activity

    National Research Council Canada - National Science Library

    Beaty, James D

    2005-01-01

    .... Having found this to be so, it is worthy of researchers' efforts to determine the constructs that will move individuals to become more intrinsically motivated to engage in regular exercise and/or physical activity...

  18. Intrinsic and enhanced biodegradation of benzene in strongly reduced aquifers

    NARCIS (Netherlands)

    Heiningen, W.N.M. van; Rijnaarts, H.H.M; Langenhoff, A.A.M.

    1999-01-01

    Laboratory microcosm studies were performed to examine intrinsic and enhanced benzene bioremediation using five different sediment and groundwater samples from three deeply anaerobic aquifers sited in northern Netherlands. The influence of addition of nitrate, sulfate, limited amounts of oxygen, and

  19. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  20. Why food in health security (FIHS)?

    Science.gov (United States)

    Wahlqvist, Mark L

    2009-01-01

    Health is intrinsic to human security (HumS) although it is somewhat anthropocentric and about our own psychosocial and biomedical status more than various external threats. The 1994 United Nations Development Program definition of HumS includes economic, food, environmental, personal, community and political security with freedom from fear and want. Environmental factors are critical for health security (HealS), especially with widespread socio-economic difficulty, and health systems less affordable or accessible. The nexus between nutritionally-related disorders and infectious disease is the most pervasive world health problem. Most if not all of the Millennium Development Goals are food-linked. Maternal nutrition has life-long health effects on the yet-to-be born child. The mix of essential nutrient deprivation and energy imbalance is rife across many societies. Food systems require deeper understanding and governance to overcome these food-related health risks which are matters of food security (FoodS). Nutritionally-related Disability Adjusted Life Years (DALYS) are improving markedly in many parts of the world, along with poverty and hunger reduction and health system advances. But recent economic, energy, food, water, climate change and health crises along with conflict are limiting. It is time for international and regional understanding of how households and communities can collectively manage these threats in affordable and sustainable ways. There is untapped problem-solving capacity at the international local level if supported by combined food--health systems expertise, innovation, infrastructure and governance. Principles of equity and ethics must apply. The Food in Health Security (FIHS) roundtable aims to develop a Network to facilitate this process.

  1. An empirical qualitative study of students’ perceived intrinsic motivation

    OpenAIRE

    Pals Svendsen, Lisbet; Mondahl, Margrethe S.; Faizi, Zaki

    2014-01-01

    Foreign language and culture learning suffers from a bad image in Danish Upper Secondary schools and German is not an exception. It means that the majority of Danish Upper Secondary school students are not particularly interested in learning the language. Therefore, intrinsic motivation plays a pivotal role in German language and culture learning in Denmark. One didactic initiative proposed to remedy the lack of intrinsic motivation is the introduction of various ICT (Information and Communic...

  2. A hierarchy of intrinsic timescales across primate cortex.

    Science.gov (United States)

    Murray, John D; Bernacchia, Alberto; Freedman, David J; Romo, Ranulfo; Wallis, Jonathan D; Cai, Xinying; Padoa-Schioppa, Camillo; Pasternak, Tatiana; Seo, Hyojung; Lee, Daeyeol; Wang, Xiao-Jing

    2014-12-01

    Specialization and hierarchy are organizing principles for primate cortex, yet there is little direct evidence for how cortical areas are specialized in the temporal domain. We measured timescales of intrinsic fluctuations in spiking activity across areas and found a hierarchical ordering, with sensory and prefrontal areas exhibiting shorter and longer timescales, respectively. On the basis of our findings, we suggest that intrinsic timescales reflect areal specialization for task-relevant computations over multiple temporal ranges.

  3. Study of Intrinsic motivation in the Ministry for Foreign Affairs

    OpenAIRE

    Lehtimäki, Nora

    2015-01-01

    The purpose of this thesis was to investigate intrinsic motivation of the executive assistants and secretaries in the Ministry for Foreign Affairs. The objective in turn, was to examine how well intrinsic motivation has been achieved among these executive assistants and secretaries. How respondents evaluate their job satisfaction, work environment and motivation was also researched. Lastly, factors that increase or decrease motivation were studied, as well as if there is a need for additional...

  4. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  5. Intrinsic Losses Based on Information Geometry and Their Applications

    Directory of Open Access Journals (Sweden)

    Yao Rong

    2017-08-01

    Full Text Available One main interest of information geometry is to study the properties of statistical models that do not depend on the coordinate systems or model parametrization; thus, it may serve as an analytic tool for intrinsic inference in statistics. In this paper, under the framework of Riemannian geometry and dual geometry, we revisit two commonly-used intrinsic losses which are respectively given by the squared Rao distance and the symmetrized Kullback–Leibler divergence (or Jeffreys divergence. For an exponential family endowed with the Fisher metric and α -connections, the two loss functions are uniformly described as the energy difference along an α -geodesic path, for some α ∈ { − 1 , 0 , 1 } . Subsequently, the two intrinsic losses are utilized to develop Bayesian analyses of covariance matrix estimation and range-spread target detection. We provide an intrinsically unbiased covariance estimator, which is verified to be asymptotically efficient in terms of the intrinsic mean square error. The decision rules deduced by the intrinsic Bayesian criterion provide a geometrical justification for the constant false alarm rate detector based on generalized likelihood ratio principle.

  6. A dynamic birth-death model via Intrinsic Linkage

    Directory of Open Access Journals (Sweden)

    Robert Schoen

    2013-05-01

    Full Text Available BACKGROUND Dynamic population models, or models with changing vital rates, are only beginning to receive serious attention from mathematical demographers. Despite considerable progress, there is still no general analytical solution for the size or composition of a population generated by an arbitrary sequence of vital rates. OBJECTIVE The paper introduces a new approach, Intrinsic Linkage, that in many cases can analytically determine the birth trajectory of a dynamic birth-death population. METHODS Intrinsic Linkage assumes a weighted linear relationship between (i the time trajectory of proportional increases in births in a population and (ii the trajectory of the intrinsic rates of growth of the projection matrices that move the population forward in time. Flexibility is provided through choice of the weighting parameter, w, that links these two trajectories. RESULTS New relationships are found linking implied intrinsic and observed population patterns of growth. Past experience is "forgotten" through a process of simple exponential decay. When the intrinsic growth rate trajectory follows a polynomial, exponential, or cyclical pattern, the population birth trajectory can be expressed analytically in closed form. Numerical illustrations provide population values and relationships in metastable and cyclically stable models. Plausible projection matrices are typically found for a broad range of values of w, although w appears to vary greatly over time in actual populations. CONCLUSIONS The Intrinsic Linkage approach extends current techniques for dynamic modeling, revealing new relationships between population structures and the changing vital rates that generate them.

  7. Intrinsic honesty and the prevalence of rule violations across societies.

    Science.gov (United States)

    Gächter, Simon; Schulz, Jonathan F

    2016-03-24

    Deception is common in nature and humans are no exception. Modern societies have created institutions to control cheating, but many situations remain where only intrinsic honesty keeps people from cheating and violating rules. Psychological, sociological and economic theories suggest causal pathways to explain how the prevalence of rule violations in people's social environment, such as corruption, tax evasion or political fraud, can compromise individual intrinsic honesty. Here we present cross-societal experiments from 23 countries around the world that demonstrate a robust link between the prevalence of rule violations and intrinsic honesty. We developed an index of the 'prevalence of rule violations' (PRV) based on country-level data from the year 2003 of corruption, tax evasion and fraudulent politics. We measured intrinsic honesty in an anonymous die-rolling experiment. We conducted the experiments with 2,568 young participants (students) who, due to their young age in 2003, could not have influenced PRV in 2003. We find individual intrinsic honesty is stronger in the subject pools of low PRV countries than those of high PRV countries. The details of lying patterns support psychological theories of honesty. The results are consistent with theories of the cultural co-evolution of institutions and values, and show that weak institutions and cultural legacies that generate rule violations not only have direct adverse economic consequences, but might also impair individual intrinsic honesty that is crucial for the smooth functioning of society.

  8. Intrinsically Disordered Side of the Zika Virus Proteome

    Directory of Open Access Journals (Sweden)

    Rajanish Giri

    2016-11-01

    Full Text Available Over the last few decades, concepts of protein intrinsic disorder have been implicated in different biological processes. Recent studies have suggested that intrinsically disordered proteins (IDPs provide structural plasticity and functional diversity to viral proteins that are involved in rapid replication and immune evasion in host cells. In case of Zika virus, the roles of protein intrinsic disorder in mechanisms of pathogenesis are not completely understood. In this study, we have analyzed the prevalence of intrinsic disorder in Zika virus proteome (strain MR 766. Our analyses revealed that Zika virus polyprotein is enriched with intrinsically disordered protein regions (IDPRs and this finding is consistent with previous reports on the involvement of IDPs in shell formation and virulence of the Flaviviridae family. We found abundant IDPRs in Capsid, NS2B, NS3, NS4A, and NS5 proteins that are involved in mature particle formation and replication. In our view, the intrinsic disorder-focused analysis of ZIKV proteins could be important for the development of new disorder-based drugs.

  9. Application Security for the Android Platform Processes, Permissions, and Other Safeguards

    CERN Document Server

    Six, Jeff

    2011-01-01

    This book will educate readers on the need for application security and secure coding practices when designing any app. No prior knowledge of security or secure programming techniques is assumed. The book will discuss the need for such practices, how the Android environment is structured with respect to security considerations, what services and techniques are available on the platform to protect data, and how developers can build and code applications that address the risk to their applications and the data processed by them. This text is especially important now, as Android is fast becoming

  10. Research activities on fast reactors in Switzerland

    International Nuclear Information System (INIS)

    Brogli, R.; Dones, R.; Hudina, M.; Pelloni, S.

    1996-01-01

    The current domestic Swiss electricity supply is primarily based on hydro power (approximately 61%) and nuclear power (about 37%). The contribution of fossil systems is, consequently, minimal (the remaining 2%). In addition, long-term (but limited in time) contracts exist, securing imports of electricity of nuclear origin from France. During the last two years, the electricity consumption has been almost stagnant, although the 80s recorded an average annual increase rate of 2.7%. The future development of the electricity demand is a complex function of several factors with possibly competing effects, like increased efficiency of applications, changes in the industrial structure of the country, increase of population, further automation of industrial processes and services. Due to decommissioning of the currently operating nuclear power plants and expiration of long-term electricity import contracts there will eventually open a gap between the postulated electricity demand and the base supply. The assumed projected demand cases, high and low, as well as the secured yearly electric energy supply are shown. The physics aspects of plutonium burning fast reactor configurations are described including first results of the CIRANO experimental program. Swiss research related to residual heat removal in fast breeder reactors is presented. It consists of experimental ana analytic investigations on the mixing between two horizontal fluid layers of different velocities and temperatures. Development of suitable computer codes for mixing layer calculation are aimed to accurately predict the flow and temperature distribution in the pools. A satisfactory codes validation based on experimental data should be done

  11. Hemispherical Capsule Implosions for Fast Ignition*

    Science.gov (United States)

    Hanson, D. L.; Vesey, R. A.; Sinars, D. B.; Adams, R. G.; Cuneo, M. E.; Porter, J. L.; Slutz, S. A.; Johnston, R. R.; Wenger, D. F.; Schroen, D. G.

    2003-10-01

    The fast ignitor approach to ICF ignition separates the fuel assembly and fast heating processes. After compressing the fuel with the main driver, the fuel is ignited using a focused electron or ion beam generated by a fast, ultra-high power laser pulse. This significantly relaxes the drive symmetry, energy, and shock timing requirements compared to hot spot ignition. A hemispherical capsule target is a fast ignitor geometry well-adapted to symmetric fuel compression by a single-ended z-pinch radiation drive. The hemispherical capsule implodes radially, constrained at its equator by a flat high-density surface (a special case of the spherical capsule "cone-focus" geometry). This glide plane is mounted on a hollow pedestal that provides a plasma-free, short-pulse laser path to the compressed fuel core region. In experiments on the Z accelerator at Sandia, we are studying implosions of 2.0-mm-diameter, 60-micron-thick hemispherical capsules in cylindrical secondary hohlraums heated to 90-100 eV from one end by a 120 TW wire-array z-pinch. Analysis of ZBL 6.7 keV point-projection backlighter images of pole-hot implosions in a tall secondary and 6.18 keV monochromatic crystal backlighter images of more symmetric implosions in a short secondary will be presented. We will also discuss progress on the development of a cryogenic liquid fuel target for this fast ignitor compression geometry. * Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000.

  12. Local climate change data is securing food and livelihoods in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2015-04-29

    Apr 29, 2015 ... Climate change and variability pose a major threat to farming, food security, and livelihoods in sub-Saharan Africa. ... is funded through the IDRC Research Initiative on Adaptation to Climate Change in Asia, Latin America, and the Caribbean with funds from the Government of Canada's fast-start financing.

  13. Scaling up: Expanding the impact of food security and nutrition ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-10-06

    Oct 6, 2016 ... Pre-cooked beans for improving food and income security in Kenya and Uganda. Pre-cooked beans are an affordable and fast-cooking new product that is boosting the consumption of nutritious pulses. Increased demand for pre-cooked beans is creating a more lucrative market for 7,500 bean farmers and ...

  14. Water management and food security in vulnerable regions of China ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2014-06-23

    Jun 23, 2014 ... In both regions, food security has been affected either through water scarcity and drought, or from high water and flooding. ... Initiative on Water Resources and Adaptation to Climate Change in Asia, Latin America and the Caribbean with funds from Government of Canada's fast-start climate finance.

  15. Information security management principles

    CERN Document Server

    Taylor, Andy; Finch, Amanda; Sutton, David; Taylor, Andy

    2013-01-01

    In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources.

  16. Securing Personal Network Clusters

    NARCIS (Netherlands)

    Jehangir, A.; Heemstra de Groot, S.M.

    2007-01-01

    A Personal Network is a self-organizing, secure and private network of a user’s devices notwithstanding their geographic location. It aims to utilize pervasive computing to provide users with new and improved services. In this paper we propose a model for securing Personal Network clusters. Clusters

  17. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  18. Hydrological extremes and security

    Directory of Open Access Journals (Sweden)

    Z. W. Kundzewicz

    2015-04-01

    Full Text Available Economic losses caused by hydrological extremes – floods and droughts – have been on the rise. Hydrological extremes jeopardize human security and impact on societal livelihood and welfare. Security can be generally understood as freedom from threat and the ability of societies to maintain their independent identity and their functional integrity against forces of change. Several dimensions of security are reviewed in the context of hydrological extremes. The traditional interpretation of security, focused on the state military capabilities, has been replaced by a wider understanding, including economic, societal and environmental aspects that get increasing attention. Floods and droughts pose a burden and serious challenges to the state that is responsible for sustaining economic development, and societal and environmental security. The latter can be regarded as the maintenance of ecosystem services, on which a society depends. An important part of it is water security, which can be defined as the availability of an adequate quantity and quality of water for health, livelihoods, ecosystems and production, coupled with an acceptable level of water-related risks to people, environments and economies. Security concerns arise because, over large areas, hydrological extremes − floods and droughts − are becoming more frequent and more severe. In terms of dealing with water-related risks, climate change can increase uncertainties, which makes the state’s task to deliver security more difficult and more expensive. However, changes in population size and development, and level of protection, drive exposure to hydrological hazards.

  19. Women and social security

    NARCIS (Netherlands)

    Westerveld, M.; Pennings, F.; Vonk, G.

    2015-01-01

    Does ‘the’ social security take sufficient account of women? Are its protection schemes sufficiently aimed at safeguarding women’s interests? These are the questions I was invited to answer for this handbook on social security law. At the same time I was asked to adopt an unorthodox approach, one

  20. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  1. Secure Embedded Systems

    Science.gov (United States)

    2016-02-26

    module ( TPM ), an international standard secure processor that facilitates secure cryptographic key generation, remote attestation, encryption...decryption, and sealed storage [5]. Each TPM chip includes a unique secret key, allowing the chip to perform platform and hardware device authentication...When creating the TPM , developers made a number of compromises that addressed cost and privacy concerns to ensure commercial adoptability of the

  2. Network Security Is Manageable

    Science.gov (United States)

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  3. Designing security holograms

    Science.gov (United States)

    James, Randy; Long, Michael; Newcomb, Diana

    2004-06-01

    Over the years, holograms have evolved from purely decorative images to bona fide security devices. During this evolution, highly secure technologies have been developed specifically for product and document protection. To maximize the security potential of these hologram technologies requires a holistic approach. A hologram alone is not enough. To be effective it must be part of a security program and that security program needs to inform the design and development of the actual hologram. In the most elementary case the security program can be as simple as applying a tamper evident label for a one-day event. In a complex implementation it would include multi-level technologies and corresponding verification methods. A holistic approach is accomplished with good planning and articulation of the problem to be solved, and then meeting the defined security objectives. Excellent communication among all the stakeholders in a particular project is critical to the success of the project. The results of this dialogue inform the design of the security hologram.

  4. Secure Dynamic Program Repartitioning

    DEFF Research Database (Denmark)

    Hansen, Rene Rydhoff; Probst, Christian

    2005-01-01

    Secure program partitioning has been introduced as a language-based technique to allow the distribution of data and computation across mutualy untrusted hosts, while at the same time guaranteeing the protection of confidential data. Programs that have been annotated with security types...

  5. Formalizing physical security procedures

    NARCIS (Netherlands)

    Meadows, C.; Pavlovic, Dusko

    Although the problems of physical security emerged more than 10,000 years before the problems of computer security, no formal methods have been developed for them, and the solutions have been evolving slowly, mostly through social procedures. But as the traffic on physical and social networks is now

  6. No energy security without climate security

    International Nuclear Information System (INIS)

    Hiller, M.

    2006-06-01

    WWF urges the G8 nations to embark on a serious global 'Climate and Energy Security Plan' akin in dimension to the Marshall plan after the Second World War. The plan would aim at dramatically augmenting energy efficiency measures and renewable energy sources within the next five years

  7. CMS Fast Simulation

    CERN Document Server

    Rahmat, Rahmat

    2012-01-01

    A framework for Fast Simulation of particle interactions in the CMS detector has been developed and implemented in the overall simulation, reconstruction and analysis framework of CMS. It produces data samples in the same format as the one used by the Geant4-based (henceforth Full) Simulation and Reconstruction chain; the output of the Fast Simulation of CMS can therefore be used in the analysis in the same way as other ones. The Fast Simulation has been used already for several physics analyses in CMS, in particular those requiring a generation of many samples to scan an extended parameter space of the physics model (e.g. SUSY). Other use cases dealt with by the Fast Simulation of CMS are those involving the generation of large cross-section backgrounds, and samples of manageable size can only be produced by events skimming based on the final reconstructed objects, or those for which in general a large computation time is foreseen. An important issue, related with the high luminosity achieved by the LHC acce...

  8. FAST compiler user's guide

    NARCIS (Netherlands)

    Hartel, Pieter H.; Glaser, Hugh; Wild, John

    1993-01-01

    The FAST compiler is a backend for compilers of lazy functional languages. There are two versions of the compiler: one that takes a rather simple lazy functional language as input and a second that accepts a language similar to Miranda. On output the compiler produces a set of macro calls that are

  9. Parallel Fast Legendre Transform

    NARCIS (Netherlands)

    Alves de Inda, M.; Bisseling, R.H.; Maslen, D.K.

    1998-01-01

    We discuss a parallel implementation of a fast algorithm for the discrete polynomial Legendre transform We give an introduction to the DriscollHealy algorithm using polynomial arithmetic and present experimental results on the eciency and accuracy of our implementation The algorithms were

  10. ATLAS fast physics monitoring

    Indian Academy of Sciences (India)

    The ATLAS experiment at the Large Hadron Collider is recording data from proton–proton collisions at a centre-of-mass energy of 7 TeV since the spring of 2010. The integrated luminosity has grown nearly exponentially since then and continues to rise fast. The ATLAS Collaboration has set up a framework to automatically ...

  11. ATLAS fast physics monitoring

    Indian Academy of Sciences (India)

    The ATLAS Collaboration has set up a framework to automatically process the rapidly growing dataset and produce performance and physics plots for the most interesting analyses. The system is designed to give fast feedback. The histograms are produced within hours of data reconstruction (2–3 days after data taking).

  12. [Preoperative fasting. An update].

    Science.gov (United States)

    Spies, C D; Breuer, J P; Gust, R; Wichmann, M; Adolph, M; Senkal, M; Kampa, U; Weissauer, W; Schleppers, A; Soreide, E; Martin, E; Kaisers, U; Falke, K J; Haas, N; Kox, W J

    2003-11-01

    In Germany the predominant standard of preoperative care for elective surgery is fasting after midnight, with the aim of reducing the risk of pulmonary aspiration. However, for the past several years the scientific evidence supporting such a practice has been challenged. Experimental and clinical studies prove a reliable gastric emptying within 2 h suggesting that, particularly for limited intake of clear fluids up to 2 h preoperatively, there would be no increased risk for the patient. In addition, the general incidence of pulmonary aspiration during general anaesthesia (before induction, during surgery and during recovery) is extremely low, has a good prognosis and is more a consequence of insufficient airway protection and/or inadequate anaesthetic depth rather than due to the patient's fasting state. Therefore, primarily to decrease perioperative discomfort for patients, several national anaesthesia societies have changed their guidelines for preoperative fasting. They recommend a more liberal policy regarding per os intake of both liquid and solid food, with consideration of certain conditions and contraindications. The following article reviews the literature and gives an overview of the scientific background on which the national guidelines are based. The intention of this review is to propose recommendations for preoperative fasting regarding clear fluids for Germany as well.

  13. Integral Fast Reactor Program

    International Nuclear Information System (INIS)

    Chang, Y.I.; Walters, L.C.; Laidler, J.J.; Pedersen, D.R.; Wade, D.C.; Lineberry, M.J.

    1993-06-01

    This report summarizes highlights of the technical progress made in the Integral Fast Reactor (IFR) Program in FY 1992. Technical accomplishments are presented in the following areas of the IFR technology development activities: (1) metal fuel performance, (2) pyroprocess development, (3) safety experiments and analyses, (4) core design development, (5) fuel cycle demonstration, and (6) LMR technology R ampersand D

  14. Handel med fast ejendom

    DEFF Research Database (Denmark)

    Edlund, Hans Henrik

    Bogen tilstræber at give et overblik over nogle af de vigtigste generelle problemområder på markedet for ejendomshandel, der jo bliver mere og mere kompliceret. Værket er opdelt i følgende hovedafsnit: Ejendomsbegrebet. Indgåelse af aftale om salg af fast ejendom. Begrænsninger i adgangen til...

  15. Fast ejendom, I

    DEFF Research Database (Denmark)

    Munk-Hansen, Carsten

    , værdiforringende forhold, der ligger uden for ejendommen og andre særlige tilfælde. Bogen uddyber andre emner omtalt i 1. udgave, eksempelvis erhvervelsesbetingelser, købsoptioner, ansvarsfraskrivelse, licitationssalg mv. Bogen er det første af tre planlagte bind om fast ejendom: I Overdragelsen, II Bolighandlen...

  16. Fast Harmonic Chirp Summation

    DEFF Research Database (Denmark)

    Nielsen, Jesper Kjær; Jensen, Tobias Lindstrøm; Jensen, Jesper Rindom

    2017-01-01

    -robust to noise, or very computationally inten- sive. In this paper, we propose a fast algorithm for the harmonic chirp summation method which has been demonstrated in the liter- ature to be accurate and robust to noise. The proposed algorithm is orders of magnitudes faster than previous algorithms which is also...

  17. The Integral Fast Reactor

    International Nuclear Information System (INIS)

    Till, C.E.; Chang, Y.I.; Lineberry, M.J.

    1990-01-01

    Argonne National Laboratory, since 1984, has been developing the Integral Fast Reactor (IFR). This paper will describe the way in which this new reactor concept came about; the technical, public acceptance, and environmental issues that are addressed by the IFR; the technical progress that has been made; and our expectations for this program in the near term. 5 refs., 3 figs

  18. Integral Fast Reactor concept

    Energy Technology Data Exchange (ETDEWEB)

    Till, C.E.; Chang, Y.I.

    1986-01-01

    The Integral Fast Reactor (IFR) is an innovative LMR concept, being developed at Argonne National Laboratory, that fully exploits the inherent properties of liquid metal cooling and metallic fuel to achieve breakthroughs in economics and inherent safety. This paper describes key features and potential advantages of the IFR concept, technology development status, fuel cycle economics potential, and future development path.

  19. Integral Fast Reactor concept

    International Nuclear Information System (INIS)

    Till, C.E.; Chang, Y.I.

    1986-01-01

    The Integral Fast Reactor (IFR) is an innovative LMR concept, being developed at Argonne National Laboratory, that fully exploits the inherent properties of liquid metal cooling and metallic fuel to achieve breakthroughs in economics and inherent safety. This paper describes key features and potential advantages of the IFR concept, technology development status, fuel cycle economics potential, and future development path

  20. Calorie count - fast food

    Science.gov (United States)

    ... GO About MedlinePlus Site Map FAQs Customer Support Health Topics Drugs & Supplements Videos & Tools Español You Are Here: Home → Medical Encyclopedia → Calorie count - fast food URL of this page: //medlineplus.gov/ency/patientinstructions/ ...

  1. Fast Air Temperature Sensors

    DEFF Research Database (Denmark)

    Hendricks, Elbert

    1998-01-01

    The note documents briefly work done on a newly developed sensor for making fast temperature measurements on the air flow in the intake ports of an SI engine and in the EGR input line. The work reviewed has been carried out in close cooperation with Civ. Ing. Michael Føns, the author (IAU...

  2. Fast Fourier orthogonalization

    NARCIS (Netherlands)

    L. Ducas (Léo); T. Prest; S.A. Abramov; E.V. Zima; X-S. Gao

    2016-01-01

    htmlabstractThe classical fast Fourier transform (FFT) allows to compute in quasi-linear time the product of two polynomials, in the {\\em circular convolution ring} R[x]/(x^d−1) --- a task that naively requires quadratic time. Equivalently, it allows to accelerate matrix-vector products when the

  3. A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2015-01-01

    Full Text Available A new key management and security scheme is proposed to integrate Layer Two (L2 and Layer Three (L3 keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN. Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6 that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.

  4. Relaxing Chosen-Ciphertext Security

    DEFF Research Database (Denmark)

    Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus

    2003-01-01

    Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within...... general protocols and applications. Indeed, CCA security was shown to suffice in a large variety of contexts. However, CCA security often appears to be somewhat too strong: there exist encryption schemes (some of which come up naturally in practice) that are not CCA secure, but seem sufficiently secure...... “for most practical purposes.” We propose a relaxed variant of CCA security, called Replayable CCA (RCCA) security. RCCA security accepts as secure the non-CCA (yet arguably secure) schemes mentioned above; furthermore, it suffices for most existing applications of CCA security. We provide three...

  5. Energy security in Yemen

    International Nuclear Information System (INIS)

    Torosyan, Emil

    2009-09-01

    Yemen, situated in the Arab world, has considerable energy resources. However, its history of repeated revolts, civil wars and terrorism and also the presence of the Wahabi movement and al Qaeda in the country constitute security issues for the energy industry and its infrastructure. The aim of this paper is to assess the impact level on the security of the energy sector in Yemen and the effect that the threats to that sector could have on global energy security. Analyses of the political environment, the security threats and the measures taken to respond to these threats have been carried out. Results showed that Yemen's resources are depleting and that the government is having trouble containing the escalation of conflicts; this situation could lead to Yemen's political collapse which could have an important impact on global energy security.

  6. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  7. Indirection and computer security.

    Energy Technology Data Exchange (ETDEWEB)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  8. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  9. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  10. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  11. Intrinsic Activity of Inulinase from Kluyveromyces marxianus ATCC 16045 and Carbon and Nitrogen Balances

    Directory of Open Access Journals (Sweden)

    Bernardo Onagar Yépez Silva-Santisteban

    2006-01-01

    Full Text Available Kluyveromyces marxianus ATCC 16045 was cultivated in a batch on minimal medium to overproduce inulinase. The fermented broth was purified by fast protein liquid chromatography and ultrafiltration, and a pure enzyme fraction was obtained. SDS-PAGE electrophoresis allowed calculating molecular mass of 59 kDa, while nitrogen determination by the micro-Kjeldahl method allowed evaluating intrinsic inulinase activity of 879 IU/mg. These results were then used to perform material balances of the fermentation process, which suggested that no more than 0.1 % either of carbon or nitrogen initially present in the medium were incorporated in the extracellular inulinase released under different cultivation conditions. The information obtained in this study can be used for future proposal of metabolic models describing inulinase overproduction by this yeast.

  12. Human factors in network security

    OpenAIRE

    Jones, Francis B.

    1991-01-01

    Human factors, such as ethics and education, are important factors in network information security. This thesis determines which human factors have significant influence on network security. Those factors are examined in relation to current security devices and procedures. Methods are introduced to evaluate security effectiveness by incorporating the appropriate human factors into network security controls

  13. Natural gas and energy security

    International Nuclear Information System (INIS)

    Saga, B.P.

    1996-01-01

    This paper relates to energy security by natural gas supply seen in an International Energy Agency perspective. Topics are: Security of supply, what is it; the role gas on the European energy scene; short term security of supply; long term security of supply; future structural and regulatory developments and possible implications for security of supply. 6 figs

  14. Process-based monitoring and modeling of Karst springs - Linking intrinsic to specific vulnerability.

    Science.gov (United States)

    Epting, Jannis; Page, Rebecca M; Auckenthaler, Adrian; Huggenberger, Peter

    2018-06-01

    The presented work illustrates to what extent field investigations as well as monitoring and modeling approaches are necessary to understand the high discharge dynamics and vulnerability of Karst springs. In complex settings the application of 3D geological models is essential for evaluating the vulnerability of Karst systems. They allow deriving information on catchment characteristics, as the geometry of aquifers and aquitards as well as their displacements along faults. A series of Karst springs in northwestern Switzerland were compared and Karst system dynamics with respect to qualitative and quantitative issues were evaluated. The main objective of the studies was to combine information of catchment characteristics and data from novel monitoring systems (physicochemical and microbiological parameters) to assess the intrinsic vulnerability of Karst springs to microbiological contamination with simulated spring discharges derived from numerical modeling (linear storage models). The numerically derived relation of fast and slow groundwater flow components enabled us to relate different sources of groundwater recharge and to characterize the dynamics of the Karst springs. Our study illustrates that comparably simple model-setups were able to reproduce the overall dynamic intrinsic vulnerability of several Karst systems and that one of the most important processes involved was the temporal variation of groundwater recharge (precipitation, evapotranspiration and snow melt). Furthermore, we make a first attempt on how to link intrinsic to specific vulnerability of Karst springs, which involves activities within the catchment area as human impacts from agriculture and settlements. Likewise, by a more detailed representation of system dynamics the influence of surface water, which is impacted by release events from storm sewers, infiltrating into the Karst system, could be considered. Overall, we demonstrate that our approach can be the basis for a more flexible and

  15. Center for Homeland Defense and Security Homeland Security Affairs Journal

    OpenAIRE

    2015-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  16. Leading Charm in Hadron-Nucleus Interaction in the Intrinsic Charm Model

    Energy Technology Data Exchange (ETDEWEB)

    Gutierrez, T.; Vogt, R.

    1998-08-03

    Leading charm hadrons produced in hadron-nucleus interactions cannot be adequately described within the parton fusion model. Recent results on charm baryon production in Sigma{sup -} A interactions at 330 GeV with the WA89 detector disagree with fusion predictions. Intrinsic heavy quark pairs in the Sigma{sup -}(dds) wave function provide a simple mechanism for producing fast charm hadrons. We calculate leading charm baryon production from Sigma{sup -}, pi{sup -} and p projectiles in a two component model combining partonfusion with intrinsic charm. Final state D{sup -}, Sigma{sub c}{sup 0}, Xi{sub c}{sup +}, and Lambda{sub c}{sup +} d sigma/dx{sub F} distributions and D{sup -}/D{sup +}, D{sub s}{sup -}/D{sub s}{sup +} and Lambda{sub c}{sup +}/overline Lambda{sub c}{sup +} asymmetries are compared to WA89 data. Predictions are made for 650 GeV Sigma{sup -} A and pi{sup -} A interactions in the SELEX detector at Fermilab and for 800 GeV pA interactions.

  17. Intrinsic motivation and attentional capture from gamelike features in a visual search task.

    Science.gov (United States)

    Miranda, Andrew T; Palmer, Evan M

    2014-03-01

    In psychology research studies, the goals of the experimenter and the goals of the participants often do not align. Researchers are interested in having participants who take the experimental task seriously, whereas participants are interested in earning their incentive (e.g., money or course credit) as quickly as possible. Creating experimental methods that are pleasant for participants and that reward them for effortful and accurate data generation, while not compromising the scientific integrity of the experiment, would benefit both experimenters and participants alike. Here, we explored a gamelike system of points and sound effects that rewarded participants for fast and accurate responses. We measured participant engagement at both cognitive and perceptual levels and found that the point system (which invoked subtle, anonymous social competition between participants) led to positive intrinsic motivation, while the sound effects (which were pleasant and arousing) led to attentional capture for rewarded colors. In a visual search task, points were awarded after each trial for fast and accurate responses, accompanied by short, pleasant sound effects. We adapted a paradigm from Anderson, Laurent, and Yantis (Proceedings of the National Academy of Sciences 108(25):10367-10371, 2011b), in which participants completed a training phase during which red and green targets were probabilistically associated with reward (a point bonus multiplier). During a test phase, no points or sounds were delivered, color was irrelevant to the task, and previously rewarded targets were sometimes presented as distractors. Significantly longer response times on trials in which previously rewarded colors were present demonstrated attentional capture, and positive responses to a five-question intrinsic-motivation scale demonstrated participant engagement.

  18. Effects of fast neutrons on chromatin: dependence on chromatin structure

    Energy Technology Data Exchange (ETDEWEB)

    Radu, L. [Dept. of Molecular Genetics, V. Babes National Inst., Bd. Timisoara, Bucharest (Romania); Constantinescu, B. [Dept. of Cyclotron, H. Hulubei National Inst., Bucharest (Romania); Gazdaru, D. [Dept. of Biophysics, Physics Faculty, Univ. of Bucharest (Romania)

    2002-07-01

    The effects of fast neutrons (10-100 Gy) on chromatin extracted from normal (liver of Wistar rats) and tumor (Walker carcinosarcoma maintained on Wistar rats) tissues were compared. The spectroscopic assays used were (i) chromatin intrinsic fluorescence, (ii) time-resolved fluorescence of chromatin-proflavine complexes, and (iii) fluorescence resonance energy transfer (FRET) between dansyl chloride and acridine orange coupled to chromatin. For both normal and tumor chromatin, the intensity of intrinsic fluorescence specific for acidic and basic proteins decreased with increasing dose. The relative contributions of the excited-state lifetime of proflavine bound to chromatin were reduced upon fast-neutron irradiation, indicating a decrease in the proportion of chromatin DNA available for ligand binding. The Forster energy transfer efficiencies were also modified by irradiation. These effects were larger for chromatin from tumor tissue. In the range 0-100 Gy, fast neutrons induced alterations in DNA and acidic and basic proteins, as well as in global chromatin structure. The radiosensitivity of chromatin extracted from tumor tissue seems to be higher than that of chromatin extracted from normal tissue, probably because of its higher euchromatin (loose)-heterochromatin (compact) ratio. (author)

  19. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development....

  20. Text Summarization Evaluation: Correlating Human Performance on an Extrinsic Task with Automatic Intrinsic Metrics

    National Research Council Canada - National Science Library

    President, Stacy F; Dorr, Bonnie J

    2006-01-01

    This research describes two types of summarization evaluation methods, intrinsic and extrinsic, and concentrates on determining the level of correlation between automatic intrinsic methods and human...

  1. INTRINSIC AND EXTRINSIC MOTIVATION - AN INVESTIGATION OF PERFORMANCE CORRELATION

    Directory of Open Access Journals (Sweden)

    Abrudan Maria-Madela

    2011-07-01

    Full Text Available A series of research untaken in the last decade have revealed some interesting aspects regarding the effects of different types of motivation on performance. Among the researchers who have shown interest in this field we can number: Richard Ryan, Edward Deci, Sam Glucksberg, Dan Ariely, Robert Eisenhower, Linda Shanock, analysts from London School of Economics, and others. Their findings suggest that extrinsic incentives may have a negative impact on overall performance, but a general agreement in this respect has not been reached. In this paper we intend to shed some light upon the relationship between intrinsic and extrinsic motivation and performance. Experts define intrinsic motivation as being the execution of a task or activity because of the inherent satisfaction arising from it rather than due to some separate outcome. In contrast with intrinsic motivation, we speak of extrinsic motivation whenever an activity is done in order to attain some separable outcome. With the purpose of contributing to the clarification of the links between concepts, we initiated and conducted an explanatory research. The research is based on the analysis of the relations between the results obtained by third year students and their predominant type of motivation. For this, we formulated and tested four work hypotheses using a combination of quantitative methods (investigation and qualitative methods (focus group. After the validation of the questionnaires, the respondents were divided into four categories: intrinsically motivated, extrinsically motivated, both intrinsically and extrinsically motivated and unmotivated. To analyze the collected data, we made use of Excel and SPSS. Some of the primary conclusions of the research are as follows: as the average increases, the percent of individuals having both extrinsic and intrinsic motivation is decreasing; the highest percentage of unmotivated students is concentrated in the highest average category; Female

  2. Security intelligence a practitioner's guide to solving enterprise security challenges

    CERN Document Server

    Li, Qing

    2015-01-01

    Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo

  3. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  4. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  5. Security Components of Globalization

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2015-05-01

    Full Text Available The objective of this paper is our intention to present what are the main connections between globalization and international security. In terms of global security we can perceive the globalization as a process by which global state is represented by the UN, with a single world system, represented by major security organizations and with global effects. We will present from the beginning the main theoretical aspects that define the phenomenon of globalization, and then our contribution in assessing the implications of this phenomenon on the regional and global security. The results of our research are materialized in the last part of the paper. They emphasize the personal assessments on how the phenomenon of globalization has direct effect on global security. When talking about government, we think of norms, rules and decisionmaking procedures in the management of international life. The value that we add to the new scientific interpretation of the definition of globalization is represented, primarily, by the valuable bibliographic used resources and the original approach on the concept that refers to the links between globalization and security. This article may be, at any time, a starting point in an interesting research direction in the field of global security.

  6. Dedifferentiation of intrinsic response properties of motoneurons in organotypic cultures of the spinal cord of the adult turtle

    DEFF Research Database (Denmark)

    Perrier, J F; Noraberg, J; Simon, M

    2000-01-01

    Explant cultures from the spinal cord of adult turtles were established and used to study the sensitivity of the intrinsic response properties of motoneurons to the changes in connectivity and milieu imposed by isolation in culture. Transverse sections 700 microm thick were explanted on cover slips...... the ability to fire repetitively. By the second week in culture, a fraction of motoneurons displayed fast and slow transient outward rectification and low-threshold calcium spikes, features not seen in turtle motoneurons in acute slices. On the other hand, properties mediated by L-type Ca2+ channels...

  7. DEMOGRAPHIC SECURITY: THEORY, METHODOLOGY, EVALUATION

    Directory of Open Access Journals (Sweden)

    Mikhail V. Karmanov

    2015-01-01

    Full Text Available The paper analyzes the theoretical aspects of demographic security. Reviewed and analyzed the point of view of various scholars to the definition of demographic security. The main directions of statistical analysis of demographic security.

  8. Information security : the moving target

    CSIR Research Space (South Africa)

    Dlamini, MT

    2009-01-01

    Full Text Available Information security has evolved from addressing minor and harmless security breaches to managing those with a huge impact on organisations’ economic growth. This paper investigates the evolution of information security; where it came from, where...

  9. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  10. Smart grid security

    CERN Document Server

    Goel, Sanjay; Papakonstantinou, Vagelis; Kloza, Dariusz

    2015-01-01

    This book on smart grid security is meant for a broad audience from managers to technical experts. It highlights security challenges that are faced in the smart grid as we widely deploy it across the landscape. It starts with a brief overview of the smart grid and then discusses some of the reported attacks on the grid. It covers network threats, cyber physical threats, smart metering threats, as well as privacy issues in the smart grid. Along with the threats the book discusses the means to improve smart grid security and the standards that are emerging in the field. The second part of the b

  11. Software Safety and Security

    CERN Document Server

    Nipkow, T; Hauptmann, B

    2012-01-01

    Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was

  12. Linux Server Security

    CERN Document Server

    Bauer, Michael D

    2005-01-01

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--

  13. Elements of social security

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security is a comparative study of important elements of the social security systems in Denmark (DK), Sweden (S), Finland (FIN), Austria (A), Germany (D), the Netherlands (NL), Great Britain (GB) and Canada (CAN). It should be emphasized that Germany is the former West Germany...... (Alte Länder). This is the 9th and last edition of the publication,covering income levels and rules for social security and personal taxation for 1999. Basis for the projections to 1999 income levels is the 1998 data (in some cases 1999 data)for OECD's Taxing Wages as reported by national experts....

  14. Transmission grid security

    CERN Document Server

    Haarla, Liisa; Hirvonen, Ritva; Labeau, Pierre-Etienne

    2011-01-01

    In response to the growing importance of power system security and reliability, ""Transmission Grid Security"" proposes a systematic and probabilistic approach for transmission grid security analysis. The analysis presented uses probabilistic safety assessment (PSA) and takes into account the power system dynamics after severe faults. In the method shown in this book the power system states (stable, not stable, system breakdown, etc.) are connected with the substation reliability model. In this way it is possible to: estimate the system-wide consequences of grid faults; identify a chain of eve

  15. Web Security, Privacy & Commerce

    CERN Document Server

    Garfinkel, Simson

    2011-01-01

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Exp

  16. Computer Security Handbook

    CERN Document Server

    Bosworth, Seymour; Whyne, Eric

    2012-01-01

    The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven chapter

  17. Fast timing discriminator

    International Nuclear Information System (INIS)

    Lo, C.C.

    1977-01-01

    The processing of pulses with very fast risetimes for timing purposes involves many problems because of the large equivalent bandwidths involved. For pulses with risetimes in the 150 ps range (and full widths at half maximum (FWHM) of 400 ps) bandwidths in excess of 1GHz are required. Furthermore, these very narrow pulses with current amplitudes as small as 1 mA carry very small charges ( -12 coulomb), therefore, requiring very sensitive trigger circuits. The difficulty increases when timing characteristics in the picosecond range are sought especially when a wide input signal amplitude range causes a time-walk problem. The fast timing discriminator described has a time-walk of approximately +-75 ps over the input signal range from 80 mV to 3V. A schematic of the discriminator is included, and operation and performance are discussed

  18. Fast radiographic systems

    International Nuclear Information System (INIS)

    Domanus, J.C.

    1984-08-01

    Industrial radiography can be performed with shorter exposure times, when instead of X-ray film with lead intensifying screens the radiographic paper with fluorescent screen is used. With paper radiography one can obtain lower material, equipment, and labor costs, shorter exposure and processing times, and easier radiation protection. The speed of the radiographic inspection can also be increased by the use of fluorometallic intensifying screens together with a special brand of X-ray film. Before accepting either of the two fast radiographic systems one must be sure that they can produce radiographs of adequate image quality. Therefore an investigation was performed on that subject using ISO wire IQI's and ASTM penetrameters. The radiographic image quality was tested for aluminium and steel up to 30 mm thick using various brands of radiographic paper and X-ray film with fluorometallic screens and comparing them with fast X-ray films with lead screens. Both systems give satisfactory results. (author)

  19. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  20. Agile IT Security Implementation Methodology

    CERN Document Server

    Laskowski, Jeff

    2011-01-01

    The book is a tutorial that goes from basic to professional level for Agile IT security. It begins by assuming little knowledge of agile security. Readers should hold a good knowledge of security methods and agile development. The book is targeted at IT security managers, directors, and architects. It is useful for anyone responsible for the deployment of IT security countermeasures. Security people with a strong knowledge of agile software development will find this book to be a good review of agile concepts.

  1. PHENIX Fast TOF

    Energy Technology Data Exchange (ETDEWEB)

    Soha, Aria [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Chiu, Mickey [Brookhaven National Lab. (BNL), Upton, NY (United States); Mannel, Eric [Brookhaven National Lab. (BNL), Upton, NY (United States); Stoll, Sean [Brookhaven National Lab. (BNL), Upton, NY (United States); Lynch, Don [Brookhaven National Lab. (BNL), Upton, NY (United States); Boose, Steve [Brookhaven National Lab. (BNL), Upton, NY (United States); Northacker, Dave [Brookhaven National Lab. (BNL), Upton, NY (United States); Alfred, Marcus [Howard Univ., Washington, DC (United States); Lindesay, James [Howard Univ., Washington, DC (United States); Chujo, Tatsuya [Univ. of Tsukuba (Japan); Inaba, Motoi [Univ. of Tsukuba (Japan); Nonaka, Toshihiro [Univ. of Tsukuba (Japan); Sato, Wataru [Univ. of Tsukuba (Japan); Sakatani, Ikumi [Univ. of Tsukuba (Japan); Hirano, Masahiro [Univ. of Tsukuba (Japan); Choi, Ihnjea [Univ. of Illinois, Urbana-Champaign, IL (United States)

    2014-01-15

    This is a technical scope of work (TSW) between the Fermi National Accelerator Laboratory (Fermilab) and the experimenters of PHENIX Fast TOF group who have committed to participate in beam tests to be carried out during the FY2014 Fermilab Test Beam Facility program. The goals for this test beam experiment are to verify the timing performance of the two types of time-of-flight detector prototypes.

  2. The Integral Fast Reactor

    International Nuclear Information System (INIS)

    Chang, Y.I.

    1988-01-01

    The Integral Fast Reactor (IFR) is an innovative liquid metal reactor concept being developed at Argonne National Laboratory. It seeks to specifically exploit the inherent properties of liquid metal cooling and metallic fuel in a way that leads to substantial improvements in the characteristics of the complete reactor system. This paper describes the key features and potential advantages of the IFR concept, with emphasis on its safety characteristics. 3 refs., 4 figs., 1 tab

  3. Terminal twist-induced writhe of DNA with intrinsic curvature.

    Science.gov (United States)

    Hu, Kai

    2007-04-01

    Supercoiling of a closed circular DNA rod may result from an application of terminal twist to the DNA rod by cutting the rod, rotating one of the cut faces as the other being fixed and then sealing the cut. According to White's formula, DNA supercoiling is probably accompanied by a writhe of the DNA axis. Deduced from the elastic rod model for DNA structure, an intrinsically straight closed circular DNA rod does not writhe as subject to a terminal twist, until the number of rotation exceeds a rod-dependent threshold. By contrast, a closed circular DNA rod with intrinsic curvature writhes instantly as subject to a terminal twist. This noteworthy character in fact belongs to many intrinsically curved DNA rods. By solving the dynamic equations, the linearization of the Euler-Lagrange equations governing intrinsically curved DNA rods, this paper shows that almost every clamped-end intrinsically curved DNA rod writhes instantly when subject to a terminal twist (clamped-end DNA rods include closed circular DNA rods and topological domains of open DNA rods). In terms of physical quantities, the exceptions are identified with points in R(6) whose projections onto R(5) (through ignoring the total energy density of a rod) form a subset of a quadratic hypersurface. This paper also suggests that the terminal twist induced writhe is due to the elasticity and the clamped-end boundary conditions of the DNA rods.

  4. Informationally administered reward enhances intrinsic motivation in schizophrenia.

    Science.gov (United States)

    Lee, Hyeon-Seung; Jang, Seon-Kyeong; Lee, Ga-Young; Park, Seon-Cheol; Medalia, Alice; Choi, Kee-Hong

    2017-10-01

    Even when individuals with schizophrenia have an intact ability to enjoy rewarding moments, the means to assist them to translate rewarding experiences into goal-directed behaviors is unclear. The present study sought to determine whether informationally administered rewards enhance intrinsic motivation to foster goal-directed behaviors in individuals with schizophrenia (SZ) and healthy controls (HCs). Eighty-four participants (SZ=43, HCs=41) were randomly assigned to conditions involving either a performance-contingent reward with an informationally administered reward or a task-contingent reward with no feedback. Participants were asked to play two cognitive games of equalized difficulty. Accuracy, self-reported intrinsic motivation, free-choice intrinsic motivation (i.e., game play during a free-choice observation period), and perceived competency were measured. Intrinsic motivation and perceived competency in the cognitive games were similar between the two participant groups. The informationally administered reward significantly enhanced self-reported intrinsic motivation and perceived competency in both the groups. The likelihood that individuals with schizophrenia would play the game during the free-choice observation period was four times greater in the informationally administered reward condition than that in the no-feedback condition. Our findings suggest that, in the context of cognitive remediation, individuals with schizophrenia would benefit from informationally administered rewards. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. The effect of homework choices on achievement and intrinsic motivation

    Science.gov (United States)

    Christensen, Emily Fast

    The purpose of this research was to test an intervention of choices in homework on the achievement and intrinsic motivation of seventh-grade science students at a middle school. The intervention was based on concepts from the cognitive evaluation theory of Edward L. Deci and Richard M. Ryan (1985). The subjects were sixteen heterogeneous classes of seventh-grade students, who were divided among four teachers. Two randomly chosen classes from each teacher received choices in their homework and the remaining two classes of each teacher received similar homework assignments without choices. Two hypotheses were developed for this study: (1) Seventh-grade science students given choices in their homework would show an increase in intrinsic motivation as measured on a motivation orientation measure, compared to students not given choices in their homework, and (2) Seventh-grade science students given choices in their homework would show an increase in achievement on an achievement measure, compared to students not given choices in their homework. Having choices in homework did not increase intrinsic motivation or achievement. However, students who did their homework did significantly better on the posttest, and students who were more intrinsically motivated did significantly better on the posttest. Just doing the homework was important for achievement, and intrinsic motivation was linked to achievement.

  6. Photovoltaic device comprising compositionally graded intrinsic photoactive layer

    Science.gov (United States)

    Hoffbauer, Mark A; Williamson, Todd L

    2013-04-30

    Photovoltaic devices and methods of making photovoltaic devices comprising at least one compositionally graded photoactive layer, said method comprising providing a substrate; growing onto the substrate a uniform intrinsic photoactive layer having one surface disposed upon the substrate and an opposing second surface, said intrinsic photoactive layer consisting essentially of In.sub.1-xA.sub.xN,; wherein: i. 0.ltoreq.x.ltoreq.1; ii. A is gallium, aluminum, or combinations thereof; and iii. x is at least 0 on one surface of the intrinsic photoactive layer and is compositionally graded throughout the layer to reach a value of 1 or less on the opposing second surface of the layer; wherein said intrinsic photoactive layer is isothermally grown by means of energetic neutral atom beam lithography and epitaxy at a temperature of 600.degree. C. or less using neutral nitrogen atoms having a kinetic energy of from about 1.0 eV to about 5.0 eV, and wherein the intrinsic photoactive layer is grown at a rate of from about 5 nm/min to about 100 nm/min.

  7. Intrinsic motivation and amotivation in first episode and prolonged psychosis.

    Science.gov (United States)

    Luther, Lauren; Lysaker, Paul H; Firmin, Ruth L; Breier, Alan; Vohs, Jenifer L

    2015-12-01

    The deleterious functional implications of motivation deficits in psychosis have generated interest in examining dimensions of the construct. However, there remains a paucity of data regarding whether dimensions of motivation differ over the course of psychosis. Therefore, this study examined two motivation dimensions, trait-like intrinsic motivation, and the negative symptom of amotivation, and tested the impact of illness phase on the 1) levels of these dimensions and 2) relationship between these dimensions. Participants with first episode psychosis (FEP; n=40) and prolonged psychosis (n=66) completed clinician-rated measures of intrinsic motivation and amotivation. Analyses revealed that when controlling for group differences in gender and education, the FEP group had significantly more intrinsic motivation and lower amotivation than the prolonged psychosis group. Moreover, intrinsic motivation was negatively correlated with amotivation in both FEP and prolonged psychosis, but the magnitude of the relationship did not statistically differ between groups. These findings suggest that motivation deficits are more severe later in the course of psychosis and that low intrinsic motivation may be partially independent of amotivation in both first episode and prolonged psychosis. Clinically, these results highlight the importance of targeting motivation in early intervention services. Copyright © 2015 Elsevier B.V. All rights reserved.

  8. Semisupervised Support Vector Machines With Tangent Space Intrinsic Manifold Regularization.

    Science.gov (United States)

    Sun, Shiliang; Xie, Xijiong

    2016-09-01

    Semisupervised learning has been an active research topic in machine learning and data mining. One main reason is that labeling examples is expensive and time-consuming, while there are large numbers of unlabeled examples available in many practical problems. So far, Laplacian regularization has been widely used in semisupervised learning. In this paper, we propose a new regularization method called tangent space intrinsic manifold regularization. It is intrinsic to data manifold and favors linear functions on the manifold. Fundamental elements involved in the formulation of the regularization are local tangent space representations, which are estimated by local principal component analysis, and the connections that relate adjacent tangent spaces. Simultaneously, we explore its application to semisupervised classification and propose two new learning algorithms called tangent space intrinsic manifold regularized support vector machines (TiSVMs) and tangent space intrinsic manifold regularized twin SVMs (TiTSVMs). They effectively integrate the tangent space intrinsic manifold regularization consideration. The optimization of TiSVMs can be solved by a standard quadratic programming, while the optimization of TiTSVMs can be solved by a pair of standard quadratic programmings. The experimental results of semisupervised classification problems show the effectiveness of the proposed semisupervised learning algorithms.

  9. Intrinsic thermodynamics of inhibitor binding to human carbonic anhydrase IX.

    Science.gov (United States)

    Linkuvienė, Vaida; Matulienė, Jurgita; Juozapaitienė, Vaida; Michailovienė, Vilma; Jachno, Jelena; Matulis, Daumantas

    2016-04-01

    Human carbonic anhydrase 9th isoform (CA IX) is an important marker of numerous cancers and is increasingly interesting as a potential anticancer drug target. Various synthetic aromatic sulfonamide-bearing compounds are being designed as potent inhibitors of CA IX. However, sulfonamide compound binding to CA IX is linked to several reactions, the deprotonation of the sulfonamide amino group and the protonation of the CA active site Zn(II)-bound hydroxide. These linked reactions significantly affect the affinities and other thermodynamic parameters such as enthalpies and entropies of binding. The observed and intrinsic affinities of compound binding to CA IX were determined by the fluorescent thermal shift assay. The enthalpies and entropies of binding were determined by the isothermal titration calorimetry. The pKa of CA IX was determined to be 6.8 and the enthalpy of CA IX-Zn(II)-bound hydroxide protonation was -24 kJ/mol. These values enabled the analysis of intrinsic thermodynamics of a library of compounds binding to CA IX. The most strongly binding compounds exhibited the intrinsic affinity of 0.01 nM and the observed affinity of 2 nM. The intrinsic thermodynamic parameters of compound binding to CA IX helped to draw the compound structure to thermodynamics relationship. It is important to distinguish the intrinsic from observed parameters of any disease target protein interaction with its inhibitors as drug candidates when drawing detailed compound structure to thermodynamics correlations. Copyright © 2016 Elsevier B.V. All rights reserved.

  10. Quantization Effects and Stabilization of the Fast-Kalman Algorithm

    Directory of Open Access Journals (Sweden)

    Constantin Papaodysseus

    2001-10-01

    Full Text Available The exact and actual cause of the failure of the fast-Kalman algorithm due to the generation and propagation of finite-precision or quantization error is presented. It is demonstrated that out of all the formulas that constitute this fast Recursive Least Squares (RLS scheme only three generate an amount of finite-precision error that consistently propagates in the subsequent iterations and eventually makes the algorithm fail after a certain number of recursions. Moreover, it is shown that there is a very limited number of specific formulas that transmit the generated finite-precision error, while there is another class of formulas that lift or “relax” this error. In addition, a number of general propositions is presented that allow for the calculation of the exact number of erroneous digits with which the various quantities of the fast-Kalman scheme are computed, including the filter coefficients. On the basis of the previous analysis a method of stabilization of the fast-Kalman algorithm is developed and is presented here, a method that allows for the fast-Kalman algorithm to follow very difficult signals such as music, speech, environmental noise, and other nonstationary ones. Finally, a general methodology is pointed out, that allows for the development of new algorithms which, intrinsically, suffer far less of finite-precision problems.

  11. Fast Light Optical Gyroscopes

    Science.gov (United States)

    Smith, David D.

    2015-01-01

    Next-generation space missions are currently constrained by existing spacecraft navigation systems which are not fully autonomous. These systems suffer from accumulated dead-reckoning errors and must therefore rely on periodic corrections provided by supplementary technologies that depend on line-of-sight signals from Earth, satellites, or other celestial bodies for absolute attitude and position determination, which can be spoofed, incorrectly identified, occluded, obscured, attenuated, or insufficiently available. These dead-reckoning errors originate in the ring laser gyros themselves, which constitute inertial measurement units. Increasing the time for standalone spacecraft navigation therefore requires fundamental improvements in gyroscope technologies. One promising solution to enhance gyro sensitivity is to place an anomalous dispersion or fast light material inside the gyro cavity. The fast light essentially provides a positive feedback to the gyro response, resulting in a larger measured beat frequency for a given rotation rate as shown in figure 1. Game Changing Development has been investing in this idea through the Fast Light Optical Gyros (FLOG) project, a collaborative effort which began in FY 2013 between NASA Marshall Space Flight Center (MSFC), the U.S. Army Aviation and Missile Research, Development, and Engineering Center (AMRDEC), and Northwestern University. MSFC and AMRDEC are working on the development of a passive FLOG (PFLOG), while Northwestern is developing an active FLOG (AFLOG). The project has demonstrated new benchmarks in the state of the art for scale factor sensitivity enhancement. Recent results show cavity scale factor enhancements of approx.100 for passive cavities.

  12. ADT fast losses MD

    CERN Document Server

    Priebe, A; Dehning, B; Redaelli, S; Salvachua Ferrando, BM; Sapinski, M; Solfaroli Camillocci, M; Valuch, D

    2013-01-01

    The fast beam losses in the order of 1 ms are expected to be a potential major luminosity limitation for higher beam energies after the LHC long shutdown (LS1). Therefore a Quench Test is planned in the winter 2013 to estimate the quench limit in this timescale and revise the current models. This experiment was devoted to determination the LHC Transverse Damper (ADT) as a system for fast losses induction. A non-standard operation of the ADT was used to develop the beam oscillation instead of suppressing them. The sign flip method had allowed us to create the fast losses within several LHC turns at 450 GeV during the previous test (26th March 2012). Thus, the ADT could be potentially used for the studies of the UFO ("Unidentied Falling Object") impact on the cold magnets. Verification of the system capability and investigations of the disturbed beam properties were the main objectives of this MD. During the experiment, the pilot bunches of proton beam were excited independently in the horizontal and vertical ...

  13. Fast-scintillator measurements

    International Nuclear Information System (INIS)

    Graves, W.R.; Slaughter, D.R.; Lerche, R.A.

    1985-01-01

    The authors are investigating scintillators because their fast timing properties may be applied to the development of neutron diagnostics. Measuring the history of a target burn by direct observation of DT neutrons requires a time resolution of 20 ps. An instrument designed to measure the plasma ion temperature by neutron time of flight, when the flight path is less than or equal to 1m, requires a detector system with resolution of 60 to 100 ps. Fast plastic scintillators like NE111, BC-422, and SG180 typically have decay constants of about 1400 ps. With quenching, the decay constant can be decreased to about 700 ps - still to slow for the instruments that they would like to build. One yet-unexploited property of fast scintillators is their rise time. In 1984, they began experiments designed to measure scintillator rise times. For our application - the measurement of target burn histories - they are especially concerned with the temporal width of the sample excitation pulse, the temporal resolution of our measurement system, and the need to characterize the excitation pulse and the scintillator output simultaneously. Application of plastic scintillators to a neutron streak camera is described

  14. Practical Secure Computation with Pre-Processing

    DEFF Research Database (Denmark)

    Zakarias, Rasmus Winther

    a protocol for small field arithmetic to do fast large integer multipli- cations. This is achieved by devising pre-processing material that allows the Toom-Cook multiplication algorithm to run between the parties with linear communication complexity. With this result computation on the CPU by the parties......- ments in the small field and performing O(n log n log log n) operations on small field elements. The fourth main result of the dissertation is a generic and efficient protocol for proving knowledge of a witness for circuit satisfiability in Zero-Knowledge. We prove our construction secure in the UC-framework...

  15. Security and Emergency Management Division

    Data.gov (United States)

    Federal Laboratory Consortium — Volpe's Security and Emergency Management Division identifies vulnerabilities, risks, and opportunities to improve the security of transportation systems, critical...

  16. Metabolic Effects of Intermittent Fasting.

    Science.gov (United States)

    Patterson, Ruth E; Sears, Dorothy D

    2017-08-21

    The objective of this review is to provide an overview of intermittent fasting regimens, summarize the evidence on the health benefits of intermittent fasting, and discuss physiological mechanisms by which intermittent fasting might lead to improved health outcomes. A MEDLINE search was performed using PubMed and the terms "intermittent fasting," "fasting," "time-restricted feeding," and "food timing." Modified fasting regimens appear to promote weight loss and may improve metabolic health. Several lines of evidence also support the hypothesis that eating patterns that reduce or eliminate nighttime eating and prolong nightly fasting intervals may result in sustained improvements in human health. Intermittent fasting regimens are hypothesized to influence metabolic regulation via effects on (a) circadian biology, (b) the gut microbiome, and (c) modifiable lifestyle behaviors, such as sleep. If proven to be efficacious, these eating regimens offer promising nonpharmacological approaches to improving health at the population level, with multiple public health benefits.

  17. Neighborhood fast food availability and fast food consumption

    Science.gov (United States)

    Oexle, Nathalie; Barnes, Timothy L; Blake, Christine E; Bell, Bethany A; Liese, Angela D

    2015-01-01

    Recent nutritional and public health research has focused on how the availability of various types of food in a person’s immediate area or neighborhood influences his or her food choices and eating habits. It has been theorized that people living in areas with a wealth of unhealthy fast-food options may show higher levels of fast-food consumption, a factor that often coincides with being overweight or obese. However, measuring food availability in a particular area is difficult to achieve consistently: there may be differences in the strict physical locations of food options as compared to how individuals perceive their personal food availability, and various studies may use either one or both of these measures. The aim of this study was to evaluate the association between weekly fast-food consumption and both a person’s perceived availability of fast-food and an objective measure of fast-food presence—Geographic Information Systems (GIS)—within that person’s neighborhood. A randomly selected population-based sample of eight counties in South Carolina was used to conduct a cross-sectional telephone survey assessing self-report fast-food consumption and perceived availability of fast food. GIS was used to determine the actual number of fast-food outlets within each participant’s neighborhood. Using multinomial logistic regression analyses, we found that neither perceived availability nor GIS-based presence of fast-food was significantly associated with weekly fast-food consumption. Our findings indicate that availability might not be the dominant factor influencing fast-food consumption. We recommend using subjective availability measures and considering individual characteristics that could influence both perceived availability of fast food and its impact on fast-food consumption. If replicated, our findings suggest that interventions aimed at reducing fast-food consumption by limiting neighborhood fast-food availability might not be completely

  18. Neighborhood fast food availability and fast food consumption.

    Science.gov (United States)

    Oexle, Nathalie; Barnes, Timothy L; Blake, Christine E; Bell, Bethany A; Liese, Angela D

    2015-09-01

    Recent nutritional and public health research has focused on how the availability of various types of food in a person's immediate area or neighborhood influences his or her food choices and eating habits. It has been theorized that people living in areas with a wealth of unhealthy fast-food options may show higher levels of fast-food consumption, a factor that often coincides with being overweight or obese. However, measuring food availability in a particular area is difficult to achieve consistently: there may be differences in the strict physical locations of food options as compared to how individuals perceive their personal food availability, and various studies may use either one or both of these measures. The aim of this study was to evaluate the association between weekly fast-food consumption and both a person's perceived availability of fast-food and an objective measure of fast-food presence - Geographic Information Systems (GIS) - within that person's neighborhood. A randomly selected population-based sample of eight counties in South Carolina was used to conduct a cross-sectional telephone survey assessing self-report fast-food consumption and perceived availability of fast food. GIS was used to determine the actual number of fast-food outlets within each participant's neighborhood. Using multinomial logistic regression analyses, we found that neither perceived availability nor GIS-based presence of fast-food was significantly associated with weekly fast-food consumption. Our findings indicate that availability might not be the dominant factor influencing fast-food consumption. We recommend using subjective availability measures and considering individual characteristics that could influence both perceived availability of fast food and its impact on fast-food consumption. If replicated, our findings suggest that interventions aimed at reducing fast-food consumption by limiting neighborhood fast-food availability might not be completely effective

  19. To The Question Of The Concepts "National Security", "Information Security", "National Information Security" Meanings

    OpenAIRE

    Alexander A. Galushkin

    2015-01-01

    In the present article author analyzes value of the concepts "national security", "information security", "national information security". Author gives opinions of scientists-jurists, definitions given by legislators and normotvorets in various regulations.

  20. Security vs. Safety.

    Science.gov (United States)

    Sturgeon, Julie

    1999-01-01

    Provides administrative advice on how some safety experts have made college campuses safer and friendlier without breaking the budget. Tips on security and advice on safety management that encompasses the whole environment are highlighted. (GR)