WorldWideScience

Sample records for intrinsically secure fast

  1. Intrinsically secure fast reactors with dense cores

    International Nuclear Information System (INIS)

    Slessarev, Igor

    2007-01-01

    Secure safety, resistance to weapons material proliferation and problems of long-lived wastes remain the most important 'painful points' of nuclear power. Many innovative reactor concepts have been developed aimed at a radical enhancement of safety. The promising potential of innovative nuclear reactors allows for shifting accents in current reactor safety 'strategy' to reveal this worth. Such strategy is elaborated focusing on the priority for intrinsically secure safety features as well as on sure protection being provided by the first barrier of defence. Concerning the potential of fast reactors (i.e. sodium cooled, lead-cooled, etc.), there are no doubts that they are able to possess many favourable intrinsically secure safety features and to lay the proper foundation for a new reactor generation. However, some of their neutronic characteristics have to be radically improved. Among intrinsically secure safety properties, the following core parameters are significantly important: reactivity margin values, reactivity feed-back and coolant void effects. Ways of designing intrinsically secure safety features in fast reactors (titled hereafter as Intrinsically Secure Fast Reactors - ISFR) can be found in the frame of current reactor technologies by radical enhancement of core neutron economy and by optimization of core compositions. Simultaneously, respecting resistance to proliferation, by using non-enriched fuel feed as well as a core breeding gain close to zero, are considered as the important features (long-lived waste problems will be considered in a separate paper). This implies using the following reactor design options as well as closed fuel cycles with natural U as the reactor feed: ·Ultra-plate 'dense cores' of the ordinary (monolithic) type with negative total coolant void effects. ·Modular type cores. Multiple dense modules can be embedded in the common reflector for achieving the desired NPP total power. The modules can be used also independently (as

  2. Intrinsically secure fast reactors for long-lived waste free and proliferation resistant nuclear power

    International Nuclear Information System (INIS)

    Slessarev, Igor

    2008-01-01

    This paper provides description of a nuclear reactor concept aimed towards a radical safety enhancement, an increased proliferation resistance, as well as a realisation of a 'long-lived waste free' NP development. It emphasizes the achievement of considerable reduction ('by design') of residual actinides in the waste streams and of the most hazardous long-lived fission products. It allows to implement only small volume of repositories for the radioactive waste (mostly fission products) and to postpone the technically arduous problems of a large scale disposal of the long-lived wastes until the next millennium, i.e. up to the exhaustion of the fertile natural resources and/or the emergence of more effective technologies of nuclide separation/transmutation. A thorough incineration/transmutation of the wastes (residual actinides in the mixture with lanthanides as well as of the most hazardous fission products) under reactor neutron flux is proposed for their mass reduction. A gradual growth of NP park is necessary for increasing the NP park capacity for waste irradiation. This 'constraint' is not really limiting because it coincides with the permanently growing demands in energy production. The potential of long-lived waste reduction depends on the total fertile fuel resources and on NP growth rate. It was shown that the accumulated actinide long-lived radioactive masses will be reduced significantly: by factor in the range of 10 4 -10 8 in magnitude (compared with LWR once-through cycle) and by 10 2 -10 6 (compared with the ordinary fast reactor park). Thus, the total long-lived waste toxicity pollution source might be comparable with the 'burnt away' toxicity of the natural fertile feed stream. This is quite realistic taking into account the large fertile fuel (U/Th) world-wide resources which provide the NP growth for a sustained time. Along side with the radical intrinsic safety improvement, a further enhancement of core physics ('neutronics') is one of the

  3. Survey of Cyber Security Intrinsic for a Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Yoo Rark; Lee, Jae Cheol [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2009-05-15

    Federal agencies are facing a set of emerging cyber security threats that are the result of increasingly sophisticated methods of attack and the blending of once distinct types of attack into more complex and damaging forms. Spam, phishing, and spyware, while once viewed as discrete consumer challenges, are being blended to create substantial threats to large enterprises, including federal systems and digital I and C of a NPP (Nuclear Power Plant) is one of them. The cyber security policy for a NPP has been established for years by KINS, but its scope is very broad and conceptual. We will describe several important cyber security issues for a NPP in the applicative boundary.

  4. Survey of Cyber Security Intrinsic for a Nuclear Power Plant

    International Nuclear Information System (INIS)

    Choi, Yoo Rark; Lee, Jae Cheol

    2009-01-01

    Federal agencies are facing a set of emerging cyber security threats that are the result of increasingly sophisticated methods of attack and the blending of once distinct types of attack into more complex and damaging forms. Spam, phishing, and spyware, while once viewed as discrete consumer challenges, are being blended to create substantial threats to large enterprises, including federal systems and digital I and C of a NPP (Nuclear Power Plant) is one of them. The cyber security policy for a NPP has been established for years by KINS, but its scope is very broad and conceptual. We will describe several important cyber security issues for a NPP in the applicative boundary

  5. CryptosFS: Fast Cryptographic Secure NFS

    OpenAIRE

    O'Shanahan, Declan

    2000-01-01

    The issue of security in file-systems is as relevant today as when the first file system was developed. Current file system implementations rely heavily on centralised security mechanisms such as access control lists. The problem of security in file systems was made more complicated by the introduction of remote access to files. Storing information on a remote server has the potential to introduce additional security weaknesses into the file system model. The client, the commun...

  6. Enhancing MISP with Fast Mobile IPv6 Security

    Directory of Open Access Journals (Sweden)

    Ilsun You

    2011-01-01

    Full Text Available The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction with an authentication server that is required for every authentication is considered as a delay factor during handovers. In this paper, we present an improvement of MISP that utilizes the fast handover approach of Fast Mobile IPv6 and minimizes an involvement of the authentication server while eliminating identified security drawbacks of MISP. The formal security analysis is performed to verify the correctness of the proposed scheme. Moreover, the handover performance of the proposed scheme is compared with an existing scheme.

  7. Intrinsic information Security: Embedding security issues in the design process of telematics systems

    NARCIS (Netherlands)

    Tettero, Olaf; Tettero, O.

    This book presents a systematic approach to embed information security issues in the design process of telematics systems. The approach supports both designers and user organisations. We elaborate on the activities that designers should perform to design telematics systems in which information

  8. Fast hydrogen exchange affects 15N relaxation measurements in intrinsically disordered proteins

    International Nuclear Information System (INIS)

    Kim, Seho; Wu, Kuen-Phon; Baum, Jean

    2013-01-01

    Unprotected amide protons can undergo fast hydrogen exchange (HX) with protons from the solvent. Generally, NMR experiments using the out-and-back coherence transfer with amide proton detection are affected by fast HX and result in reduced signal intensity. When one of these experiments, 1 H– 15 N HSQC, is used to measure the 15 N transverse relaxation rate (R 2 ), the measured R 2 rate is convoluted with the HX rate (k HX ) and has higher apparent R 2 values. Since the 15 N R 2 measurement is important for analyzing protein backbone dynamics, the HX effect on the R 2 measurement is investigated and described here by multi-exponential signal decay. We demonstrate these effects by performing 15 N R 2 CPMG experiments on α-synuclein, an intrinsically disordered protein, in which the amide protons are exposed to solvent. We show that the HX effect on R 2 CPMG can be extracted by the derived equation. In conclusion, the HX effect may be pulse sequence specific and results from various sources including the J coupling evolution, the change of steady state water proton magnetization, and the D 2 O content in the sample. To avoid the HX effect on the analysis of relaxation data of unprotected amides, it is suggested that NMR experimental conditions insensitive to the HX should be considered or that intrinsic R 2 CPMG values be obtained by methods described herein.

  9. Fast hydrogen exchange affects {sup 15}N relaxation measurements in intrinsically disordered proteins

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Seho; Wu, Kuen-Phon; Baum, Jean, E-mail: jean.baum@rutgers.edu [Rutgers University, Department of Chemistry and Chemical Biology (United States)

    2013-03-15

    Unprotected amide protons can undergo fast hydrogen exchange (HX) with protons from the solvent. Generally, NMR experiments using the out-and-back coherence transfer with amide proton detection are affected by fast HX and result in reduced signal intensity. When one of these experiments, {sup 1}H-{sup 15}N HSQC, is used to measure the {sup 15}N transverse relaxation rate (R{sub 2}), the measured R{sub 2} rate is convoluted with the HX rate (k{sub HX}) and has higher apparent R{sub 2} values. Since the {sup 15}N R{sub 2} measurement is important for analyzing protein backbone dynamics, the HX effect on the R{sub 2} measurement is investigated and described here by multi-exponential signal decay. We demonstrate these effects by performing {sup 15}N R{sub 2}{sup CPMG} experiments on {alpha}-synuclein, an intrinsically disordered protein, in which the amide protons are exposed to solvent. We show that the HX effect on R{sub 2}{sup CPMG} can be extracted by the derived equation. In conclusion, the HX effect may be pulse sequence specific and results from various sources including the J coupling evolution, the change of steady state water proton magnetization, and the D{sub 2}O content in the sample. To avoid the HX effect on the analysis of relaxation data of unprotected amides, it is suggested that NMR experimental conditions insensitive to the HX should be considered or that intrinsic R{sub 2}{sup CPMG} values be obtained by methods described herein.

  10. Live-cell super-resolution imaging of intrinsically fast moving flagellates

    International Nuclear Information System (INIS)

    Glogger, M; Subota, I; Spindler, M-C; Engstler, M; Fenz, S F; Stichler, S; Bertlein, S; Teßmar, J; Groll, J

    2017-01-01

    Recent developments in super-resolution microscopy make it possible to resolve structures in biological cells at a spatial resolution of a few nm and observe dynamical processes with a temporal resolution of ms to μ s. However, the optimal structural resolution requires repeated illumination cycles and is thus limited to chemically fixed cells. For live cell applications substantial improvement over classical Abbe-limited imaging can already be obtained in adherent or slow moving cells. Nonetheless, a large group of cells are fast moving and thus could not yet be addressed with live cell super-resolution microscopy. These include flagellate pathogens like African trypanosomes, the causative agents of sleeping sickness in humans and nagana in livestock. Here, we present an embedding method based on a in situ forming cytocompatible UV-crosslinked hydrogel. The fast cross-linking hydrogel immobilizes trypanosomes efficiently to allow microscopy on the nanoscale. We characterized both the trypanosomes and the hydrogel with respect to their autofluorescence properties and found them suitable for single-molecule fluorescence microscopy (SMFM). As a proof of principle, SMFM was applied to super-resolve a structure inside the living trypanosome. We present an image of a flagellar axoneme component recorded by using the intrinsic blinking behavior of eYFP. (paper)

  11. Live-cell super-resolution imaging of intrinsically fast moving flagellates

    Science.gov (United States)

    Glogger, M.; Stichler, S.; Subota, I.; Bertlein, S.; Spindler, M.-C.; Teßmar, J.; Groll, J.; Engstler, M.; Fenz, S. F.

    2017-02-01

    Recent developments in super-resolution microscopy make it possible to resolve structures in biological cells at a spatial resolution of a few nm and observe dynamical processes with a temporal resolution of ms to μs. However, the optimal structural resolution requires repeated illumination cycles and is thus limited to chemically fixed cells. For live cell applications substantial improvement over classical Abbe-limited imaging can already be obtained in adherent or slow moving cells. Nonetheless, a large group of cells are fast moving and thus could not yet be addressed with live cell super-resolution microscopy. These include flagellate pathogens like African trypanosomes, the causative agents of sleeping sickness in humans and nagana in livestock. Here, we present an embedding method based on a in situ forming cytocompatible UV-crosslinked hydrogel. The fast cross-linking hydrogel immobilizes trypanosomes efficiently to allow microscopy on the nanoscale. We characterized both the trypanosomes and the hydrogel with respect to their autofluorescence properties and found them suitable for single-molecule fluorescence microscopy (SMFM). As a proof of principle, SMFM was applied to super-resolve a structure inside the living trypanosome. We present an image of a flagellar axoneme component recorded by using the intrinsic blinking behavior of eYFP. , which features invited work from the best early-career researchers working within the scope of J Phys D. This project is part of the Journal of Physics series’ 50th anniversary celebrations in 2017. Susanne Fenz was selected by the Editorial Board of J Phys D as an Emerging Talent/Leader.

  12. He-4 fast neutron detectors in nuclear security applications

    International Nuclear Information System (INIS)

    Murer, D. E.

    2014-01-01

    This work presents studies of "4He fast neutron detectors for nuclear security applications. Such devices are high pressure gas scintillation detectors, sensitive to neutrons in the energy range of fission sources. First, an introduction to the scope of the intended application is given. This is followed by a description of all components relevant to the operation of the detector. The next chapter presents studies of various characteristics of the neutron detector, among them properties of its scintillation response, differences between neutron and gamma interactions and effects of the light collection process. The results of the detector characterization are used to develop neutron gamma discrimination methods. These methods are put to the test using measurements with a high gamma flux, and the results are compared to performance requirements of Radiation Portal Monitors. Background neutron measurements are presented next. Measured neutron rates are compared to values published in scientific literature. The fluctuation of the background count rate was studied, and the contribution of muons evaluated. Two applications of the detectors in the field of nuclear security are discussed in the last two chapters. The first one is a novel method to measure the plutonium mass in a container filled with Mixed Oxide Fuel. The last chapter presents the development of a Radiation Portal Monitor which, in addition to neutron and gamma counting, exploits time correlation to detect threats such as plutonium and "6"0Co. (author)

  13. He-4 fast neutron detectors in nuclear security applications

    Energy Technology Data Exchange (ETDEWEB)

    Murer, D. E.

    2014-07-01

    This work presents studies of {sup 4}He fast neutron detectors for nuclear security applications. Such devices are high pressure gas scintillation detectors, sensitive to neutrons in the energy range of fission sources. First, an introduction to the scope of the intended application is given. This is followed by a description of all components relevant to the operation of the detector. The next chapter presents studies of various characteristics of the neutron detector, among them properties of its scintillation response, differences between neutron and gamma interactions and effects of the light collection process. The results of the detector characterization are used to develop neutron gamma discrimination methods. These methods are put to the test using measurements with a high gamma flux, and the results are compared to performance requirements of Radiation Portal Monitors. Background neutron measurements are presented next. Measured neutron rates are compared to values published in scientific literature. The fluctuation of the background count rate was studied, and the contribution of muons evaluated. Two applications of the detectors in the field of nuclear security are discussed in the last two chapters. The first one is a novel method to measure the plutonium mass in a container filled with Mixed Oxide Fuel. The last chapter presents the development of a Radiation Portal Monitor which, in addition to neutron and gamma counting, exploits time correlation to detect threats such as plutonium and {sup 60}Co. (author)

  14. Which Extrinsic and Intrinsic Factors are Associated with Non-Contact Injuries in Adult Cricket Fast Bowlers?

    Science.gov (United States)

    Olivier, Benita; Taljaard, Tracy; Burger, Elaine; Brukner, Peter; Orchard, John; Gray, Janine; Botha, Nadine; Stewart, Aimee; Mckinon, Warrick

    2016-01-01

    The high prevalence of injury amongst cricket fast bowlers exposes a great need for research into the risk factors associated with injury. Both extrinsic (environment-related) and intrinsic (person-related) risk factors are likely to be implicated within the high prevalence of non-contact injury amongst fast bowlers in cricket. Identifying and defining the relative importance of these risk factors is necessary in order to optimize injury prevention efforts. The objective of this review was to assess and summarize the scientific literature related to the extrinsic and intrinsic factors associated with non-contact injury inherent to adult cricket fast bowlers. A systematic review was performed in compliance with the PRISMA guidelines. This review considered both experimental and epidemiological study designs. Studies that included male cricket fast bowlers aged 18 years or above, from all levels of play, evaluating the association between extrinsic/intrinsic factors and injury in fast bowlers were considered for inclusion. The three-step search strategy aimed at finding both published and unpublished studies from all languages. The searched databases included MEDLINE via PubMed, Cumulative Index to Nursing and Allied Health Literature (CINAHL), the Cochrane Controlled Trials Register in the Cochrane Library, Physiotherapy Evidence Database (PEDro), ProQuest 5000 International, ProQuest Health and Medical Complete, EBSCO MegaFile Premier, Science Direct, SPORTDiscus with Full Text and SCOPUS (prior to 28 April 2015). Initial keywords used were 'cricket', 'pace', 'fast', 'bowler', and 'injury'. Papers which fitted the inclusion criteria were assessed by two independent reviewers for methodological validity prior to inclusion in the review using standardized critical appraisal instruments from the Joanna Briggs Institute Meta Analysis of Statistics Assessment and Review Instrument (JBI-MAStARI). A total of 16 studies were determined to be suitable for inclusion in this

  15. Fast and maliciously secure two-party computation using the GPU

    DEFF Research Database (Denmark)

    Frederiksen, Tore Kasper; Nielsen, Jesper Buus

    2013-01-01

    We describe, and implement, a maliciously secure protocol for two-party computation in a parallel computational model. Our protocol is based on Yao’s garbled circuit and an efficient OT extension. The implementation is done using CUDA and yields fast results for maliciously secure two-party compu......-party computation in a financially feasible and practical setting by using a consumer grade CPU and GPU. Our protocol further uses some novel constructions in order to combine garbled circuits and an OT extension in a parallel and maliciously secure setting.......We describe, and implement, a maliciously secure protocol for two-party computation in a parallel computational model. Our protocol is based on Yao’s garbled circuit and an efficient OT extension. The implementation is done using CUDA and yields fast results for maliciously secure two...

  16. Fast gamma oscillations are generated intrinsically in CA1 without the involvement of fast-spiking basket cells.

    Science.gov (United States)

    Craig, Michael T; McBain, Chris J

    2015-02-25

    Information processing in neuronal networks relies on the precise synchronization of ensembles of neurons, coordinated by the diverse family of inhibitory interneurons. Cortical interneurons can be usefully parsed by embryonic origin, with the vast majority arising from either the caudal or medial ganglionic eminences (CGE and MGE). Here, we examine the activity of hippocampal interneurons during gamma oscillations in mouse CA1, using an in vitro model where brief epochs of rhythmic activity were evoked by local application of kainate. We found that this CA1 KA-evoked gamma oscillation was faster than that in CA3 and, crucially, did not appear to require the involvement of fast-spiking basket cells. In contrast to CA3, we also found that optogenetic inhibition of pyramidal cells in CA1 did not significantly affect the power of the oscillation, suggesting that excitation may not be essential for gamma genesis in this region. We found that MGE-derived interneurons were generally more active than CGE interneurons during CA1 gamma, although a group of CGE-derived interneurons, putative trilaminar cells, were strongly phase-locked with gamma oscillations and, together with MGE-derived axo-axonic and bistratified cells, provide attractive candidates for being the driver of this locally generated, predominantly interneuron-driven model of gamma oscillations. Copyright © 2015 the authors 0270-6474/15/353616-09$15.00/0.

  17. Secure Route Structures for Parallel Mobile Agents Based Systems Using Fast Binary Dispatch

    Directory of Open Access Journals (Sweden)

    Yan Wang

    2005-01-01

    Full Text Available In a distributed environment, where a large number of computers are connected together to enable the large-scale sharing of data and computing resources, agents, especially mobile agents, are the tools for autonomously completing tasks on behalf of their owners. For applications of large-scale mobile agents, security and efficiency are of great concern. In this paper, we present a fast binary dispatch model and corresponding secure route structures for mobile agents dispatched in parallel to protect the dispatch routes of agents while ensuring the dispatch efficiency. The fast binary dispatch model is simple but efficient with a dispatch complexity of O(log2n. The secure route structures adopt the combination of public-key encryption and digital signature schemes and expose minimal route information to hosts. The nested structure can help detect attacks as early as possible. We evaluated the various models both analytically and empirically.

  18. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  19. A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform

    Directory of Open Access Journals (Sweden)

    Srinivas Koppu

    2017-01-01

    Full Text Available An enhanced secure image chaotic cryptosystem has been proposed based on hybrid CMT-Lanczos algorithm. We have achieved fast encryption and decryption along with privacy of images. The pseudorandom generator has been used along with Lanczos algorithm to generate root characteristics and eigenvectors. Using hybrid CMT image, pixels are shuffled to accomplish excellent randomness. Compared with existing methods, the proposed method had more robustness to various attacks: brute-force attack, known cipher plaintext, chosen-plaintext, security key space, key sensitivity, correlation analysis and information entropy, and differential attacks. Simulation results show that the proposed methods give better result in protecting images with low-time complexity.

  20. A Novel Fast and Secure Approach for Voice Encryption Based on DNA Computing

    Science.gov (United States)

    Kakaei Kate, Hamidreza; Razmara, Jafar; Isazadeh, Ayaz

    2018-06-01

    Today, in the world of information communication, voice information has a particular importance. One way to preserve voice data from attacks is voice encryption. The encryption algorithms use various techniques such as hashing, chaotic, mixing, and many others. In this paper, an algorithm is proposed for voice encryption based on three different schemes to increase flexibility and strength of the algorithm. The proposed algorithm uses an innovative encoding scheme, the DNA encryption technique and a permutation function to provide a secure and fast solution for voice encryption. The algorithm is evaluated based on various measures including signal to noise ratio, peak signal to noise ratio, correlation coefficient, signal similarity and signal frequency content. The results demonstrate applicability of the proposed method in secure and fast encryption of voice files

  1. Unified compression and encryption algorithm for fast and secure network communications

    International Nuclear Information System (INIS)

    Rizvi, S.M.J.; Hussain, M.; Qaiser, N.

    2005-01-01

    Compression and encryption of data are two vital requirements for the fast and secure transmission of data in the network based communications. In this paper an algorithm is presented based on adaptive Huffman encoding for unified compression and encryption of Unicode encoded textual data. The Huffman encoding weakness that same tree is needed for decoding is utilized in the algorithm presented as an extra layer of security, which is updated whenever the frequency change is above the specified threshold level. The results show that we get compression comparable to popular zip format and in addition to that data has got an additional layer of encryption that makes it more secure. Thus unified algorithm presented here can be used for network communications between different branches of banks, e- Government programs and national database and registration centers where data transmission requires both compression and encryption. (author)

  2. Effects of Nuclear Energy on Sustainable Development and Energy Security: Sodium-Cooled Fast Reactor Case

    Directory of Open Access Journals (Sweden)

    Sungjoo Lee

    2016-09-01

    Full Text Available We propose a stepwise method of selecting appropriate indicators to measure effects of a specific nuclear energy option on sustainable development and energy security, and also to compare an energy option with another. Focusing on the sodium-cooled fast reactor, one of the highlighted Generation IV reactors, we measure and compare its effects with the standard pressurized water reactor-based nuclear power, and then with coal power. Collecting 36 indicators, five experts select seven key indicators to meet data availability, nuclear energy relevancy, comparability among energy options, and fit with Korean energy policy objectives. The results show that sodium-cooled fast reactors is a better alternative than existing nuclear power as well as coal electricity generation across social, economic and environmental dimensions. Our method makes comparison between energy alternatives easier, thereby clarifying consequences of different energy policy decisions.

  3. Ultra-fast secure communication with complex systems in classical channels (Conference Presentation)

    KAUST Repository

    Mazzone, Valerio

    2017-04-28

    Developing secure communications is a research area of growing interest. During the past years, several cryptographic schemes have been developed, with Quantum cryptography being a promising scheme due to the use of quantum effects, which make very difficult for an eavesdropper to intercept the communication. However, practical quantum key distribution methods have encountered several limitations; current experimental realizations, in fact, fail to scale up on long distances, as well as in providing unconditional security and speed comparable to classical optical communications channels. Here we propose a new, low cost and ultra-fast cryptographic system based on a fully classical optical channel. Our cryptographic scheme exploits the complex synchronization of two different random systems (one on the side of the sender and another on the side of the receiver) to realize a “physical” one paid system. The random medium is created by an optical chip fabricated through electron beam lithography on a Silicon On Insulator (SOI) substrate. We present experiments with ps lasers and commercial fibers, showing the ultrafast distribution of a random key between two users (Alice and Bob), with absolute no possibility for a passive/active eavesdropper to intercept the communication. Remarkably, this system enables the same security of quantum cryptography, but with the use of a classical communication channel. Our system exploits a unique synchronization that exists between two different random systems, and at such is extremely versatile and can enable safe communications among different users in standards telecommunications channels.

  4. Detector-device-independent quantum key distribution: Security analysis and fast implementation

    International Nuclear Information System (INIS)

    Boaron, Alberto; Korzh, Boris; Boso, Gianluca; Martin, Anthony; Zbinden, Hugo; Houlmann, Raphael; Lim, Charles Ci Wen

    2016-01-01

    One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. However, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) has been proposed to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. Here, we analyze the security of DDI-QKD and elucidate its security assumptions. We find that DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.

  5. A framework for fast and secure packaging identification on mobile phones

    Science.gov (United States)

    Diephuis, Maurits; Voloshynovskiy, Svyatoslav; Holotyak, Taras; Stendardo, Nabil; Keel, Bruno

    2014-02-01

    In this paper, we address the problem of fast and secure packaging identification on mobile phones. It is a well known fact that consumer goods are counterfeited on a massive scale in certain regions of the world, illustrating how existing counter measures fall short or don't exist at all, as can be seen in the local absence of laws pertaining to brand protection. This paper introduces a technological tool that allows the consumer to quickly identify a product or package with a mobile device using a physical non-cloneable features in the form of a surface micro- structure image. This natural occurring identifier allows a producer or brand owner to track and trace all its products and gives the consumer a powerful tool to confirm the authenticity of an offered product.

  6. The Subaru FMOS galaxy redshift survey (FastSound). V. Intrinsic alignments of emission-line galaxies at z ˜ 1.4

    Science.gov (United States)

    Tonegawa, Motonari; Okumura, Teppei; Totani, Tomonori; Dalton, Gavin; Glazebrook, Karl; Yabe, Kiyoto

    2018-04-01

    Intrinsic alignments (IA), the coherent alignment of intrinsic galaxy orientations, can be a source of a systematic error of weak lensing surveys. The redshift evolution of IA also contains information about the physics of galaxy formation and evolution. This paper presents the first measurement of IA at high redshift, z ˜ 1.4, using the spectroscopic catalog of blue star-forming galaxies of the FastSound redshift survey, with the galaxy shape information from the Canada-Hawaii-France telescope lensing survey. The IA signal is consistent with zero with power-law amplitudes fitted to the projected correlation functions for density-shape and shape-shape correlation components, Aδ+ = -0.0071 ± 0.1340 and A++ = -0.0505 ± 0.0848, respectively. These results are consistent with those obtained from blue galaxies at lower redshifts (e.g., A _{δ +}=0.0035_{-0.0389}^{+0.0387} and A_{++}=0.0045_{-0.0168}^{+0.0166} at z = 0.51 from the WiggleZ survey). The upper limit of the constrained IA amplitude corresponds to a few percent contamination to the weak-lensing shear power spectrum, resulting in systematic uncertainties on the cosmological parameter estimations by -0.052 < Δσ8 < 0.039 and -0.039 < ΔΩm < 0.030.

  7. Intrinsic imperfection of self-differencing single-photon detectors harms the security of high-speed quantum cryptography systems

    Science.gov (United States)

    Jiang, Mu-Sheng; Sun, Shi-Hai; Tang, Guang-Zhao; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2013-12-01

    Thanks to the high-speed self-differencing single-photon detector (SD-SPD), the secret key rate of quantum key distribution (QKD), which can, in principle, offer unconditionally secure private communications between two users (Alice and Bob), can exceed 1 Mbit/s. However, the SD-SPD may contain loopholes, which can be exploited by an eavesdropper (Eve) to hack into the unconditional security of the high-speed QKD systems. In this paper, we analyze the fact that the SD-SPD can be remotely controlled by Eve in order to spy on full information without being discovered, then proof-of-principle experiments are demonstrated. Here, we point out that this loophole is introduced directly by the operating principle of the SD-SPD, thus, it cannot be removed, except for the fact that some active countermeasures are applied by the legitimate parties.

  8. On the security of Y-00 under fast correlation and other attacks on the key

    Science.gov (United States)

    Yuen, Horace P.; Nair, Ranjith

    2007-04-01

    The security of the Y-00 direct encryption protocol under correlation attack is addressed. A Y-00 configuration that is more secure than AES under known-plaintext attack is presented. It is shown that under any ciphertext-only attack, full information-theoretic security on the Y-00 seed key is obtained for any encryption box ENC with proper deliberate signal randomization.

  9. On the security of Y-00 under fast correlation and other attacks on the key

    International Nuclear Information System (INIS)

    Yuen, Horace P.; Nair, Ranjith

    2007-01-01

    The security of the Y-00 direct encryption protocol under correlation attack is addressed. A Y-00 configuration that is more secure than AES under known-plaintext attack is presented. It is shown that under any ciphertext-only attack, full information-theoretic security on the Y-00 seed key is obtained for any encryption box ENC with proper deliberate signal randomization

  10. The fast breeder reactor: what is security and freedom worth to us

    International Nuclear Information System (INIS)

    1975-01-01

    Risks for governmental and non-governmental proliferation of nuclear weapons as a consequence of the development of fast breeder reactor technology are discussed. Polemological as well as sociological and political analyses together with ecological consequences lead to the conclusion that the fast breeder is not necessary for energy production and socially unacceptable

  11. Fast-Valving of Large Steam Turbine Units as a Means of Power System Security Enhancement

    Directory of Open Access Journals (Sweden)

    Bogdan Sobczak

    2014-03-01

    Full Text Available Fast-valving assists in maintaining system stability following a severe transmission system fault by reducing the turbine mechanical power. Fast-valving consists in rapid closing and opening of steam valves in an adequate manner to reduce the generator accelerating power following the recognition of a severe fault. FV can be an effective and economical method of meeting the performance requirements of a power system in the presence of an increase in wind and solar generation in the power system, newly connected large thermal units and delaying of building new transmission lines. The principle of fast-valving and advantages of applying this technique in large steam turbine units was presented in the paper. Effectiveness of fast-valving in enhancing the stability of the Polish Power Grid was analyzed. The feasibility study of fast-valving application in the 560 MW unit in Kozienice Power Station (EW SA was discussed.

  12. FAST

    DEFF Research Database (Denmark)

    Zuidmeer-Jongejan, Laurian; Fernandez-Rivas, Montserrat; Poulsen, Lars K.

    2012-01-01

    ABSTRACT: The FAST project (Food Allergy Specific Immunotherapy) aims at the development of safe and effective treatment of food allergies, targeting prevalent, persistent and severe allergy to fish and peach. Classical allergen-specific immunotherapy (SIT), using subcutaneous injections with aqu...

  13. Ultra-fast secure communication with complex systems in classical channels (Conference Presentation)

    KAUST Repository

    Mazzone, Valerio; Di Falco, Andrea; Fratalocchi, Andrea

    2017-01-01

    Developing secure communications is a research area of growing interest. During the past years, several cryptographic schemes have been developed, with Quantum cryptography being a promising scheme due to the use of quantum effects, which make very

  14. Fast-Valving of Large Steam Turbine Units as a Means of Power System Security Enhancement

    OpenAIRE

    Bogdan Sobczak; Robert Rink; Rafał Kuczyński; Robert Trębski

    2014-01-01

    Fast-valving assists in maintaining system stability following a severe transmission system fault by reducing the turbine mechanical power. Fast-valving consists in rapid closing and opening of steam valves in an adequate manner to reduce the generator accelerating power following the recognition of a severe fault. FV can be an effective and economical method of meeting the performance requirements of a power system in the presence of an increase in wind and solar generation in the power syst...

  15. Intrinsic Motivation.

    Science.gov (United States)

    Deci, Edward L.

    The paper draws together a wide variety of research which relates to the topic of intrinsic motivation; intrinsically motivated activities are defined as those which a person does for no apparent reward except the activity itself or the feelings which result from the activity. Most of this research was not originally reported within the framework…

  16. Fast and secure key distribution using mesoscopic coherent states of light

    International Nuclear Information System (INIS)

    Barbosa, Geraldo A.

    2003-01-01

    This work shows how two parties A and B can securely share unlimited sequences of random bits at optical speeds. A and B possess true-random physical sources and exchange random bits by using a random sequence received to cipher the following one to be sent. A starting shared secret key is used and the method can be described as a one-time-pad unlimited extender. It is demonstrated that the minimum probability of error in signal determination by the eavesdropper can be set arbitrarily close to the pure guessing level. Being based on the M-ry encryption protocol this method also allows for optical amplification without security degradation, offering practical advantages over the Bennett-Brassard 1984 protocol for key distribution

  17. Fast forward for the United Nations. Human security becomes a unifying force

    International Nuclear Information System (INIS)

    Annan, Kofi

    2005-01-01

    This paper speaks about the author's vision of a safer world and a better United Nations. The global threats of our age include terrorism, deadly weapons, genocide, infectious disease, poverty, environmental degradation and organized crime. They will not wait for States to sort out their differences. That is why we must act now to strengthen our collective defences. We must unite to master today's threats, and not allow them to divide and master us. And I submit that the only universal instrument that can bring States together in such a global effort is the United Nations. One must acknowledge that the United Nations is not perfect. At times, it shows its age. But our world will not easily find a better instrument for forging a sustained, global response to today's threats. We must use it to unite around common priorities - and act on them. And we must agree on a plan to reform the United Nations - and get on with the job of implementing it. This message lies at the heart of the recent report, A More Secure World: Our Shared Responsibility. It is the work of the Panel of 16 men and women from around the world I appointed last year. The report contains a powerful vision of collective security. Whether the threat is terrorism or AIDS, a threat to one is a threat to all. Our defences are only as strong as their weakest link. We will be safest if we work together

  18. Fast track land reform, tenure security and investments in soil conservation: Micro-evidence from Mazowe district in Zimbabwe

    NARCIS (Netherlands)

    Zikhali, P.

    2010-01-01

    The government of Zimbabwe launched the Fast Track Land Reform Programme (FTLRP) in 2000 as part of its ongoing land reform and resettlement programme which aims to address a racially skewed land distribution. Its goal has been to accelerate both land acquisition and redistribution, targeting at

  19. DTIC Review: Biometric Security

    National Research Council Canada - National Science Library

    2007-01-01

    ...: Biometrics, the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits, is a critical tool used in law enforcement, computer security and homeland defense...

  20. Status report on the Small Secure Transportable Autonomous Reactor (SSTAR) /Lead-cooled Fast Reactor (LFR) and supporting research and development.

    Energy Technology Data Exchange (ETDEWEB)

    Sienicki, J. J.; Moisseytsev, A.; Yang, W. S.; Wade, D. C.; Nikiforova, A.; Hanania, P.; Ryu, H. J.; Kulesza, K. P.; Kim, S. J.; Halsey, W. G.; Smith, C. F.; Brown, N. W.; Greenspan, E.; de Caro, M.; Li, N.; Hosemann, P.; Zhang, J.; Yu, H.; Nuclear Engineering Division; LLNL; LANL; Massachusetts Inst. of Tech.; Ecole des Mines de Paris; Oregon State Univ.; Univ.of California at Berkley

    2008-06-23

    This report provides an update on development of a pre-conceptual design for the Small Secure Transportable Autonomous Reactor (SSTAR) Lead-Cooled Fast Reactor (LFR) plant concept and supporting research and development activities. SSTAR is a small, 20 MWe (45 MWt), natural circulation, fast reactor plant for international deployment concept incorporating proliferation resistance for deployment in non-fuel cycle states and developing nations, fissile self-sufficiency for efficient utilization of uranium resources, autonomous load following making it suitable for small or immature grid applications, and a high degree of passive safety further supporting deployment in developing nations. In FY 2006, improvements have been made at ANL to the pre-conceptual design of both the reactor system and the energy converter which incorporates a supercritical carbon dioxide Brayton cycle providing higher plant efficiency (44 %) and improved economic competitiveness. The supercritical CO2 Brayton cycle technology is also applicable to Sodium-Cooled Fast Reactors providing the same benefits. One key accomplishment has been the development of a control strategy for automatic control of the supercritical CO2 Brayton cycle in principle enabling autonomous load following over the full power range between nominal and essentially zero power. Under autonomous load following operation, the reactor core power adjusts itself to equal the heat removal from the reactor system to the power converter through the large reactivity feedback of the fast spectrum core without the need for motion of control rods, while the automatic control of the power converter matches the heat removal from the reactor to the grid load. The report includes early calculations for an international benchmarking problem for a LBE-cooled, nitride-fueled fast reactor core organized by the IAEA as part of a Coordinated Research Project on Small Reactors without Onsite Refueling; the calculations use the same neutronics

  1. The fast reactor

    International Nuclear Information System (INIS)

    1980-02-01

    The subject is discussed as follows: brief description of fast reactors; advantage in conserving uranium resources; experience, in UK and elsewhere, in fast reactor design, construction and operation; safety; production of plutonium, security aspects; consideration of future UK fast reactor programme. (U.K.)

  2. Strong intrinsic motivation

    OpenAIRE

    Dessi, Roberta; Rustichini, Aldo

    2015-01-01

    A large literature in psychology, and more recently in economics, has argued that monetary rewards can reduce intrinsic motivation. We investigate whether the negative impact persists when intrinsic motivation is strong, and test this hypothesis experimentally focusing on the motivation to undertake interesting and challenging tasks, informative about individual ability. We find that this type of task can generate strong intrinsic motivation, that is impervious to the effect of monetary incen...

  3. Intrinsic-density functionals

    International Nuclear Information System (INIS)

    Engel, J.

    2007-01-01

    The Hohenberg-Kohn theorem and Kohn-Sham procedure are extended to functionals of the localized intrinsic density of a self-bound system such as a nucleus. After defining the intrinsic-density functional, we modify the usual Kohn-Sham procedure slightly to evaluate the mean-field approximation to the functional, and carefully describe the construction of the leading corrections for a system of fermions in one dimension with a spin-degeneracy equal to the number of particles N. Despite the fact that the corrections are complicated and nonlocal, we are able to construct a local Skyrme-like intrinsic-density functional that, while different from the exact functional, shares with it a minimum value equal to the exact ground-state energy at the exact ground-state intrinsic density, to next-to-leading order in 1/N. We briefly discuss implications for real Skyrme functionals

  4. Intrinsic Time Quantum Geometrodynamics

    OpenAIRE

    Ita III, Eyo Eyo; Soo, Chopin; Yu, Hoi-Lai

    2015-01-01

    Quantum Geometrodynamics with intrinsic time development and momentric variables is presented. An underlying SU(3) group structure at each spatial point regulates the theory. The intrinsic time behavior of the theory is analyzed, together with its ground state and primordial quantum fluctuations. Cotton-York potential dominates at early times when the universe was small; the ground state naturally resolves Penrose's Weyl Curvature Hypothesis, and thermodynamic and gravitational `arrows of tim...

  5. Intrinsic contractures of the hand.

    Science.gov (United States)

    Paksima, Nader; Besh, Basil R

    2012-02-01

    Contractures of the intrinsic muscles of the fingers disrupt the delicate and complex balance of intrinsic and extrinsic muscles, which allows the hand to be so versatile and functional. The loss of muscle function primarily affects the interphalangeal joints but also may affect etacarpophalangeal joints. The resulting clinical picture is often termed, intrinsic contracture or intrinsic-plus hand. Disruption of the balance between intrinsic and extrinsic muscles has many causes and may be secondary to changes within the intrinsic musculature or the tendon unit. This article reviews diagnosis, etiology, and treatment algorithms in the management of intrinsic contractures of the fingers. Copyright © 2012 Elsevier Inc. All rights reserved.

  6. FAST: FAST Analysis of Sequences Toolbox

    Directory of Open Access Journals (Sweden)

    Travis J. Lawrence

    2015-05-01

    Full Text Available FAST (FAST Analysis of Sequences Toolbox provides simple, powerful open source command-line tools to filter, transform, annotate and analyze biological sequence data. Modeled after the GNU (GNU’s Not Unix Textutils such as grep, cut, and tr, FAST tools such as fasgrep, fascut, and fastr make it easy to rapidly prototype expressive bioinformatic workflows in a compact and generic command vocabulary. Compact combinatorial encoding of data workflows with FAST commands can simplify the documentation and reproducibility of bioinformatic protocols, supporting better transparency in biological data science. Interface self-consistency and conformity with conventions of GNU, Matlab, Perl, BioPerl, R and GenBank help make FAST easy and rewarding to learn. FAST automates numerical, taxonomic, and text-based sorting, selection and transformation of sequence records and alignment sites based on content, index ranges, descriptive tags, annotated features, and in-line calculated analytics, including composition and codon usage. Automated content- and feature-based extraction of sites and support for molecular population genetic statistics makes FAST useful for molecular evolutionary analysis. FAST is portable, easy to install and secure thanks to the relative maturity of its Perl and BioPerl foundations, with stable releases posted to CPAN. Development as well as a publicly accessible Cookbook and Wiki are available on the FAST GitHub repository at https://github.com/tlawrence3/FAST. The default data exchange format in FAST is Multi-FastA (specifically, a restriction of BioPerl FastA format. Sanger and Illumina 1.8+ FastQ formatted files are also supported. FAST makes it easier for non-programmer biologists to interactively investigate and control biological data at the speed of thought.

  7. Predicting Intrinsic Motivation

    Science.gov (United States)

    Martens, Rob; Kirschner, Paul A.

    2004-01-01

    Intrinsic motivation can be predicted from participants' perceptions of the social environment and the task environment (Ryan & Deci, 2000)in terms of control, relatedness and competence. To determine the degree of independence of these factors 251 students in higher vocational education (physiotherapy and hotel management) indicated the…

  8. VMware view security essentials

    CERN Document Server

    Langenhan, Daniel

    2013-01-01

    A practical and fast-paced guide that gives you all the information you need to secure your virtual environment.This book is a ""how-to"" for the novice, a ""reference guide"" for the advanced user, and a ""go to"" for the experienced user in all the aspects of VMware View desktop virtualization security.

  9. Concepts of intrinsic safety

    International Nuclear Information System (INIS)

    Anon.

    1985-01-01

    A newly introduced Japanese reactor concept, ISER (Intrinsically Safe and Economical Reactor), is intended to be a reference intrinsically safe light water reactor. ISER is designed similarly to PIUS but with greater economy in mind such that any utility in any country can choose it for its power system. Social assimilation and acceptability in the Asia Pacific Region including the United States are the keys to the ISER with the hope of dramatic reductions of social costs due to safeguards, reliability, financiability, and infrastructure building, particularly in the third world, as well as reactor safety itself. In this respect and others, the ISER proposal is different from other vendor-proposed reactor concepts and is unique

  10. Intrinsic and extrinsic mortality reunited

    DEFF Research Database (Denmark)

    Koopman, Jacob J E; Wensink, Maarten J; Rozing, Maarten P

    2015-01-01

    Intrinsic and extrinsic mortality are often separated in order to understand and measure aging. Intrinsic mortality is assumed to be a result of aging and to increase over age, whereas extrinsic mortality is assumed to be a result of environmental hazards and be constant over age. However......, allegedly intrinsic and extrinsic mortality have an exponentially increasing age pattern in common. Theories of aging assert that a combination of intrinsic and extrinsic stressors underlies the increasing risk of death. Epidemiological and biological data support that the control of intrinsic as well...... as extrinsic stressors can alleviate the aging process. We argue that aging and death can be better explained by the interaction of intrinsic and extrinsic stressors than by classifying mortality itself as being either intrinsic or extrinsic. Recognition of the tight interaction between intrinsic and extrinsic...

  11. Protein intrinsic disorder in plants.

    Science.gov (United States)

    Pazos, Florencio; Pietrosemoli, Natalia; García-Martín, Juan A; Solano, Roberto

    2013-09-12

    To some extent contradicting the classical paradigm of the relationship between protein 3D structure and function, now it is clear that large portions of the proteomes, especially in higher organisms, lack a fixed structure and still perform very important functions. Proteins completely or partially unstructured in their native (functional) form are involved in key cellular processes underlain by complex networks of protein interactions. The intrinsic conformational flexibility of these disordered proteins allows them to bind multiple partners in transient interactions of high specificity and low affinity. In concordance, in plants this type of proteins has been found in processes requiring these complex and versatile interaction networks. These include transcription factor networks, where disordered proteins act as integrators of different signals or link different transcription factor subnetworks due to their ability to interact (in many cases simultaneously) with different partners. Similarly, they also serve as signal integrators in signaling cascades, such as those related to response to external stimuli. Disordered proteins have also been found in plants in many stress-response processes, acting as protein chaperones or protecting other cellular components and structures. In plants, it is especially important to have complex and versatile networks able to quickly and efficiently respond to changing environmental conditions since these organisms cannot escape and have no other choice than adapting to them. Consequently, protein disorder can play an especially important role in plants, providing them with a fast mechanism to obtain complex, interconnected and versatile molecular networks.

  12. Protein intrinsic disorder in plants

    Directory of Open Access Journals (Sweden)

    Florencio ePazos

    2013-09-01

    Full Text Available To some extent contradicting the classical paradigm of the relationship between protein 3D structure and function, now it is clear that large portions of the proteomes, especially in higher organisms, lack a fixed structure and still perform very important functions. Proteins completely or partially unstructured in their native (functional form are involved in key cellular processes underlain by complex networks of protein interactions. The intrinsic conformational flexibility of these disordered proteins allows them to bind multiple partners in transient interactions of high specificity and low affinity. In concordance, in plants this type of proteins has been found in processes requiring these complex and versatile interaction networks. These include transcription factor networks, where disordered proteins act as integrators of different signals or link different transcription factor subnetworks due to their ability to interact (in many cases simultaneously with different partners. Similarly, they also serve as signal integrators in signalling cascades, such as those related to response to external stimuli. Disordered proteins have also been found in plants in many stress-response processes, acting as protein chaperones or protecting other cellular components and structures. In plants, it is especially important to have complex and versatile networks able to quickly and efficiently respond to changing environmental conditions since these organisms can not escape and have no other choice than adapting to them. Consequently, protein disorder can play an especially important role in plants, providing them with a fast mechanism to obtain complex, interconnected and versatile molecular networks.

  13. Intrinsic superspin Hall current

    Science.gov (United States)

    Linder, Jacob; Amundsen, Morten; Risinggârd, Vetle

    2017-09-01

    We discover an intrinsic superspin Hall current: an injected charge supercurrent in a Josephson junction containing heavy normal metals and a ferromagnet generates a transverse spin supercurrent. There is no accompanying dissipation of energy, in contrast to the conventional spin Hall effect. The physical origin of the effect is an antisymmetric spin density induced among transverse modes ky near the interface of the superconductor arising due to the coexistence of p -wave and conventional s -wave superconducting correlations with a belonging phase mismatch. Our predictions can be tested in hybrid structures including thin heavy metal layers combined with strong ferromagnets and ordinary s -wave superconductors.

  14. Assessing and managing security risk in IT systems a structured methodology

    CERN Document Server

    McCumber, John

    2004-01-01

    SECURITY CONCEPTSUsing ModelsIntroduction: Understanding, Selecting, and Applying Models Understanding AssetsLayered Security Using Models in Security Security Models for Information Systems Shortcomings of Models in SecuritySecurity in Context Reference Defining Information SecurityConfidentiality, Integrity, and Availability Information AttributesIntrinsic versus Imputed Value Information as an Asset The Elements of Security Security Is Security Only in Context Information as an Asset Introduction Determining Value Managing Information Resources ReferencesUnderstanding Threat and Its Relatio

  15. Percentage of Fast-Track Receipts

    Data.gov (United States)

    Social Security Administration — The dataset provides the percentage of fast-track receipts by state during the reporting fiscal year. Fast-tracked cases consist of those cases identified as Quick...

  16. Fast neutrons dosimetry

    International Nuclear Information System (INIS)

    Rzyski, B.M.

    1977-01-01

    A proton recoil technique has been developed for inducing thermoluminescence with incident fast neutrons. CaF 2 was used as the TL phosphor, and cane sugar and polyethylene were used as proton radiators. The phosphor and the hydrogeneous material powders were well mixed, encapsulated in glass tubes and exposed to Am-Be sources, resulting in recoils from incident fast neutrons of energy between 0,25 and 11,25 MeV. The intrinsic response of pure CaF 2 to fast neutrons without a hydrogeneous radiator was checked by using LiF (TLD-700). Glow curves were recorded from room temperature up to 350 0 C after different doses of neutrons and gamma rays of 60 Co. First collision dose due to fast neutrons in tissue like materials such as cane sugar and polyethylene was also calculated [pt

  17. Intrinsic Chevrolets at the SSC

    International Nuclear Information System (INIS)

    Brodsky, S.J.; Collins, J.C.; Ellis, S.D.; Gunion, J.F.; Mueller, A.H.

    1984-01-01

    The possibility of the production at high energy of heavy quarks, supersymmetric particles and other large mass colored systems via the intrinsic twist-six components in the proton wave function is discussed. While the existing data do not rule out the possible relevance of intrinsic charm production at present energies, the extrapolation of such intrinsic contributions to very high masses and energies suggests that they will not play an important role at the SSC

  18. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  19. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  20. Intrinsic and extrinsic mortality reunited.

    Science.gov (United States)

    Koopman, Jacob J E; Wensink, Maarten J; Rozing, Maarten P; van Bodegom, David; Westendorp, Rudi G J

    2015-07-01

    Intrinsic and extrinsic mortality are often separated in order to understand and measure aging. Intrinsic mortality is assumed to be a result of aging and to increase over age, whereas extrinsic mortality is assumed to be a result of environmental hazards and be constant over age. However, allegedly intrinsic and extrinsic mortality have an exponentially increasing age pattern in common. Theories of aging assert that a combination of intrinsic and extrinsic stressors underlies the increasing risk of death. Epidemiological and biological data support that the control of intrinsic as well as extrinsic stressors can alleviate the aging process. We argue that aging and death can be better explained by the interaction of intrinsic and extrinsic stressors than by classifying mortality itself as being either intrinsic or extrinsic. Recognition of the tight interaction between intrinsic and extrinsic stressors in the causation of aging leads to the recognition that aging is not inevitable, but malleable through the environment. Copyright © 2015 Elsevier Inc. All rights reserved.

  1. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  2. Android Applications Security

    OpenAIRE

    Paul POCATILU

    2011-01-01

    The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the a...

  3. Fast beam radiofrequency spectroscopy

    International Nuclear Information System (INIS)

    Pipkin, F.M.

    1983-01-01

    The combination of a fast atom or ion beam derived from a small accelerator with radiofrequency spectroscopy methods provides a powerful method for measuring the fine structure of atomic and molecular systems. The fast beam makes possible measurements in which two separated oscillatory fields are used to obtain resonance lines whose widths are less than the natural line width due to the lifetimes of the states. The separated oscillatory field lines have, in addition, a number of features which make possible measurements with greater precision and less sensitivity to systematic errors. The fast beam also makes accessible multiple photon radiofrequency transitions whose line width is intrinsically narrower than that of the single photon transitions and which offer great potential for high precision measurements. This report focuses on the techniques and their promise. Recent measurements of the fine structure of H and He + are used as illustrations

  4. Health Security and Risk Aversion.

    Science.gov (United States)

    Herington, Jonathan

    2016-09-01

    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (i) that security is intrinsically valuable, (ii) that it is necessary for social planning and (iii) that it is an appropriate response to decision-making in contexts of very limited information. Striking the right balance between securing and maximizing population health thus requires a substantive, and hitherto unrecognized, value judgment. Finally, I critically evaluate the current health security agenda in light of this new account of the concept and its relationship to the other aims of public health policy. © 2016 John Wiley & Sons Ltd.

  5. A fast and reliable approach to simulating the output from an x-ray tube used for developing security backscatter imaging

    Science.gov (United States)

    Vella, A.; Munoz, A.; Healy, M. J. F.; Lane, D. W.; Lockley, D.; Zhou, J.

    2017-08-01

    The PENELOPE Monte Carlo simulation code was used alongside the SpekCalc code to simulate X-ray energy spectra from a VJ Technologies' X-ray generator at a range of anode voltages. The PENELOPE code is often utilised in medicine but is here applied to develop coded aperture and pinhole imaging systems for security purposes. The greater computational burden of PENELOPE over SpekCalc is warranted by its greater flexibility and output information. The model was designed using the PENGEOM sub-tool and consists of a tungsten anode and five layers of window materials. The photons generated by a mono-energetic electron beam are collected by a virtual detector placed after the last window layer, and this records the spatial, angular and energy distributions which are then used as the X-ray source for subsequent simulations. The process of storing X-ray outputs and using them as a virtual photon source can then be used efficiently for exploring a range of imaging conditions as the computationally expensive electron interactions in the anode need not be repeated. The modelled spectra were validated with experimentally determined spectra collected with an Amptek X-123 Cadmium Telluride detector placed in front of the source.

  6. Secure Fiberoptic Communications

    Science.gov (United States)

    Hodara, Henri

    At the heart of our current information explosion is the communication network. Networks are now an intrinsic part of our daily activities, whether they are for Internet business transactions or military communications in Future Combat Systems. Protection of this communication infrastructure is a must. In this article, we discuss two approaches for securing all-optical networks. The first is an optical encryption technique that denies the information to intruders. The second is an authentication scheme capable of detecting and identifying unauthorized users.

  7. Android Applications Security

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2011-01-01

    Full Text Available The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the architecture of a mobile security system for Android devices.

  8. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  9. Intrinsically Passive Handling and Grasping

    NARCIS (Netherlands)

    Stramigioli, Stefano; Scherpen, Jacquelien M.A.; Khodabandehloo, Koorosh

    2000-01-01

    The paper presents a control philosophy called Intrinsically Passive Control, which has the feature to properly behave during interaction with any passive objects. The controlled robot will never become unstable due to the physical structure of the controller.

  10. Audit Teknologiinformasiatas Physical Security Control Dan Logical Security Control Serta Penentuan Kondisi Security Risk Studi Kasus: PT Talc Indonesia

    OpenAIRE

    Inggrid; Arfianti, Rizka I; Utami, Viany

    2009-01-01

    Abstract The fast growth of technology has an impact to the accounting field. This relates to the term of information technology (17) auditing. One of the risI6 of using information technology in business which can be fatal enough i fignored is security risk Security risk can be reduced by security controls which include physical security control and logical security contra Information technology auditing is the process of collecting and evaluating evidence to determine whether or not a co...

  11. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  12. Intrinsic thermal expansion of crystal defects

    International Nuclear Information System (INIS)

    Ganne, J.-P.

    1981-02-01

    Although the phenomenon of thermal expansion has long been known, the intrinsic thermal expansion coefficient (ITEC) βsub(d) of a point defect, derived from its formation volume vsub(d), has never been measured directly. The differential dilatometer by interferometry built by ASTY and GILDER is described. It has allowed βsub(d) to be measured for several defects. Vacancies and small interstitial loops were produced in aluminium by low temperature (20 K) fast neutron irradiation followed by an anneal up to the beginning of stage III (160 K). The very high value of the measured ratio βsub(d)/β 0 (12+-4) is comparable with a lattice statics calculated (42) value (11.5 0 [fr

  13. Intrinsic shapes of discy and boxy ellipticals

    International Nuclear Information System (INIS)

    Fasano, Giovanni

    1991-01-01

    Statistical tests for intrinsic shapes of elliptical galaxies have given so far inconclusive and sometimes contradictory results. These failures have been often charged to the fact that classical tests consider only the two axisymmetric shapes (oblate versus prolate), while ellipticals are truly triaxial bodies. On the other hand, recent analyses indicate that the class of elliptical galaxies could be a mixture of (at least) two families having different morphology and dynamical behaviour: (i) a family of fast-rotating, disc-like ellipticals (discy); (ii) a family of slow-rotating, box-shaped ellipticals (boxy). In this paper we review the tests for instrinsic shapes of elliptical galaxies using data of better quality (CCD) with respect to previous applications. (author)

  14. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  15. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  16. Fast and secure retrieval of DNA sequences

    NARCIS (Netherlands)

    2014-01-01

    Sequence models are retrieved from a sequences index. The sequence models model DNA or RNA sequences stored in a database, and each comprises a finite memory tree source model and parameters for the finite memory tree source model. One or more DNA or RNA sequences stored in the database are

  17. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  18. Intrinsic Motivation in Physical Education

    Science.gov (United States)

    Davies, Benjamin; Nambiar, Nathan; Hemphill, Caroline; Devietti, Elizabeth; Massengale, Alexandra; McCredie, Patrick

    2015-01-01

    This article describes ways in which educators can use Harter's perceived competence motivation theory, the achievement goal theory, and self-determination theory to develop students' intrinsic motivation to maintain physical fitness, as demonstrated by the Sound Body Sound Mind curriculum and proven effective by the 2013 University of…

  19. Acoustic resonance spectroscopy intrinsic seals

    International Nuclear Information System (INIS)

    Olinger, C.T.; Burr, T.; Vnuk, D.R.

    1994-01-01

    We have begun to quantify the ability of acoustic resonance spectroscopy (ARS) to detect the removal and replacement of the lid of a simulated special nuclear materials drum. Conceptually, the acoustic spectrum of a container establishcs a baseline fingerprint, which we refer to as an intrinsic seal, for the container. Simply removing and replacing the lid changes some of the resonant frequencies because it is impossible to exactly duplicate all of the stress patterns between the lid and container. Preliminary qualitative results suggested that the ARS intrinsic seal could discriminate between cases where a lid has or has not been removed. The present work is directed at quantifying the utility of the ARS intrinsic seal technique, including the technique's sensitivity to ''nuisance'' effects, such as temperature swings, movement of the container, and placement of the transducers. These early quantitative tests support the potential of the ARS intrinsic seal application, but also reveal a possible sensitivity to nuisance effects that could limit environments or conditions under which the technique is effective

  20. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  1. Fast reactors and problems in their development. Chapter 6

    International Nuclear Information System (INIS)

    Dombey, N.

    1980-01-01

    The main differences between fast reactors, in particular the liquid-metal fast breeder reactor (LMFBR), and thermal reactors are discussed. The view is taken, based on the intrinsic physics of the systems, that fast reactors should be considered as a different genus from thermal reactors. Some conclusions are drawn for fast reactor development generally and for the British programme in particular. Physics, economics and safety aspects are covered. (U.K.)

  2. Direct measurement of the intrinsic ankle stiffness during standing.

    Science.gov (United States)

    Vlutters, M; Boonstra, T A; Schouten, A C; van der Kooij, H

    2015-05-01

    Ankle stiffness contributes to standing balance, counteracting the destabilizing effect of gravity. The ankle stiffness together with the compliance between the foot and the support surface make up the ankle-foot stiffness, which is relevant to quiet standing. The contribution of the intrinsic ankle-foot stiffness to balance, and the ankle-foot stiffness amplitude dependency remain a topic of debate in the literature. We therefore developed an experimental protocol to directly measure the bilateral intrinsic ankle-foot stiffness during standing balance, and determine its amplitude dependency. By applying fast (40 ms) ramp-and-hold support surface rotations (0.005-0.08 rad) during standing, reflexive contributions could be excluded, and the amplitude dependency of the intrinsic ankle-foot stiffness was investigated. Results showed that reflexive activity could not have biased the torque used for estimating the intrinsic stiffness. Furthermore, subjects required less recovery action to restore balance after bilateral rotations in opposite directions compared to rotations in the same direction. The intrinsic ankle-foot stiffness appears insufficient to ensure balance, ranging from 0.93±0.09 to 0.44±0.06 (normalized to critical stiffness 'mgh'). This implies that changes in muscle activation are required to maintain balance. The non-linear stiffness decrease with increasing rotation amplitude supports the previous published research. With the proposed method reflexive effects can be ruled out from the measured torque without any model assumptions, allowing direct estimation of intrinsic stiffness during standing. Copyright © 2015 Elsevier Ltd. All rights reserved.

  3. Moving towards Cloud Security

    OpenAIRE

    Edit Szilvia Rubóczki; Zoltán Rajnai

    2015-01-01

    Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment th...

  4. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  5. Intrinsic disorder here, there, and everywhere, and nowhere to escape from it.

    Science.gov (United States)

    Uversky, Vladimir N

    2017-09-01

    The concept of protein intrinsic disorder persistently penetrates into all areas of modern protein science. It cannot be ignored anymore, and cannot be shrugged off, as it represents a vital feature (or, more correctly, a broad spectrum of important features), which, when added to and mixed with features arising from the well established protein structure-function paradigm, complete the picture of a functioning protein. The field of protein intrinsic disorder is very dynamic and fast developing. This Multi-Author Review represents a snapshot of this field by introducing some recent advances. Articles assembled in this Multi-Author Review introduce some of the new aspects of intrinsic disorder, outline some fascinating ideas related to the intrinsically disordered proteins, their structure, and functionality, and show challenges related to the analysis of proteins carrying intrinsic disorder.

  6. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  7. Protecting livelihoods, boosting food security in Kenya | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2015-05-21

    May 21, 2015 ... Protecting livelihoods, boosting food security in Kenya ... America, and the Caribbean with funds from the Government of Canada's fast-start financing. ... Water management and food security in vulnerable regions of China.

  8. Exploiting intrinsic fluctuations to identify model parameters.

    Science.gov (United States)

    Zimmer, Christoph; Sahle, Sven; Pahle, Jürgen

    2015-04-01

    Parameterisation of kinetic models plays a central role in computational systems biology. Besides the lack of experimental data of high enough quality, some of the biggest challenges here are identification issues. Model parameters can be structurally non-identifiable because of functional relationships. Noise in measured data is usually considered to be a nuisance for parameter estimation. However, it turns out that intrinsic fluctuations in particle numbers can make parameters identifiable that were previously non-identifiable. The authors present a method to identify model parameters that are structurally non-identifiable in a deterministic framework. The method takes time course recordings of biochemical systems in steady state or transient state as input. Often a functional relationship between parameters presents itself by a one-dimensional manifold in parameter space containing parameter sets of optimal goodness. Although the system's behaviour cannot be distinguished on this manifold in a deterministic framework it might be distinguishable in a stochastic modelling framework. Their method exploits this by using an objective function that includes a measure for fluctuations in particle numbers. They show on three example models, immigration-death, gene expression and Epo-EpoReceptor interaction, that this resolves the non-identifiability even in the case of measurement noise with known amplitude. The method is applied to partially observed recordings of biochemical systems with measurement noise. It is simple to implement and it is usually very fast to compute. This optimisation can be realised in a classical or Bayesian fashion.

  9. The fast encryption package

    Science.gov (United States)

    Bishop, Matt

    1988-01-01

    The organization of some tools to help improve passwork security at a UNIX-based site is described along with how to install and use them. These tools and their associated library enable a site to force users to pick reasonably safe passwords (safe being site configurable) and to enable site management to try to crack existing passworks. The library contains various versions of a very fast implementation of the Data Encryption Standard and of the one-way encryption functions used to encryp the password.

  10. Intrinsic stability of technical superconductors

    International Nuclear Information System (INIS)

    Veringa, H.J.

    1981-10-01

    For the operation of technical superconductors under high current density conditions, the superconducting wires composing high current cables should be intrinsically stabilized. In this report the various important stability criteria are derived and investigated on their validity. An experimental set up is made to check the occurrence of magnetic instabilities if the different applicable criteria are violated. It is found that the observed instabilities can be predicted on the basis of the model given in this report. Production of high current cables based upon composites made by the ECN technique seems to be possible. (Auth.)

  11. Nuclear Filtering of Intrinsic Charm

    International Nuclear Information System (INIS)

    Kopeliovich, B. Z.; Potashnikova, I. K.; Schmidt, Ivan

    2010-01-01

    Nuclei are transparent for a heavy intrinsic charm (IC) component of the beam hadrons, what leads to an enhanced nuclear dependence of open charm production at large Feynman x F . Indeed, such an effect is supported by data from the SELEX experiment published recently [1]. Our calculations reproduce well the data, providing strong support for the presence of IC in hadrons in amount less than 1%. Moreover, we performed an analysis of nuclear effects in J/Ψ production and found at large x F a similar, albeit weaker effect, which does not contradict data.

  12. Symmetries of collective models in intrinsic frame

    International Nuclear Information System (INIS)

    Gozdz, A.; Pedrak, A.; Szulerecka, A.; Dobrowolski, A.; Dudek, J.

    2013-01-01

    In the paper a very general definition of intrinsic frame, by means of group theoretical methods, is introduced. It allows to analyze nuclear properties which are invariant in respect to the group which defines the intrinsic frame. For example, nuclear shape is a well determined feature in the intrinsic frame defined by the Euclidean group. It is shown that using of intrinsic frame gives an opportunity to consider intrinsic nuclear symmetries which are independent of symmetries observed in the laboratory frame. An importance of the notion of partial symmetries is emphasized. (author)

  13. Intrinsic cylindrical and spherical waves

    International Nuclear Information System (INIS)

    Ludlow, I K

    2008-01-01

    Intrinsic waveforms associated with cylindrical and spherical Bessel functions are obtained by eliminating the factors responsible for the inverse radius and inverse square radius laws of wave power per unit area of wavefront. The resulting expressions are Riccati-Bessel functions for both cases and these can be written in terms of amplitude and phase functions of order v and wave variable z. When z is real, it is shown that a spatial phase angle of the intrinsic wave can be defined and this, together with its amplitude function, is systematically investigated for a range of fixed orders and varying z. The derivatives of Riccati-Bessel functions are also examined. All the component functions exhibit different behaviour in the near field depending on the order being less than, equal to or greater than 1/2. Plots of the phase angle can be used to display the locations of the zeros of the general Riccati-Bessel functions and lead to new relations concerning the ordering of the real zeros of Bessel functions and the occurrence of multiple zeros when the argument of the Bessel function is fixed

  14. LFR safety features through intrinsic negative reactivity feedbacks

    International Nuclear Information System (INIS)

    Grasso, Giacomo

    2012-01-01

    The safety of Lead-cooled Fast Reactors can rely on intrinsic features such as: • the impossibility of Lead boiling, hence the unreliability of core (only) voiding; • the buoyancy of Control Rods in Lead, allowing their safe positioning also below the active region. For heightening the safety features of LFRs in safety analyses it could be required to approach the evaluation of the reactivity coefficients from a more physical point of view, including more elementary mechanisms, each one related to the proper driving temperature

  15. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  16. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  17. Intrinsic irreversibility in quantum theory

    International Nuclear Information System (INIS)

    Prigogine, I.; Petrosky, T.Y.

    1987-01-01

    Quantum theory has a dual structure: while solutions of the Schroedinger equation evolve in a deterministic and time reversible way, measurement introduces irreversibility and stochasticity. This presents a contrast to Bohr-Sommerfeld-Einstein theory, in which transitions between quantum states are associated with spontaneous and induced transitions, defined in terms of stochastic processes. A new form of quantum theory is presented here, which contains an intrinsic form of irreversibility, independent of observation. This new form applies to situations corresponding to a continuous spectrum and to quantum states with finite life time. The usual non-commutative algebra associated to quantum theory is replaced by more general algebra, in which operators are also non-distributive. Our approach leads to a number of predictions, which hopefully may be verified or refuted in the next years. (orig.)

  18. Intrinsic rotation with gyrokinetic models

    International Nuclear Information System (INIS)

    Parra, Felix I.; Barnes, Michael; Catto, Peter J.; Calvo, Iván

    2012-01-01

    The generation of intrinsic rotation by turbulence and neoclassical effects in tokamaks is considered. To obtain the complex dependences observed in experiments, it is necessary to have a model of the radial flux of momentum that redistributes the momentum within the tokamak in the absence of a preexisting velocity. When the lowest order gyrokinetic formulation is used, a symmetry of the model precludes this possibility, making small effects in the gyroradius over scale length expansion necessary. These effects that are usually small become important for momentum transport because the symmetry of the lowest order gyrokinetic formulation leads to the cancellation of the lowest order momentum flux. The accuracy to which the gyrokinetic equation needs to be obtained to retain all the physically relevant effects is discussed.

  19. Fast reactors

    International Nuclear Information System (INIS)

    Vasile, A.

    2001-01-01

    Fast reactors have capacities to spare uranium natural resources by their breeding property and to propose solutions to the management of radioactive wastes by limiting the inventory of heavy nuclei. This article highlights the role that fast reactors could play for reducing the radiotoxicity of wastes. The conversion of 238 U into 239 Pu by neutron capture is more efficient in fast reactors than in light water reactors. In fast reactors multi-recycling of U + Pu leads to fissioning up to 95% of the initial fuel ( 238 U + 235 U). 2 strategies have been studied to burn actinides: - the multi-recycling of heavy nuclei is made inside the fuel element (homogeneous option); - the unique recycling is made in special irradiation targets placed inside the core or at its surroundings (heterogeneous option). Simulations have shown that, for the same amount of energy produced (400 TWhe), the mass of transuranium elements (Pu + Np + Am + Cm) sent to waste disposal is 60,9 Kg in the homogeneous option and 204.4 Kg in the heterogeneous option. Experimental programs are carried out in Phenix and BOR60 reactors in order to study the feasibility of such strategies. (A.C.)

  20. Fast ejendom

    DEFF Research Database (Denmark)

    Pagh, Peter

    Bogen omfatter en gennemgang af lovgivning, praksis og teori vedrørende køb af fast ejendom og offentligretlig og privatretlig regulering. Bogen belyser bl.a. de privatretlige emner: købers misligholdelsesbeføjelser, servitutter, naboret, hævd og erstatningsansvar for miljøskader samt den...

  1. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  2. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  3. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  4. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  5. Experiences matter: Positive emotions facilitate intrinsic motivation

    OpenAIRE

    Løvoll, Helga Synnevåg; Røysamb, Espen; Vittersø, Joar

    2017-01-01

    This paper has two major aims. First, to investigate how positive emotions and intrinsic motivation affect each other over time. Second, to test the effect of positive emotions and intrinsic motivation on subsequent educational choices. Through two ordinary study semesters, 64 sport students in Norway reported on their intrinsic motivation for outdoor activities (twice) as well as positive emotions after two three-day outdoor events (four times). Next autumn, students study choice was collect...

  6. Experiences matter: Positive emotions facilitate intrinsic motivation

    OpenAIRE

    Løvoll, Helga Synnevåg; Røysamb, Espen; Vittersø, Joar

    2017-01-01

    https://doi.org/10.1080/23311908.2017.1340083 This paper has two major aims. First, to investigate how positive emotions and intrinsic motivation affect each other over time. Second, to test the effect of positive emotions and intrinsic motivation on subsequent educational choices. Through two ordinary study semesters, 64 sport students in Norway reported on their intrinsic motivation for outdoor activities (twice) as well as positive emotions after two three-day outdoor e...

  7. Intrinsic and extrinsic geometry of random surfaces

    International Nuclear Information System (INIS)

    Jonsson, T.

    1992-01-01

    We prove that the extrinsic Hausdorff dimension is always greater than or equal to the intrinsic Hausdorff dimension in models of triangulated random surfaces with action which is quadratic in the separation of vertices. We furthermore derive a few naive scaling relations which relate the intrinsic Hausdorff dimension to other critical exponents. These relations suggest that the intrinsic Hausdorff dimension is infinite if the susceptibility does not diverge at the critical point. (orig.)

  8. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  9. Incentives and intrinsic motivation in healthcare

    Directory of Open Access Journals (Sweden)

    Mikel Berdud

    2016-11-01

    Conclusions: The conclusions could act as a guide to support the optimal design of incentive policies and schemes within health organisations when healthcare professionals are intrinsically motivated.

  10. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  11. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  12. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  13. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  14. Geochemical indicators of intrinsic bioremediation

    International Nuclear Information System (INIS)

    Borden, R.C.; Gomez, C.A.; Becker, M.T.

    1995-01-01

    A detailed field investigation has been completed at a gasoline-contaminated aquifer near Rocky Point, NC, to examine possible indicators of intrinsic bioremediation and identify factors that may significantly influence the rae and extent of bioremediation. The dissolved plume of benzene, toluene, ethylbenzene, and xylene (BTEX) in ground water is naturally degrading. Toluene and o-xylene are most rapidly degraded followed by m-, p-xylene, and benzene. Ethylbenzene appears to degrade very slowly under anaerobic conditions present in the center of the plume. The rate and extent of biodegradation appears to be strongly influenced by the type and quantity of electron acceptors present in the aquifer. At the upgradient edge of the plume, nitrate, ferric iron, and oxygen are used as terminal electron acceptors during hydrocarbon biodegradation. The equivalent of 40 to 50 mg/l of hydrocarbon is degraded based on the increase in dissolved CO 2 relative to background ground water. Immediately downgradient of the source area, sulfate and iron are the dominant electron acceptors. Toluene and o-xylene are rapidly removed in this region. Once the available oxygen, nitrate, and sulfate are consumed, biodegradation is limited and appears to be controlled by mixing and aerobic biodegradation at the plume fringes

  15. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  16. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  17. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  18. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  19. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  20. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  1. Intrinsic bioremediation of landfills interim report

    Energy Technology Data Exchange (ETDEWEB)

    Brigmon, R.L. [Westinghouse Savannah River Company, Aiken, SC (United States); Fliermans, C.B.

    1997-07-14

    Intrinsic bioremediation is a risk management option that relies on natural biological and physical processes to contain the spread of contamination from a source. Evidence is presented in this report that intrinsic bioremediation is occurring at the Sanitary Landfill is fundamental to support incorportion into a Corrective Action Plan (CAP).

  2. Expressing intrinsic volumes as rotational integrals

    DEFF Research Database (Denmark)

    Auneau, Jeremy Michel; Jensen, Eva Bjørn Vedel

    2010-01-01

    A new rotational formula of Crofton type is derived for intrinsic volumes of a compact subset of positive reach. The formula provides a functional defined on the section of X with a j-dimensional linear subspace with rotational average equal to the intrinsic volumes of X. Simplified forms of the ...

  3. Differential scanning microcalorimetry of intrinsically disordered proteins.

    Science.gov (United States)

    Permyakov, Sergei E

    2012-01-01

    Ultrasensitive differential scanning calorimetry (DSC) is an indispensable thermophysical technique enabling to get direct information on enthalpies accompanying heating/cooling of dilute biopolymer solutions. The thermal dependence of protein heat capacity extracted from DSC data is a valuable source of information on intrinsic disorder level of a protein. Application details and limitations of DSC technique in exploration of protein intrinsic disorder are described.

  4. Intrinsic bioremediation of landfills interim report

    International Nuclear Information System (INIS)

    Brigmon, R.L.; Fliermans, C.B.

    1997-01-01

    Intrinsic bioremediation is a risk management option that relies on natural biological and physical processes to contain the spread of contamination from a source. Evidence is presented in this report that intrinsic bioremediation is occurring at the Sanitary Landfill is fundamental to support incorportion into a Corrective Action Plan (CAP)

  5. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  6. High-speed true random number generation based on paired memristors for security electronics

    Science.gov (United States)

    Zhang, Teng; Yin, Minghui; Xu, Changmin; Lu, Xiayan; Sun, Xinhao; Yang, Yuchao; Huang, Ru

    2017-11-01

    True random number generator (TRNG) is a critical component in hardware security that is increasingly important in the era of mobile computing and internet of things. Here we demonstrate a TRNG using intrinsic variation of memristors as a natural source of entropy that is otherwise undesirable in most applications. The random bits were produced by cyclically switching a pair of tantalum oxide based memristors and comparing their resistance values in the off state, taking advantage of the more pronounced resistance variation compared with that in the on state. Using an alternating read scheme in the designed TRNG circuit, the unbiasedness of the random numbers was significantly improved, and the bitstream passed standard randomness tests. The Pt/TaO x /Ta memristors fabricated in this work have fast programming/erasing speeds of ˜30 ns, suggesting a high random number throughput. The approach proposed here thus holds great promise for physically-implemented random number generation.

  7. Fast tomosynthesis

    International Nuclear Information System (INIS)

    Klotz, E.; Linde, R.; Tiemens, U.; Weiss, H.

    1978-01-01

    A system has been constructed for fast tomosynthesis, whereby X-ray photographs are made of a single layer of an object. Twenty five X-ray tubes illuminate the object simultaneously at different angles. The resulting coded image is decoded by projecting it with a pattern of lenses that have the same form as the pattern of X-ray tubes. The coded image is optically correlated with the pattern of the sources. The scale of this can be adjusted so that the desired layer of the object is portrayed. Experimental results of its use in a hospital are presented. (C.F.)

  8. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  9. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  10. Defining intrinsic vs. extrinsic atopic dermatitis.

    Science.gov (United States)

    Karimkhani, Chante; Silverberg, Jonathan I; Dellavalle, Robert P

    2015-06-16

    Atopic dermatitis (AD) is a chronic, relapsing inflammatory skin condition characterized by eczematous lesions, i.e. ill-demarcated erythematous patches and plaques. AD is commonly associated with elevated immunoglobulin E (IgE) and atopic disorders, such as asthma, hay fever, and food allergies. Rackemann and Mallory were some of the first to distinguish between asthma based on the presence ("extrinsic") or absence ("intrinsic") of allergy. This distinction has subsequently been applied to AD based on the presence ("extrinsic") or absence ("intrinsic") of increased IgE and atopic disease. Although the distinction between intrinsic and extrinsic AD is widely used, it remains controversial.

  11. Algebraic description of intrinsic modes in nuclei

    International Nuclear Information System (INIS)

    Leviatan, A.

    1989-01-01

    We present a procedure for extracting normal modes in algebraic number-conserving systems of interacting bosons relevant for collective states in even-even nuclei. The Hamiltonian is resolved into intrinsic (bandhead related) and collective (in-band related) parts. Shape parameters are introduced through non-spherical boson bases. Intrinsic modes decoupled from the spurious modes are obtained from the intinsic part of the Hamiltonian in the limit of large number of bosons. Intrinsic states are constructed and serve to evaluate electromagnetic transition rates. The method is illustrated for systems with one type of boson as well as with proton-neutron bosons. 28 refs., 1 fig

  12. Intrinsic neuromodulation: altering neuronal circuits from within.

    Science.gov (United States)

    Katz, P S; Frost, W N

    1996-02-01

    There are two sources of neuromodulation for neuronal circuits: extrinsic inputs and intrinsic components of the circuits themselves. Extrinsic neuromodulation is known to be pervasive in nervous systems, but intrinsic neuromodulation is less recognized, despite the fact that it has now been demonstrated in sensory and neuromuscular circuits and in central pattern generators. By its nature, intrinsic neuromodulation produces local changes in neuronal computation, whereas extrinsic neuromodulation can cause global changes, often affecting many circuits simultaneously. Studies in a number of systems are defining the different properties of these two forms of neuromodulation.

  13. Intrinsic Tunneling in Phase Separated Manganites

    Science.gov (United States)

    Singh-Bhalla, G.; Selcuk, S.; Dhakal, T.; Biswas, A.; Hebard, A. F.

    2009-02-01

    We present evidence of direct electron tunneling across intrinsic insulating regions in submicrometer wide bridges of the phase-separated ferromagnet (La,Pr,Ca)MnO3. Upon cooling below the Curie temperature, a predominantly ferromagnetic supercooled state persists where tunneling across the intrinsic tunnel barriers (ITBs) results in metastable, temperature-independent, high-resistance plateaus over a large range of temperatures. Upon application of a magnetic field, our data reveal that the ITBs are extinguished resulting in sharp, colossal, low-field resistance drops. Our results compare well to theoretical predictions of magnetic domain walls coinciding with the intrinsic insulating phase.

  14. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  15. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  16. The Intrinsic Dynamics of Psychological Process

    NARCIS (Netherlands)

    Vallacher, Robin R.; van Geert, Paul; Nowak, Andrzej

    2015-01-01

    Psychological processes unfold on various timescales in accord with internally generated patterns. The intrinsic dynamism of psychological process is difficult to investigate using traditional methods emphasizing cause–effect relations, however, and therefore is rarely incorporated into social

  17. Original Paper Detecting Nosocomial Intrinsic Infections through ...

    African Journals Online (AJOL)

    2011-04-20

    Apr 20, 2011 ... surgical procedures as precursory to intrinsic infections and that bacterial pathogens found on wounds and endogenous ... University Teaching Hospital, Idi Araba, Lagos, ..... confirm reason for selective decontamination of the.

  18. Deuterium NMR, induced and intrinsic cholesteric lyomesophases

    International Nuclear Information System (INIS)

    Alcantara, M.R.

    1982-01-01

    Induced and intrinsic cholesteric lyotropic mesophases were studied. Induced cholesteric lyomesophases based on potassium laurate (KL) system, with small amounts of cholesterol added, were studied by deuterium NMR and by polarizing microscopy. Order profiles obtained from deuterium NMR of KL perdenderated chains in both induced cholesteric and normal mesophases were compared. The intrinsic cholesteric lyotropic mesophases were based on the amphiphile potassium N-lauroyl serinate (KLNS) in the resolved levo form. The study of the type I intrinsic cholesteric mesophase was made by optical microscopy under polarized light and the type II intrinsic cholesteric lyomesophase was characterized by deuterium NMR. The new texture was explained by the use of the theory of disclinations developed for thermotropic liquid crystals, specially for cholesteric type. (M.J.C.) [pt

  19. Intrinsic and extrinsic motivation for smoking cessation.

    Science.gov (United States)

    Curry, S; Wagner, E H; Grothaus, L C

    1990-06-01

    An intrinsic-extrinsic model of motivation for smoking cessation was evaluated with 2 samples (ns = 1.217 and 151) of smokers who requested self-help materials for smoking cessation. Exploratory and confirmatory principal components analysis on a 36-item Reasons for Quitting (RFQ) scale supported the intrinsic-extrinsic motivation distinction. A 4-factor model, with 2 intrinsic dimensions (concerns about health and desire for self-control) and 2 extrinsic dimensions (immediate reinforcement and social influence), was defined by 20 of the 36 RFQ items. The 20-item measure demonstrated moderate to high levels of internal consistency and convergent and discriminant validity. Logistic regression analyses indicated that smokers with higher levels of intrinsic relative to extrinsic motivation were more likely to achieve abstinence from smoking.

  20. Intrinsic endometriosis of ureter: a case report

    International Nuclear Information System (INIS)

    Hong, Myung Sun; Kim, Ho Chul; Yun, Ku Sup; Choi, Chul Soon; Bae, Sang Hoon; Kim, Sung Yong; Shin, Hyung Sik

    1995-01-01

    Endometriosis is a rare cause of an ureteral obstruction. We report a case of intrinsic ureteral endometriosis resulting in severe hydroureteronephrosis. The diagnosis of ureteral endometriosis may be considered in women with flank pain and ureteric obstruction within true pelvis

  1. Intrinsic endometriosis of ureter: a case report

    Energy Technology Data Exchange (ETDEWEB)

    Hong, Myung Sun; Kim, Ho Chul; Yun, Ku Sup; Choi, Chul Soon; Bae, Sang Hoon; Kim, Sung Yong; Shin, Hyung Sik [College of Medicine, Hallym University, Seoul (Korea, Republic of)

    1995-07-15

    Endometriosis is a rare cause of an ureteral obstruction. We report a case of intrinsic ureteral endometriosis resulting in severe hydroureteronephrosis. The diagnosis of ureteral endometriosis may be considered in women with flank pain and ureteric obstruction within true pelvis.

  2. Management Control, Intrinsic Motivation and Creativity

    OpenAIRE

    Gregersen, Mikkel Godt

    2017-01-01

    This thesis consists of a cape and three papers. The overall research question is: How can intrinsic motivation and management control coexist in a creative environment and how can coordination be possible in such a context? The cape ties together the research done in the three papers. It is divided into six sections. The first section introduces the concepts of intrinsic motivation, creativity and management control. This is followed by a section on management control in a ...

  3. Refining the intrinsic chimera flap: a review.

    Science.gov (United States)

    Agarwal, Jayant P; Agarwal, Shailesh; Adler, Neta; Gottlieb, Lawrence J

    2009-10-01

    Reconstruction of complex tissue deficiencies in which each missing component is in a different spatial relationship to each other can be particularly challenging, especially in patients with limited recipient vessels. The chimera flap design is uniquely suited to reconstruct these deformities. Chimera flaps have been previously defined in many ways with 2 main categories: prefabricated or intrinsic. Herein we attempt to clarify the definition of a true intrinsic chimeric flap and provide examples of how these constructs provide a method for reconstruction of complex defects. The versatility of the intrinsic chimera flap and its procurement from 7 different vascular systems is described. A clarification of the definition of a true intrinsic chimera flap is described. In addition, construction of flaps from the lateral femoral circumflex, deep circumflex iliac, inferior gluteal, peroneal, subscapular, thoracodorsal, and radial arterial systems is described to showcase the versatility of these chimera flaps. A true intrinsic chimera flap must consist of more than a single tissue type. Each of the tissue components receives its blood flow from separate vascular branches or perforators that are connected to a single vascular source. These vascular branches must be of appropriate length to allow for insetting with 3-dimensional spatial freedom. There are a multitude of sites from which true intrinsic chimera flaps may be harvested.

  4. Incentives and intrinsic motivation in healthcare.

    Science.gov (United States)

    Berdud, Mikel; Cabasés, Juan M; Nieto, Jorge

    It has been established in the literature that workers within public organisations are intrinsically motivated. This paper is an empirical study of the healthcare sector using methods of qualitative analysis research, which aims to answer the following hypotheses: 1) doctors are intrinsically motivated; 2) economic incentives and control policies may undermine doctors' intrinsic motivation; and 3) well-designed incentives may encourage doctors' intrinsic motivation. We conducted semi-structured interviews à-la-Bewley with 16 doctors from Navarre's Healthcare Service (Servicio Navarro de Salud-Osasunbidea), Spain. The questions were based on current theories of intrinsic motivation and incentives to test the hypotheses. Interviewees were allowed to respond openly without time constraints. Relevant information was selected, quantified and analysed by using the qualitative concepts of saturation and codification. The results seem to confirm the hypotheses. Evidence supporting hypotheses 1 and 2 was gathered from all interviewees, as well as indications of the validity of hypothesis 3 based on interviewees' proposals of incentives. The conclusions could act as a guide to support the optimal design of incentive policies and schemes within health organisations when healthcare professionals are intrinsically motivated. Copyright © 2016 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  5. The intrinsic resistome of bacterial pathogens.

    Science.gov (United States)

    Olivares, Jorge; Bernardini, Alejandra; Garcia-Leon, Guillermo; Corona, Fernando; B Sanchez, Maria; Martinez, Jose L

    2013-01-01

    Intrinsically resistant bacteria have emerged as a relevant health problem in the last years. Those bacterial species, several of them with an environmental origin, present naturally low-level susceptibility to several drugs. It has been proposed that intrinsic resistance is mainly the consequence of the impermeability of cellular envelopes, the activity of multidrug efflux pumps or the lack of appropriate targets for a given family of drugs. However, recently published articles indicate that the characteristic phenotype of susceptibility to antibiotics of a given bacterial species depends on the concerted activity of several elements, what has been named as intrinsic resistome. These determinants comprise not just classical resistance genes. Other elements, several of them involved in basic bacterial metabolic processes, are of relevance for the intrinsic resistance of bacterial pathogens. In the present review we analyze recent publications on the intrinsic resistomes of Escherichia coli and Pseudomonas aeruginosa. We present as well information on the role that global regulators of bacterial metabolism, as Crc from P. aeruginosa, may have on modulating bacterial susceptibility to antibiotics. Finally, we discuss the possibility of searching inhibitors of the intrinsic resistome in the aim of improving the activity of drugs currently in use for clinical practice.

  6. The intrinsic resistome of bacterial pathogens

    Directory of Open Access Journals (Sweden)

    Jorge Andrés Olivares Pacheco

    2013-04-01

    Full Text Available Intrinsically resistant bacteria have emerged as a relevant health problem in the last years. Those bacterial species, several of them with an environmental origin, present naturally a low-level susceptibility to several drugs. It has been proposed that intrinsic resistance is mainly the consequence of the impermeability of cellular envelopes, the activity of multidrug efflux pumps or the lack of appropriate targets for a given family of drugs. However, recently published articles indicate that the characteristic phenotype of susceptibility to antibiotics of a given bacterial species depends on the concerted activity of several elements, what has been named as intrinsic resistome. These determinants comprise not just classical resistance genes. Other elements, several of them involved in basic bacterial metabolic processes, are of relevance for the intrinsic resistance of bacterial pathogens. In the present review we analyse recent publications on the intrinsic resistomes of Escherichia coli and Pseudomonas aeruginosa. We present as well information on the role that global regulators of bacterial metabolism, as Crc from P. aeruginosa, may have on modulating bacterial susceptibility to antibiotics. Finally, we discuss the possibility of searching inhibitors of the intrinsic resistome in the aim of improving the activity of drugs currently in use for clinical practice.

  7. Intrinsic work function of molecular films

    International Nuclear Information System (INIS)

    Ivančo, Ján

    2012-01-01

    The electronic properties of molecular films are analysed with the consideration of the molecular orientation. The study demonstrates that surfaces of electroactive oligomeric molecular films can be classified—analogously to the elemental surfaces—by their intrinsic work functions. The intrinsic work function of molecular films is correlated with their ionisation energies; again, the behaviour is analogous to the correlation existing between the first ionisation energy of elements and the work function of the corresponding elemental surfaces. The proposed intrinsic work-function concept suggests that the mechanism for the energy-level alignment at the interfaces associated with molecular films is virtually controlled by work functions of materials brought into the contact. - Highlights: ► Molecular films exhibit their own (intrinsic) work function. ► Intrinsic work function is correlated with ionisation energy of molecular films. ► Intrinsic work function determines dipole at interface with a particular surface. ► Surface vacuum-level change upon film growth does not relate to interfacial dipole.

  8. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  9. Intrinsic mobility limit for anisotropic electron transport in Alq3.

    Science.gov (United States)

    Drew, A J; Pratt, F L; Hoppler, J; Schulz, L; Malik-Kumar, V; Morley, N A; Desai, P; Shakya, P; Kreouzis, T; Gillin, W P; Kim, K W; Dubroka, A; Scheuermann, R

    2008-03-21

    Muon spin relaxation has been used to probe the charge carrier motion in the molecular conductor Alq3 (tris[8-hydroxy-quinoline] aluminum). At 290 K, the magnetic field dependence of the muon spin relaxation corresponds to that expected for highly anisotropic intermolecular electron hopping. Intermolecular mobility in the fast hopping direction has been found to be 0.23+/-0.03 cm2 V-1 s(-1) in the absence of an electric- field gradient, increasing to 0.32+/-0.06 cm2 V-1 s(-1) in an electric field gradient of 1 MV m(-1). These intrinsic mobility values provide an estimate of the upper limit for mobility achievable in bulk material.

  10. The Carnegie Supernova Project: Intrinsic colors of type Ia supernovae

    Energy Technology Data Exchange (ETDEWEB)

    Burns, Christopher R.; Persson, S. E.; Freedman, Wendy L.; Madore, Barry F. [Observatories of the Carnegie Institution for Science, 813 Santa Barbara Street, Pasadena, CA 91101 (United States); Stritzinger, Maximilian; Contreras, Carlos [Department of Physics and Astronomy, Aarhus University, Ny Munkegade 120, DK-8000 Aarhus C (Denmark); Phillips, M. M.; Hsiao, E. Y.; Boldt, Luis; Campillay, Abdo; Castellón, Sergio; Morrell, Nidia; Salgado, Francisco [Carnegie Institution of Washington, Las Campanas Observatory, Colina El Pino, Casilla 601 (Chile); Folatelli, Gaston [Kavli Institute for the Physics and Mathematics of the Universe, Todai Institutes for Advanced Study, the University of Tokyo, 277-8583 Kashiwa (Japan); Suntzeff, Nicholas B. [George P. and Cynthia Woods Mitchell Institute for Fundamental Physics and Astronomy, Texas A and M University, Department of Physics and Astronomy, College Station, TX 77843 (United States)

    2014-07-01

    We present an updated analysis of the intrinsic colors of Type Ia supernova (SNe Ia) using the latest data release of the Carnegie Supernova Project. We introduce a new light-curve parameter very similar to stretch that is better suited for fast-declining events, and find that these peculiar types can be seen as extensions to the population of 'normal' SNe Ia. With a larger number of objects, an updated fit to the Lira relation is presented along with evidence for a dependence on the late-time slope of the B – V light-curves with stretch and color. Using the full wavelength range from u to H band, we place constraints on the reddening law for the sample as a whole and also for individual events/hosts based solely on the observed colors. The photometric data continue to favor low values of R{sub V} , though with large variations from event to event, indicating an intrinsic distribution. We confirm the findings of other groups that there appears to be a correlation between the derived reddening law, R{sub V} , and the color excess, E(B – V), such that larger E(B – V) tends to favor lower R{sub V} . The intrinsic u-band colors show a relatively large scatter that cannot be explained by variations in R{sub V} or by the Goobar power-law for circumstellar dust, but rather is correlated with spectroscopic features of the supernova and is therefore likely due to metallicity effects.

  11. The Carnegie Supernova Project: Intrinsic colors of type Ia supernovae

    International Nuclear Information System (INIS)

    Burns, Christopher R.; Persson, S. E.; Freedman, Wendy L.; Madore, Barry F.; Stritzinger, Maximilian; Contreras, Carlos; Phillips, M. M.; Hsiao, E. Y.; Boldt, Luis; Campillay, Abdo; Castellón, Sergio; Morrell, Nidia; Salgado, Francisco; Folatelli, Gaston; Suntzeff, Nicholas B.

    2014-01-01

    We present an updated analysis of the intrinsic colors of Type Ia supernova (SNe Ia) using the latest data release of the Carnegie Supernova Project. We introduce a new light-curve parameter very similar to stretch that is better suited for fast-declining events, and find that these peculiar types can be seen as extensions to the population of 'normal' SNe Ia. With a larger number of objects, an updated fit to the Lira relation is presented along with evidence for a dependence on the late-time slope of the B – V light-curves with stretch and color. Using the full wavelength range from u to H band, we place constraints on the reddening law for the sample as a whole and also for individual events/hosts based solely on the observed colors. The photometric data continue to favor low values of R V , though with large variations from event to event, indicating an intrinsic distribution. We confirm the findings of other groups that there appears to be a correlation between the derived reddening law, R V , and the color excess, E(B – V), such that larger E(B – V) tends to favor lower R V . The intrinsic u-band colors show a relatively large scatter that cannot be explained by variations in R V or by the Goobar power-law for circumstellar dust, but rather is correlated with spectroscopic features of the supernova and is therefore likely due to metallicity effects.

  12. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  13. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  14. Wearable Intrinsically Soft, Stretchable, Flexible Devices for Memories and Computing.

    Science.gov (United States)

    Rajan, Krishna; Garofalo, Erik; Chiolerio, Alessandro

    2018-01-27

    A recent trend in the development of high mass consumption electron devices is towards electronic textiles (e-textiles), smart wearable devices, smart clothes, and flexible or printable electronics. Intrinsically soft, stretchable, flexible, Wearable Memories and Computing devices (WMCs) bring us closer to sci-fi scenarios, where future electronic systems are totally integrated in our everyday outfits and help us in achieving a higher comfort level, interacting for us with other digital devices such as smartphones and domotics, or with analog devices, such as our brain/peripheral nervous system. WMC will enable each of us to contribute to open and big data systems as individual nodes, providing real-time information about physical and environmental parameters (including air pollution monitoring, sound and light pollution, chemical or radioactive fallout alert, network availability, and so on). Furthermore, WMC could be directly connected to human brain and enable extremely fast operation and unprecedented interface complexity, directly mapping the continuous states available to biological systems. This review focuses on recent advances in nanotechnology and materials science and pays particular attention to any result and promising technology to enable intrinsically soft, stretchable, flexible WMC.

  15. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  16. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  17. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  18. Entropy Squeezing in Coupled Field-Superconducting Charge Qubit with Intrinsic Decoherence

    Institute of Scientific and Technical Information of China (English)

    YAN Xue-Qun; SHAO Bin; ZOU Jian

    2007-01-01

    We investigate the entropy squeezing in the system of a superconducting charge qubit coupled to a single mode field. We find an exact solution of the Milburn equation for the system and discuss the influence of intrinsic decoherence on entropy squeezing. As a comparison, we also consider the variance squeezing. Our results show that in the absence of the intrinsic decoherence both entropy and variance squeezings have the same periodic properties of time,and occur at the same range of time. However, when the intrinsic decoherence is considered, we find that as the time going on the entropy squeezing disappears fast than the variance squeezing, there exists a range of time where entropy squeezing can occur but variance squeezing cannot.

  19. Digested disorder: Quarterly intrinsic disorder digest (July-August-September, 2013).

    Science.gov (United States)

    Reddy, Krishna D; DeForte, Shelly; Uversky, Vladimir N

    2014-01-01

    The current literature on intrinsically disordered proteins grows fast. To keep interested readers up to speed with this literature, we continue a "Digested Disorder" project and represent a new issue of reader's digest of the research papers and reviews on intrinsically disordered proteins. The only 2 criteria for inclusion in this digest are the publication date (a paper should be published within the covered time frame) and topic (a paper should be dedicated to any aspect of protein intrinsic disorder). The current digest issue covers papers published during the third quarter of 2013; i.e., during the period of June, July, and September of 2013. Similar to previous issues, the papers are grouped hierarchically by topics they cover, and for each of the included paper a short description is given on its major findings.

  20. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  1. A repeating fast radio burst.

    Science.gov (United States)

    Spitler, L G; Scholz, P; Hessels, J W T; Bogdanov, S; Brazier, A; Camilo, F; Chatterjee, S; Cordes, J M; Crawford, F; Deneva, J; Ferdman, R D; Freire, P C C; Kaspi, V M; Lazarus, P; Lynch, R; Madsen, E C; McLaughlin, M A; Patel, C; Ransom, S M; Seymour, A; Stairs, I H; Stappers, B W; van Leeuwen, J; Zhu, W W

    2016-03-10

    Fast radio bursts are millisecond-duration astronomical radio pulses of unknown physical origin that appear to come from extragalactic distances. Previous follow-up observations have failed to find additional bursts at the same dispersion measure (that is, the integrated column density of free electrons between source and telescope) and sky position as the original detections. The apparent non-repeating nature of these bursts has led to the suggestion that they originate in cataclysmic events. Here we report observations of ten additional bursts from the direction of the fast radio burst FRB 121102. These bursts have dispersion measures and sky positions consistent with the original burst. This unambiguously identifies FRB 121102 as repeating and demonstrates that its source survives the energetic events that cause the bursts. Additionally, the bursts from FRB 121102 show a wide range of spectral shapes that appear to be predominantly intrinsic to the source and which vary on timescales of minutes or less. Although there may be multiple physical origins for the population of fast radio bursts, these repeat bursts with high dispersion measure and variable spectra specifically seen from the direction of FRB 121102 support an origin in a young, highly magnetized, extragalactic neutron star.

  2. Fast Convolution Module (Fast Convolution Module)

    National Research Council Canada - National Science Library

    Bierens, L

    1997-01-01

    This report describes the design and realisation of a real-time range azimuth compression module, the so-called 'Fast Convolution Module', based on the fast convolution algorithm developed at TNO-FEL...

  3. Work security in a global economy.

    Science.gov (United States)

    Rosskam, Ellen

    2003-01-01

    Work security is a fundamental right of all working people. After World War II, the welfare state became an intrinsic part of the "Golden Age" of capitalism, in which universal prosperity seemed attainable. Workers' organizations frequently played a crucial role in policy decisions that promoted full employment, income stability, and equitable treatment of workers. Today's world order is quite different. Globalization in its present form is a major obstacle to work security. Globalization is not simply a market-driven phenomenon. It is a political and ideological movement that grants authority to capital over governments and labor. This transfer of authority hinders national efforts to promote work security and may impact the well-being of communities worldwide. In the absence of domestic autonomy, international labor standards are needed to protect social welfare. They should be geared toward curbing unemployment, poverty, and social exclusion in the global economy. The article looks at three initiatives to promote global work security.

  4. Intrinsic Risk Factors of Lateral Ankle Sprain: A Systematic Review and Meta-analysis.

    Science.gov (United States)

    Kobayashi, Takumi; Tanaka, Masashi; Shida, Masahiro

    2016-01-01

    Lateral ankle ligamentous sprain (LAS) is one of the most common injuries in recreational activities and competitive sports. Many studies have attempted to determine whether there are certain intrinsic factors that can predict LAS. However, no consensus has been reached on the predictive intrinsic factors. To identify the intrinsic risk factors of LAS by meta-analysis from data in randomized control trials and prospective cohort studies. A systematic computerized literature search of MEDLINE, CINAHL, ScienceDirect, SPORTDiscus, and Cochrane Register of Clinical Trials was performed. A computerized literature search from inception to January 2015 resulted in 1133 studies of the LAS intrinsic risk factors written in English. Systematic review. Level 4. The modified quality index was used to assess the quality of the design of the papers and the standardized mean difference was used as an index to pool included study outcomes. Eight articles were included in this systematic review. Meta-analysis results showed that body mass index, slow eccentric inversion strength, fast concentric plantar flexion strength, passive inversion joint position sense, and peroneus brevis reaction time correlated with LAS. Body mass index, slow eccentric inversion strength, fast concentric plantar flexion strength, passive inversion joint position sense, and the reaction time of the peroneus brevis were associated with significantly increased risk of LAS.

  5. Intrinsic and Extrinsic Neuromodulation of Olfactory Processing.

    Science.gov (United States)

    Lizbinski, Kristyn M; Dacks, Andrew M

    2017-01-01

    Neuromodulation is a ubiquitous feature of neural systems, allowing flexible, context specific control over network dynamics. Neuromodulation was first described in invertebrate motor systems and early work established a basic dichotomy for neuromodulation as having either an intrinsic origin (i.e., neurons that participate in network coding) or an extrinsic origin (i.e., neurons from independent networks). In this conceptual dichotomy, intrinsic sources of neuromodulation provide a "memory" by adjusting network dynamics based upon previous and ongoing activation of the network itself, while extrinsic neuromodulators provide the context of ongoing activity of other neural networks. Although this dichotomy has been thoroughly considered in motor systems, it has received far less attention in sensory systems. In this review, we discuss intrinsic and extrinsic modulation in the context of olfactory processing in invertebrate and vertebrate model systems. We begin by discussing presynaptic modulation of olfactory sensory neurons by local interneurons (LNs) as a mechanism for gain control based on ongoing network activation. We then discuss the cell-class specific effects of serotonergic centrifugal neurons on olfactory processing. Finally, we briefly discuss the integration of intrinsic and extrinsic neuromodulation (metamodulation) as an effective mechanism for exerting global control over olfactory network dynamics. The heterogeneous nature of neuromodulation is a recurring theme throughout this review as the effects of both intrinsic and extrinsic modulation are generally non-uniform.

  6. Hidden Structural Codes in Protein Intrinsic Disorder.

    Science.gov (United States)

    Borkosky, Silvia S; Camporeale, Gabriela; Chemes, Lucía B; Risso, Marikena; Noval, María Gabriela; Sánchez, Ignacio E; Alonso, Leonardo G; de Prat Gay, Gonzalo

    2017-10-17

    Intrinsic disorder is a major structural category in biology, accounting for more than 30% of coding regions across the domains of life, yet consists of conformational ensembles in equilibrium, a major challenge in protein chemistry. Anciently evolved papillomavirus genomes constitute an unparalleled case for sequence to structure-function correlation in cases in which there are no folded structures. E7, the major transforming oncoprotein of human papillomaviruses, is a paradigmatic example among the intrinsically disordered proteins. Analysis of a large number of sequences of the same viral protein allowed for the identification of a handful of residues with absolute conservation, scattered along the sequence of its N-terminal intrinsically disordered domain, which intriguingly are mostly leucine residues. Mutation of these led to a pronounced increase in both α-helix and β-sheet structural content, reflected by drastic effects on equilibrium propensities and oligomerization kinetics, and uncovers the existence of local structural elements that oppose canonical folding. These folding relays suggest the existence of yet undefined hidden structural codes behind intrinsic disorder in this model protein. Thus, evolution pinpoints conformational hot spots that could have not been identified by direct experimental methods for analyzing or perturbing the equilibrium of an intrinsically disordered protein ensemble.

  7. Intrinsic-extrinsic factors in sport motivation.

    Science.gov (United States)

    Pedersen, Darhl M

    2002-10-01

    Participants were 83 students (36 men and 47 women). 10 intrinsic-extrinsic factors involved in sport motivation were obtained. The factors were generated from items obtained from the participants rather than items from the experimenter. This was done to avoid the possible influence of preconceptions on the part of the experimenter regarding what the final dimensions may be. Obtained motivational factors were Social Reinforcement, Fringe Benefits, Fame and Fortune, External Forces, Proving Oneself, Social Benefits, Mental Enrichment, Expression of Self, Sense of Accomplishment, and Self-enhancement. Each factor was referred to an intrinsic-extrinsic dimension to describe its relative position on that dimension. The order of the factors as listed indicates increasing intrinsic motivation. i.e., the first four factors were rated in the extrinsic range, whereas the remaining six were rated to be in the intrinsic range. Next, the participants rated the extent to which each of the various factors was involved in their decision to participate in sport activities. The pattern of use of the motivational factors was the same for both sexes except that men indicated greater use of the Fringe Benefits factor. Overall, the more intrinsic a sport motivation factor was rated, the more likely it was to be rated as a factor in actual sport participation.

  8. Application of direct agglutination test (DAT) and fast agglutination screening test (FAST) for sero-diagnosis of visceral leishmaniasis in endemic area of Minas Gerais, Brazil

    NARCIS (Netherlands)

    Silva, Eduardo S.; Schoone, Gerard J.; Gontijo, Celia M. F.; Brazil, Reginaldo P.; Pacheco, Raquel S.; Schallig, Henk D. F. H.

    2005-01-01

    The direct agglutination test (DAT) has proved to be a very important sero-diagnostic tool combining high levels of intrinsic validity and ease of performance. Otherwise, fast agglutination screening test (FAST) utilises only one serum dilution making the test very suitable for the screening of

  9. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  10. Security-by-design handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  11. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  12. Securing Biometric Images using Reversible Watermarking

    OpenAIRE

    Thampi, Sabu M.; Jacob, Ann Jisma

    2011-01-01

    Biometric security is a fast growing area. Protecting biometric data is very important since it can be misused by attackers. In order to increase security of biometric data there are different methods in which watermarking is widely accepted. A more acceptable, new important development in this area is reversible watermarking in which the original image can be completely restored and the watermark can be retrieved. But reversible watermarking in biometrics is an understudied area. Reversible ...

  13. Genome-Wide Prediction of Intrinsic Disorder; Sequence Alignment of Intrinsically Disordered Proteins

    Science.gov (United States)

    Midic, Uros

    2012-01-01

    Intrinsic disorder (ID) is defined as a lack of stable tertiary and/or secondary structure under physiological conditions in vitro. Intrinsically disordered proteins (IDPs) are highly abundant in nature. IDPs possess a number of crucial biological functions, being involved in regulation, recognition, signaling and control, e.g. their functional…

  14. Intrinsic radioactivity of KSr2I5:Eu2+

    International Nuclear Information System (INIS)

    Rust, M.; Melcher, C.; Lukosi, E.

    2016-01-01

    A current need in nuclear security is an economical, yet high energy resolution (near 2%), scintillation detector suitable for gamma-ray spectroscopy. For current scintillators on the market, there is an inverse relationship between scintillator energy resolution and cost of production. A new promising scintillator, KSr 2 I 5 :Eu 2+ , under development at the University of Tennessee, has achieved an energy resolution of 2.4% at 662 keV at room temperature, with potential growth rates exceeding several millimeters per hour. However, the internal background due to the 40 K content could present a hurdle for effective source detection/identification in nuclear security applications. As a first step in addressing this question, this paper reports on a computational investigation of the intrinsic differential pulse height spectrum (DPHS) generated by 40 K within the KSr 2 I 5 :Eu 2+ scintillator as a function of crystal geometry. It was found that the DPHS remains relatively equal to a constant multiplicative factor of the negatron emission spectrum with a direct increase of the 1.46 MeV photopeak relative height to the negatron spectrum with volume. Further, peak pileup does not readily manifest itself for practical KSr 2 I 5 :Eu 2+ volumes.

  15. Flavor Structure of Intrinsic Nucleon Sea

    International Nuclear Information System (INIS)

    Peng, Jen-Chieh; Chang, Wen-Chen; Cheng, Hai-Yang; Liu, Keh-Fei

    2015-01-01

    The concept of intrinsic charm suggested by Brodsky et al. is extended to lighter quarks. Extraction of the intrinsic ū, d-macron, and s-macron seas is obtained from an analysis of the d-macron − ū, s + s-macron, and ū + d-macron − s −s-macron distributions. The connection between the intrinsic/extrinsic seas and the connected/disconnected seas in lattice QCD is also examined. It is shown that the connected and disconnected components for the ū(x) + d-macron(x) sea can be separated. The striking x-dependence of the [s(x) + s-macron(x)]/[ū(x) + d-macron(x)] ratio is interpreted as an interplay between the connected and disconnected seas. (author)

  16. Management Control, Intrinsic Motivation and Creativity

    DEFF Research Database (Denmark)

    Godt Gregersen, Mikkel

    This thesis consists of a cape and three papers. The overall research question is: How can intrinsic motivation and management control coexist in a creative environment and how can coordination be possible in such a context? The cape ties together the research done in the three papers....... It is divided into six sections. The first section introduces the concepts of intrinsic motivation, creativity and management control. This is followed by a section on management control in a creative context. These two sections frame the thesis and introduce the setting in which the research has been done...... of the conclusion is that intrinsic motivation and management control can coexist under the conditions that all three basic needs, i.e. autonomy, competence and relatedness, are supported. This can happen when control takes point of departure in the individual employee. The second part of the conclusion...

  17. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  18. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  19. A model of intrinsic symmetry breaking

    International Nuclear Information System (INIS)

    Ge, Li; Li, Sheng; George, Thomas F.; Sun, Xin

    2013-01-01

    Different from the symmetry breaking associated with a phase transition, which occurs when the controlling parameter is manipulated across a critical point, the symmetry breaking presented in this Letter does not need parameter manipulation. Instead, the system itself suddenly undergoes symmetry breaking at a certain time during its evolution, which is intrinsic symmetry breaking. Through a polymer model, it is revealed that the origin of the intrinsic symmetry breaking is nonlinearity, which produces instability at the instance when the evolution crosses an inflexion point, where this instability breaks the original symmetry

  20. Intrinsic viscosity of a suspension of cubes

    KAUST Repository

    Mallavajula, Rajesh K.

    2013-11-06

    We report on the viscosity of a dilute suspension of cube-shaped particles. Irrespective of the particle size, size distribution, and surface chemistry, we find empirically that cubes manifest an intrinsic viscosity [η]=3.1±0.2, which is substantially higher than the well-known value for spheres, [η]=2.5. The orientation-dependent intrinsic viscosity of cubic particles is determined theoretically using a finite-element solution of the Stokes equations. For isotropically oriented cubes, these calculations show [η]=3.1, in excellent agreement with our experimental observations. © 2013 American Physical Society.

  1. Improving Food and Nutrition Security in the Philippines through ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Improving food and nutrition security in the Philippines through school ... Implementation of the Community Health Assessment Program in the Philippines ... This project will address the effects of fast-paced economic growth in the Greater ...

  2. First results on fast baking

    Energy Technology Data Exchange (ETDEWEB)

    Visentin, B. [CEA-Saclay, DSM/DAPNIA/SACM - 91191 Gif/Yvette Cedex (France)]. E-mail: bvisentin@cea.fr; Gasser, Y. [CEA-Saclay, DSM/DAPNIA/SACM - 91191 Gif/Yvette Cedex (France); Charrier, J.P. [CEA-Saclay, DSM/DAPNIA/SACM - 91191 Gif/Yvette Cedex (France)

    2006-07-15

    High gradient performances of bulk niobium cavities go through a low-temperature baking during one or two days, the temperature parameter is adjusted in a narrow tuning range around 110 or 120deg, C. With such treatment, the intrinsic quality factor Q{sub 0} is improved at high fields. Assuming the oxygen diffusion is involved in this phenomenon, we have developed the 'fast baking' (145deg, C/3h) as an alternative method. Similar results have been achieved with this method compared to standard baking. Consequently, for the first time, a link between oxygen diffusion and high field Q-slope has been demonstrated. Furthermore, this method open the way to a simpler and better baking procedure for the large-scale cavity production due to:*time reduction and *possibility to combine baking and drying during cavity preparation.

  3. First results on fast baking

    International Nuclear Information System (INIS)

    Visentin, B.; Gasser, Y.; Charrier, J.P.

    2006-01-01

    High gradient performances of bulk niobium cavities go through a low-temperature baking during one or two days, the temperature parameter is adjusted in a narrow tuning range around 110 or 120deg, C. With such treatment, the intrinsic quality factor Q 0 is improved at high fields. Assuming the oxygen diffusion is involved in this phenomenon, we have developed the 'fast baking' (145deg, C/3h) as an alternative method. Similar results have been achieved with this method compared to standard baking. Consequently, for the first time, a link between oxygen diffusion and high field Q-slope has been demonstrated. Furthermore, this method open the way to a simpler and better baking procedure for the large-scale cavity production due to:*time reduction and *possibility to combine baking and drying during cavity preparation

  4. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  5. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  6. Organisational Learning and Employees' Intrinsic Motivation

    Science.gov (United States)

    Remedios, Richard; Boreham, Nick

    2004-01-01

    This study examined the effects of organisational learning initiatives on employee motivation. Four initiatives consistent with theories of organisational learning were a priori ranked in terms of concepts that underpin intrinsic-motivation theory. Eighteen employees in a UK petrochemical company were interviewed to ascertain their experiences of…

  7. Intrinsic Diophantine approximation on general polynomial surfaces

    DEFF Research Database (Denmark)

    Tiljeset, Morten Hein

    2017-01-01

    We study the Hausdorff measure and dimension of the set of intrinsically simultaneously -approximable points on a curve, surface, etc, given as a graph of integer polynomials. We obtain complete answers to these questions for algebraically “nice” manifolds. This generalizes earlier work done...

  8. Sex Differences, Positive Feedback and Intrinsic Motivation.

    Science.gov (United States)

    Deci, Edward L.; And Others

    The paper presents two experiments which test the "change in feelings of competence and self-determination" proposition of cognitive evaluation theory. This proposition states that when a person receives feedback about his performance on an intrinsically motivated activity this information will affect his sense of competence and…

  9. Intrinsic and Extrinsic Motivation among Collegiate Instrumentalists

    Science.gov (United States)

    Diaz, Frank M.

    2010-01-01

    The purpose of this study was to gather and compare information on measures of intrinsic and extrinsic motivation among instrumentalists enrolled in collegiate ensembles. A survey instrument was developed to gather information concerning demographic data and responses to questions on motivational preference. Participants were undergraduate and…

  10. Intrinsic intensity fluctuations in random lasers

    International Nuclear Information System (INIS)

    Molen, Karen L. van der; Mosk, Allard P.; Lagendijk, Ad

    2006-01-01

    We present a quantitative experimental and theoretical study of intensity fluctuations in the emitted light of a random laser that has different realizations of disorder for every pump pulse. A model that clarifies these intrinsic fluctuations is developed. We describe the output versus input power graphs of the random laser with an effective spontaneous emission factor (β factor)

  11. Intrinsic Motivation, Organizational Justice, and Creativity

    Science.gov (United States)

    Hannam, Kalli; Narayan, Anupama

    2015-01-01

    For employees to generate creative ideas that are not only original, but also useful to their company, they must interact with their workplace environment to determine organizational needs. Therefore, it is important to consider aspects of the individual as well as their environment when studying creativity. Intrinsic motivation, a predictor of…

  12. Intrinsically conductive polymer thin film piezoresistors

    DEFF Research Database (Denmark)

    Lillemose, Michael; Spieser, Martin; Christiansen, N.O.

    2008-01-01

    We report on the piezoresistive effect in the intrinsically conductive polymer, polyaniline. A process recipe for indirect patterning of thin film polyaniline has been developed. Using a specially designed chip, the polyaniline thin films have been characterised with respect to resistivity...

  13. LEADERSHIP STYLE AND EMPLOYEES' INTRINSIC JOB ...

    African Journals Online (AJOL)

    This study investigates the impact of leadership style on employees' intrinsic ... of many factors including motivation, leadership, job satisfaction, workers' alienation and ... Factors associated with job satisfaction include incentive to work, reward of ... advancement/promotion, recognition and self-actualization cannot be met ...

  14. Discovery of Intrinsic Primitives on Triangle Meshes

    KAUST Repository

    Solomon, Justin

    2011-04-01

    The discovery of meaningful parts of a shape is required for many geometry processing applications, such as parameterization, shape correspondence, and animation. It is natural to consider primitives such as spheres, cylinders and cones as the building blocks of shapes, and thus to discover parts by fitting such primitives to a given surface. This approach, however, will break down if primitive parts have undergone almost-isometric deformations, as is the case, for example, for articulated human models. We suggest that parts can be discovered instead by finding intrinsic primitives, which we define as parts that posses an approximate intrinsic symmetry. We employ the recently-developed method of computing discrete approximate Killing vector fields (AKVFs) to discover intrinsic primitives by investigating the relationship between the AKVFs of a composite object and the AKVFs of its parts. We show how to leverage this relationship with a standard clustering method to extract k intrinsic primitives and remaining asymmetric parts of a shape for a given k. We demonstrate the value of this approach for identifying the prominent symmetry generators of the parts of a given shape. Additionally, we show how our method can be modified slightly to segment an entire surface without marking asymmetric connecting regions and compare this approach to state-of-the-art methods using the Princeton Segmentation Benchmark. © 2011 The Author(s).

  15. Intrinsic Risk Factors of Falls in Elderly

    Directory of Open Access Journals (Sweden)

    Yasmin Amatullah

    2016-09-01

    Full Text Available Background: Falls are common geriatric problems. The risk factors of falls are the intrinsic and extrinsic risk factors. Studies on falls are scarcely conducted in Indonesia, especially in Bandung. Therefore, this study was conducted to identify the intrinsic risk factors of falls among elderly. Methods: A descriptive study was carried out from August to October 2013 at the Geriatric Clinic of Dr. Hasan Sadikin General Hospital Bandung. Fifty three participants were selected according to the inclusion and exclusion criteria using consecutive sampling. The determined variables in this study were classification of the risk of falls, demographic profile, history of falls, disease, and medications. After the selection, the participants were tested by Timed up-and-go test (TUGT. Moreover, an interview and analysis of medical records were carried out to discover the risk factors of falls. The collected data were analyzed and presented in the form of percentages shown in tables. Results: From 53 patients, women (35.66% were considered to have higher risk of fall than men (18.34%. The majority of patients (66% with the risk of fall were from the age group 60–74 years. The major diseases suffered by patients were hypertension, osteoarthritis and diabetes mellitus. Drugs that were widely used were antihypertensive drugs; analgesic and antipyretic drugs and antidiabetic drugs. Conclusions: There are various intrinsic risk factors of falls in elderly and each of the elderly has more than one intrinsic risk factor of falls.

  16. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  17. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  18. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  19. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  20. Fasting and rheumatic diseases

    OpenAIRE

    Mohammad Hassan Jokar

    2015-01-01

    Fasting is one of the important religious practices of Muslims, in which the individuals abstain from eating and drinking from dawn to sunset. Fasting is not obligatory or even not allowed, in case it causes health problems to the fasting individual. Rheumatic diseases are a major group of chronic diseases which can bring about numerous problems while fasting. The aim of this article is to review the impact of Islamic fasting on rheumatic patients, based on the scientific evidences.

  1. Encyclopedia of Information Ethics and Security

    OpenAIRE

    Reviewed by Yavuz AKBULUT

    2008-01-01

    233Rapid developments in information andcommunication technologies have created newsecurity threats along with ethical dilemmas. Thesedevelopments have been so fast that appropriatesecurity precautions and ethical codes fail to keeppace with the technological developments. In thisrespect, education of both professionals andordinary citizens regarding information technologyethics carries utmost importance. Encyclopedia ofInformation Ethics and Security serves as anauthentic and comprehensive r...

  2. Identifying the neural substrates of intrinsic motivation during task performance.

    Science.gov (United States)

    Lee, Woogul; Reeve, Johnmarshall

    2017-10-01

    Intrinsic motivation is the inherent tendency to seek out novelty and challenge, to explore and investigate, and to stretch and extend one's capacities. When people imagine performing intrinsically motivating tasks, they show heightened anterior insular cortex (AIC) activity. To fully explain the neural system of intrinsic motivation, however, requires assessing neural activity while people actually perform intrinsically motivating tasks (i.e., while answering curiosity-inducing questions or solving competence-enabling anagrams). Using event-related functional magnetic resonance imaging, we found that the neural system of intrinsic motivation involves not only AIC activity, but also striatum activity and, further, AIC-striatum functional interactions. These findings suggest that subjective feelings of intrinsic satisfaction (associated with AIC activations), reward processing (associated with striatum activations), and their interactions underlie the actual experience of intrinsic motivation. These neural findings are consistent with the conceptualization of intrinsic motivation as the pursuit and satisfaction of subjective feelings (interest and enjoyment) as intrinsic rewards.

  3. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  4. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  5. An introduction to information security and ISO27001:2013

    CERN Document Server

    Watkins, Steve

    2013-01-01

    Up to date with the latest version of the Standard (ISO27001:2013), An Introduction to information security and ISO27001:2013 is the perfect solution for anyone wanting an accurate, fast, easy-to-read primer on information security from an acknowledged expert on ISO27001.

  6. Rural social security for Zimbabwe: Challenges and opportunities for ...

    African Journals Online (AJOL)

    For them, the remaining sources of livelihood now reside in non-formal social security arrangements anchored upon a staggering cultural base being eroded by the fast encroaching tide of neoliberal individualistic ways of life. Regrettably, government has got no institutional framework to promote non-formal security ...

  7. Endpoint Security Using Biometric Authentication for Secure Remote Mission Operations

    Science.gov (United States)

    Donohue, John T.; Critchfield, Anna R.

    2000-01-01

    We propose a flexible security authentication solution for the spacecraft end-user, which will allow the user to interact over Internet with the spacecraft, its instruments, or with the ground segment from anywhere, anytime based on the user's pre-defined set of privileges. This package includes biometrics authentication products, such as face, voice or fingerprint recognition, authentication services and procedures, such as: user registration and verification over the Internet and user database maintenance, with a configurable schema of spacecraft users' privileges. This fast and reliable user authentication mechanism will become an integral part of end-to-end ground-to-space secure Internet communications and migration from current practice to the future. All modules and services of the proposed package are commercially available and built to the NIST BioAPI standard, which facilitates "pluggability" and interoperability.

  8. Seamless and secure communications over heterogeneous wireless networks

    CERN Document Server

    Cao, Jiannong

    2014-01-01

    This brief provides an overview of the requirements, challenges, design issues and major techniques for seamless and secure communications over heterogeneous wireless networks. It summarizes and provides detailed insights into the latest research on handoff management, mobility management, fast authentication and security management to support seamless and secure roaming for mobile clients. The reader will also learn about the challenges in developing relevant technologies and providing ubiquitous Internet access over heterogeneous wireless networks. The authors have extensive experience in im

  9. Functions of intrinsic disorder in transmembrane proteins

    DEFF Research Database (Denmark)

    Kjaergaard, Magnus; Kragelund, Birthe B.

    2017-01-01

    Intrinsic disorder is common in integral membrane proteins, particularly in the intracellular domains. Despite this observation, these domains are not always recognized as being disordered. In this review, we will discuss the biological functions of intrinsically disordered regions of membrane...... receptors. The functions of the disordered regions are many and varied. We will discuss selected examples including: (1) Organization of receptors, kinases, phosphatases and second messenger sources into signaling complexes. (2) Modulation of the membrane-embedded domain function by ball-and-chain like...... mechanisms. (3) Trafficking of membrane proteins. (4) Transient membrane associations. (5) Post-translational modifications most notably phosphorylation and (6) disorder-linked isoform dependent function. We finish the review by discussing the future challenges facing the membrane protein community regarding...

  10. Extrinsic and intrinsic curvatures in thermodynamic geometry

    Energy Technology Data Exchange (ETDEWEB)

    Hosseini Mansoori, Seyed Ali, E-mail: shossein@bu.edu [Department of Physics, Boston University, 590 Commonwealth Ave., Boston, MA 02215 (United States); Department of Physics, Isfahan University of Technology, Isfahan 84156-83111 (Iran, Islamic Republic of); Mirza, Behrouz, E-mail: b.mirza@cc.iut.ac.ir [Department of Physics, Isfahan University of Technology, Isfahan 84156-83111 (Iran, Islamic Republic of); Sharifian, Elham, E-mail: e.sharifian@ph.iut.ac.ir [Department of Physics, Isfahan University of Technology, Isfahan 84156-83111 (Iran, Islamic Republic of)

    2016-08-10

    We investigate the intrinsic and extrinsic curvatures of a certain hypersurface in thermodynamic geometry of a physical system and show that they contain useful thermodynamic information. For an anti-Reissner–Nordström-(A)de Sitter black hole (Phantom), the extrinsic curvature of a constant Q hypersurface has the same sign as the heat capacity around the phase transition points. The intrinsic curvature of the hypersurface can also be divergent at the critical points but has no information about the sign of the heat capacity. Our study explains the consistent relationship holding between the thermodynamic geometry of the KN-AdS black holes and those of the RN (J-zero hypersurface) and Kerr black holes (Q-zero hypersurface) ones [1]. This approach can easily be generalized to an arbitrary thermodynamic system.

  11. Extrinsic and intrinsic curvatures in thermodynamic geometry

    International Nuclear Information System (INIS)

    Hosseini Mansoori, Seyed Ali; Mirza, Behrouz; Sharifian, Elham

    2016-01-01

    We investigate the intrinsic and extrinsic curvatures of a certain hypersurface in thermodynamic geometry of a physical system and show that they contain useful thermodynamic information. For an anti-Reissner–Nordström-(A)de Sitter black hole (Phantom), the extrinsic curvature of a constant Q hypersurface has the same sign as the heat capacity around the phase transition points. The intrinsic curvature of the hypersurface can also be divergent at the critical points but has no information about the sign of the heat capacity. Our study explains the consistent relationship holding between the thermodynamic geometry of the KN-AdS black holes and those of the RN (J-zero hypersurface) and Kerr black holes (Q-zero hypersurface) ones [1]. This approach can easily be generalized to an arbitrary thermodynamic system.

  12. Does Aerobic Exercise Influence Intrinsic Brain Activity?

    DEFF Research Database (Denmark)

    Flodin, Pär; Jonasson, Lars S; Riklund, Katrin

    2017-01-01

    exercise group or an active control group. Both groups recieved supervised training, 3 days a week for 6 months. Multimodal brain imaging data was acquired before and after the intervention, including 10 min of resting state brain functional magnetic resonance imaging (rs-fMRI) and arterial spin labeling......Previous studies have indicated that aerobic exercise could reduce age related decline in cognition and brain functioning. Here we investigated the effects of aerobic exercise on intrinsic brain activity. Sixty sedentary healthy males and females (64-78 years) were randomized into either an aerobic...... group improved more. Contrary to our hypothesis, we did not observe any significant group by time interactions with regard to any measure of intrinsic activity. To further probe putative relationships between fitness and brain activity, we performed post hoc analyses disregarding group belongings...

  13. Survey of intrinsic states of light nuclei

    International Nuclear Information System (INIS)

    Brink, D.M.

    1975-01-01

    The resonating group method and the generator coordinate method are two closely related theories of nuclear structure which can be used to construct wave functions describing cluster structures. In both cases the form of the intrinsic state implies a selection of those degrees of freedom which are regarded as being important for the problem under consideration. The form of the intrinsic state also corresponds to a particular truncation of the shell model space. In the resonating group method the effect of the Pauli principle leads to forbidden or redundant states of relative motion of clusters. An improved understanding of the role of forbidden states in the theory has led to important advances in the phenomenological description of cluster structures in nuclei. 3 tables, 2 figures

  14. Excitonic terahertz photoconductivity in intrinsic semiconductor nanowires

    Science.gov (United States)

    Yan, Jie-Yun

    2018-06-01

    Excitonic terahertz photoconductivity in intrinsic semiconductor nanowires is studied. Based on the excitonic theory, the numerical method to calculate the photoconductivity spectrum in the nanowires is developed, which can simulate optical pump terahertz-probe spectroscopy measurements on real nanowires and thereby calculate the typical photoconductivity spectrum. With the help of the energetic structure deduced from the calculated linear absorption spectrum, the numerically observed shift of the resonant peak in the photoconductivity spectrum is found to result from the dominant exciton transition between excited or continuum states to the ground state, and the quantitative analysis is in good agreement with the quantum plasmon model. Besides, the dependence of the photoconductivity on the polarization of the terahertz field is also discussed. The numerical method and supporting theoretical analysis provide a new tool for experimentalists to understand the terahertz photoconductivity in intrinsic semiconductor nanowires at low temperatures or for nanowires subjected to below bandgap photoexcitation, where excitonic effects dominate.

  15. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  16. Structural design of intrinsically fluorescent oxysterols

    DEFF Research Database (Denmark)

    Nåbo, Lina J; Modzel, Maciej; Krishnan, Kathiresan

    2018-01-01

    Oxysterols are oxidized derivatives of cholesterol with many important biological functions. Trafficking of oxysterols in and between cells is not well studied, largely due to the lack of appropriate oxysterol analogs. Intrinsically fluorescent oxysterols present a new route towards direct...... observation of intracellular oxysterol trafficking by fluorescence microscopy. We characterize the fluorescence properties of the existing fluorescent 25-hydroxycholesterol analog 25-hydroxycholestatrienol, and propose a new probe with an extended conjugated system. The location of both probes inside...

  17. Intrinsic defects in ZnO varistors

    International Nuclear Information System (INIS)

    Mahan, G.D.

    1983-01-01

    Theoretical calculations are presented for equilibrium concentrations of zinc and oxygen vacancies in ZnO. Results are presented at the sintering temperature, and also at room temperature. Theoretical calculations of reaction constants show that the intrinsic donor is the oxygen vacancy, rather than the zinc interstitial. The depletion of vacancies in the surface region, as the ZnO is cooled from the sintering temperature, is also calculated. Homojunction effects which are caused by such depletion are shown to be small

  18. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  19. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  20. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  1. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  2. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  3. Intrinsic and extrinsic effects on image memorability.

    Science.gov (United States)

    Bylinskii, Zoya; Isola, Phillip; Bainbridge, Constance; Torralba, Antonio; Oliva, Aude

    2015-11-01

    Previous studies have identified that images carry the attribute of memorability, a predictive value of whether a novel image will be later remembered or forgotten. Here we investigate the interplay between intrinsic and extrinsic factors that affect image memorability. First, we find that intrinsic differences in memorability exist at a finer-grained scale than previously documented. Second, we test two extrinsic factors: image context and observer behavior. Building on prior findings that images that are distinct with respect to their context are better remembered, we propose an information-theoretic model of image distinctiveness. Our model can automatically predict how changes in context change the memorability of natural images. In addition to context, we study a second extrinsic factor: where an observer looks while memorizing an image. It turns out that eye movements provide additional information that can predict whether or not an image will be remembered, on a trial-by-trial basis. Together, by considering both intrinsic and extrinsic effects on memorability, we arrive at a more complete and fine-grained model of image memorability than previously available. Copyright © 2015 Elsevier Ltd. All rights reserved.

  4. Moral Distress, Workplace Health, and Intrinsic Harm.

    Science.gov (United States)

    Weber, Elijah

    2016-05-01

    Moral distress is now being recognized as a frequent experience for many health care providers, and there's good evidence that it has a negative impact on the health care work environment. However, contemporary discussions of moral distress have several problems. First, they tend to rely on inadequate characterizations of moral distress. As a result, subsequent investigations regarding the frequency and consequences of moral distress often proceed without a clear understanding of the phenomenon being discussed, and thereby risk substantially misrepresenting the nature, frequency, and possible consequences of moral distress. These discussions also minimize the intrinsically harmful aspects of moral distress. This is a serious omission. Moral distress doesn't just have a negative impact on the health care work environment; it also directly harms the one who experiences it. In this paper, I claim that these problems can be addressed by first clarifying our understanding of moral distress, and then identifying what makes moral distress intrinsically harmful. I begin by identifying three common mistakes that characterizations of moral distress tend to make, and explaining why these mistakes are problematic. Next, I offer an account of moral distress that avoids these mistakes. Then, I defend the claim that moral distress is intrinsically harmful to the subject who experiences it. I conclude by explaining how acknowledging this aspect of moral distress should reshape our discussions about how best to deal with this phenomenon. © 2015 John Wiley & Sons Ltd.

  5. Development of Food Security Information System Based on Business Intelligence in Food Security Agency, Ministry of Agriculture, Indonesia

    OpenAIRE

    Hendrawaty, Manise; Harisno, Harisno

    2014-01-01

    Food is the main basic need of human, because of that fulfillment of human need of food has to be fulfilled. So it can fulfill that need, then government institution, Food Security Agency (BKP) is formed so it can monitor fulfillment of food need of society. The goals of this writing are to develop food security information system that provides dashboard facility based on business intelligence, to develop food security information system that can give fast, precise and real time information a...

  6. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  7. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  8. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  9. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  10. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  11. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  12. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  13. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  14. HCUP Fast Stats

    Data.gov (United States)

    U.S. Department of Health & Human Services — HCUP Fast Stats provides easy access to the latest HCUP-based statistics for health information topics. HCUP Fast Stats uses visual statistical displays in...

  15. Fast food (image)

    Science.gov (United States)

    Fast foods are quick, reasonably priced, and readily available alternatives to home cooking. While convenient and economical for a busy lifestyle, fast foods are typically high in calories, fat, saturated fat, ...

  16. Fast food tips (image)

    Science.gov (United States)

    ... challenge to eat healthy when going to a fast food place. In general, avoiding items that are deep ... challenge to eat healthy when going to a fast food place. In general, avoiding items that are deep ...

  17. Crowding out intrinsic motivation in the public sector

    OpenAIRE

    Georgellis, Y; Iossa, E; Tabvuma, V

    2011-01-01

    Employing intrinsically motivated individuals has been proposed as a means of improving public sector performance. In this article, we investigate whether intrinsic motivation affects the sorting of employees between the private and the public sectors, paying particular attention to whether extrinsic rewards crowd out intrinsic motivation. Using British longitudinal data, we find that individuals are attracted to the public sector by the intrinsic rather than the extrinsic rewards that the se...

  18. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  19. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  20. Physiology of Ramadan fasting

    OpenAIRE

    Shokoufeh Bonakdaran

    2016-01-01

    Considering the emphasis of Islam on the importance of fasting, Muslims attempt to fast from dawn until sunset during the holy month of Ramadan. Fasting is associated with several benefits for normal and healthy individuals. However, it could pose high risks to the health of diabetic patients due to certain physiological changes. This study aimed to compare the physiological changes associated with fasting in healthy individuals and diabetic patients during Ramadan. Furthermore, we reviewed t...

  1. Intrinsic Motivation: An Overlooked Component for Student Success

    Science.gov (United States)

    Augustyniak, Robert A.; Ables, Adrienne Z.; Guilford, Philip; Lujan, Heidi L.; Cortright, Ronald N.; DiCarlo, Stephen E.

    2016-01-01

    Intrinsic motivation to learn involves engaging in learning opportunities because they are seen as enjoyable, interesting, or relevant to meeting one's core psychological needs. As a result, intrinsic motivation is associated with high levels of effort and task performance. Students with greater levels of intrinsic motivation demonstrate strong…

  2. Personalizing Sample Databases with Facebook Information to Increase Intrinsic Motivation

    Science.gov (United States)

    Marzo, Asier; Ardaiz, Oscar; Sanz de Acedo, María Teresa; Sanz de Acedo, María Luisa

    2017-01-01

    Motivation is fundamental for students to achieve successful and complete learning. Motivation can be extrinsic, i.e., driven by external rewards, or intrinsic, i.e., driven by internal factors. Intrinsic motivation is the most effective and must be inspired by the task at hand. Here, a novel strategy is presented to increase intrinsic motivation…

  3. Individualistic vs. Competitive Participation: The Effect on Intrinsic Motivation.

    Science.gov (United States)

    Jones, Brent M.; And Others

    Studies investigating intrinsic motivation and competition have supported the view that competition decreases intrinsic motivation. More recent studies suggest that the specific outcome of a competition (a win or a loss) differentially affects intrinsic motivation by highlighting the informational rather than the controlling aspect of the reward…

  4. Elements of the Competitive Situation That Affect Intrinsic Motivation.

    Science.gov (United States)

    Reeve, Johnmarshall; Deci, Edward L.

    1996-01-01

    Explores the effects of three elements of the competitive situation (competitive set, competitive outcome, and interpersonal context) on intrinsic motivation in a sample of college students (n=100). Competitive outcome and interpersonal context affected intrinsic motivation: winning increased intrinsic motivation, while pressured interpersonal…

  5. The value of nature: Economic, intrinsic, or both?

    Science.gov (United States)

    There has been a long standing argument that ecosystems have intrinsic value and therefore there is no need to put a price tag on Mother Nature. The concept of intrinsic value reflects the perspective that nature has value in its own right, independent of human uses. Intrinsic va...

  6. The prototype fast reactor

    International Nuclear Information System (INIS)

    Broomfield, A.M.

    1985-01-01

    The paper concerns the Prototype Fast Reactor (PFR), which is a liquid metal cooled fast reactor power station, situated at Dounreay, Scotland. The principal design features of a Fast Reactor and the PFR are given, along with key points of operating history, and health and safety features. The role of the PFR in the development programme for commercial reactors is discussed. (U.K.)

  7. Ramadan, fasting and pregnancy

    DEFF Research Database (Denmark)

    Ahmed, Urfan Zahoor; Lykke, Jacob Alexander

    2014-01-01

    In Islam, the month of Ramadan is a period of fasting lasting 29 or 30 days. Epidemiological studies among Muslims in Denmark have not been conducted, but studies show, that fasting among pregnant Muslim women is common. Fasting does not increase the risk of growth restriction or preterm delivery...

  8. Development of a security-by-design handbook

    International Nuclear Information System (INIS)

    Olson, David L.; Snell, Mark Kamerer; Iida, Toru; Ochiai, Kazuya; Tanuma, Koji

    2010-01-01

    There is an increasing awareness that efficient and effective nuclear facility design is best achieved when requirements from the 3S disciplines Safety, Safeguards, and Security - are balanced and intrinsic to the facility design. This can be achieved when policy, processes, methods, and technologies are understood and applied in these areas during all phases of the design process. For the purposes of this paper, Security-by-design will be defined as the system level incorporation of the physical protection system (PPS) into a new or retrofitted nuclear power plant (NPP) or nuclear facility (NF) resulting in intrinsic security. Security-by-design can also be viewed as a framework to achieve robust and durable security systems. This paper reports on work performed to date to create a Security-by-Design Handbook, under a bilateral agreement between the United States and Japan, specifically, a review of physical protection principles and best practices, and a decommissioning to better understand where these principles and practices can be applied. This paper describes physical protection principles and best practices to achieve security-by- design that were gathered from International, Japanese, and U.S. sources. Principles are included for achieving security early in the design process where security requirements are typically less costly and easier to incorporate. The paper then describes a generic design process that covers the entire facility lifecycle from scoping and planning of the project to decommissioning and decontamination. Early design process phases, such as conceptual design, offer opportunities to add security features intrinsic to the facility design itself. Later phases, including design engineering and construction, are important for properly integrating security features into a coherent design and for planning for and assuring the proper performance of the security system during the operation and decommissioning of the facility. The paper also

  9. Comprehensive large-scale assessment of intrinsic protein disorder.

    Science.gov (United States)

    Walsh, Ian; Giollo, Manuel; Di Domenico, Tomás; Ferrari, Carlo; Zimmermann, Olav; Tosatto, Silvio C E

    2015-01-15

    Intrinsically disordered regions are key for the function of numerous proteins. Due to the difficulties in experimental disorder characterization, many computational predictors have been developed with various disorder flavors. Their performance is generally measured on small sets mainly from experimentally solved structures, e.g. Protein Data Bank (PDB) chains. MobiDB has only recently started to collect disorder annotations from multiple experimental structures. MobiDB annotates disorder for UniProt sequences, allowing us to conduct the first large-scale assessment of fast disorder predictors on 25 833 different sequences with X-ray crystallographic structures. In addition to a comprehensive ranking of predictors, this analysis produced the following interesting observations. (i) The predictors cluster according to their disorder definition, with a consensus giving more confidence. (ii) Previous assessments appear over-reliant on data annotated at the PDB chain level and performance is lower on entire UniProt sequences. (iii) Long disordered regions are harder to predict. (iv) Depending on the structural and functional types of the proteins, differences in prediction performance of up to 10% are observed. The datasets are available from Web site at URL: http://mobidb.bio.unipd.it/lsd. Supplementary data are available at Bioinformatics online. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  10. Innate and intrinsic antiviral immunity in skin.

    Science.gov (United States)

    Kawamura, Tatsuyoshi; Ogawa, Youichi; Aoki, Rui; Shimada, Shinji

    2014-09-01

    As the body's most exposed interface with the environment, the skin is constantly challenged by potentially pathogenic microbes, including viruses. To sense the invading viruses, various types of cells resident in the skin express many different pattern-recognition receptors (PRRs) such as C-type lectin receptors (CLRs), Toll-like receptors (TLRs), nucleotide-binding oligomerization domain (NOD)-like receptors (NLRs), retinoic acid-inducible gene I (RIG-I)-like receptors (RLRs) and cytosolic DNA sensors, that can detect the pathogen-associated molecular patterns (PAMPs) of the viruses. The detection of viral PAMPs initiates two major innate immune signaling cascades: the first involves the activation of the downstream transcription factors, such as interferon regulatory factors (IRFs), nuclear factor kappa B (NF-κB) and activator protein 1 (AP-1), which cooperate to induce the transcription of type I interferons and pro-inflammatory cytokines. The second signaling pathway involves the caspase-1-mediated processing of IL-1β and IL-18 through the formation of an inflammasome complex. Cutaneous innate immunity including the production of the innate cytokines constitutes the first line of host defence that limits the virus dissemination from the skin, and also plays an important role in the activation of adaptive immune response, which represents the second line of defence. More recently, the third immunity "intrinsic immunity" has emerged, that provides an immediate and direct antiviral defense mediated by host intrinsic restriction factors. This review focuses on the recent advances regarding the antiviral immune systems, highlighting the innate and intrinsic immunity against the viral infections in the skin, and describes how viral components are recognized by cutaneous immune systems. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  11. The energy gap and the fast reactor

    International Nuclear Information System (INIS)

    Hill, J.

    1977-01-01

    The background to the development of fast reactors is summarized. In Britain, the results of the many experiments performed, the operation of the Dounreay Fast Reactor for the past 18 years and the first year's operation of the larger Prototype Fast Reactor have all been very encouraging, in that they demonstrated that the performance corresponded well with predictions, breeding is possible, and the system is exceptionally stable in operation. The next step in fast reactor engineering is to build a full-scale fast reactor power station. There would seem to be little reason to expect more trouble than could reasonably be expected in constructing any large project of this general nature. However, from an engineering point of view continuity of experience is required. If a decision to build a commercial fast reactor were taken today there would be a 14-year gap between strating this and the start of the Prototype Fast Reactor. This is already much too long. From an environmental standpoint we have to demonstrate that we can manufacture and reprocess fast reacctor fuel for a substantial programme in a way that does not lead to pollution of the environment, and that plutonium-containing fuel can be transported in the quantities required in safety and in a way that does not attract terrorists or require a private army to ensure its security. Finally, we have to find a way to allow many countries to obtain the energy they need from fast reactors, without leading to the proliferation of nuclear weapons or weapons capability. (author)

  12. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  13. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  14. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  15. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  16. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  17. Intrinsic and extrinsic neuromodulation of motor circuits.

    Science.gov (United States)

    Katz, P S

    1995-12-01

    Neuromodulation of motor circuits by extrinsic inputs provides enormous flexibility in the production of behavior. Recent work has shown that neurons intrinsic to central pattern-generating circuits can evoke neuromodulatory effects in addition to their neurotransmitting actions. Modulatory neurons often elicit a multitude of different effects attributable to actions at different receptors and/or through the release of co-transmitters. Differences in neuromodulation between species can account for differences in behavior. Modulation of neuromodulation may provide an additional level of flexibility to motor circuits.

  18. Symplectic Structure of Intrinsic Time Gravity

    Directory of Open Access Journals (Sweden)

    Eyo Eyo Ita

    2016-08-01

    Full Text Available The Poisson structure of intrinsic time gravity is analysed. With the starting point comprising a unimodular three-metric with traceless momentum, a trace-induced anomaly results upon quantization. This leads to a revision of the choice of momentum variable to the (mixed index traceless momentric. This latter choice unitarily implements the fundamental commutation relations, which now take on the form of an affine algebra with SU(3 Lie algebra amongst the momentric variables. The resulting relations unitarily implement tracelessness upon quantization. The associated Poisson brackets and Hamiltonian dynamics are studied.

  19. Ramadan, fasting and pregnancy

    DEFF Research Database (Denmark)

    Ahmed, Urfan Zahoor; Lykke, Jacob Alexander

    2014-01-01

    In Islam, the month of Ramadan is a period of fasting lasting 29 or 30 days. Epidemiological studies among Muslims in Denmark have not been conducted, but studies show, that fasting among pregnant Muslim women is common. Fasting does not increase the risk of growth restriction or preterm delivery......, but there are reports of decreased foetal movements. Furthermore, the fasting may have long-term health consequences for the offspring, especially when they reach their middle age. According to Islam and the interpretation, pregnant and breast-feeding women are allowed to postpone the fasting of the month of Ramadan...

  20. Ramadan, faste og graviditet

    DEFF Research Database (Denmark)

    Ahmed, Urfan Zahoor; Lykke, Jacob Alexander

    2014-01-01

    In Islam, the month of Ramadan is a period of fasting lasting 29 or 30 days. Epidemiological studies among Muslims in Denmark have not been conducted, but studies show, that fasting among pregnant Muslim women is common. Fasting does not increase the risk of growth restriction or preterm delivery......, but there are reports of decreased foetal movements. Furthermore, the fasting may have long-term health consequences for the offspring, especially when they reach their middle age. According to Islam and the interpretation, pregnant and breast-feeding women are allowed to postpone the fasting of the month of Ramadan...

  1. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  2. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  3. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  4. Securing XML Documents

    Directory of Open Access Journals (Sweden)

    Charles Shoniregun

    2004-11-01

    Full Text Available XML (extensible markup language is becoming the current standard for establishing interoperability on the Web. XML data are self-descriptive and syntax-extensible; this makes it very suitable for representation and exchange of semi-structured data, and allows users to define new elements for their specific applications. As a result, the number of documents incorporating this standard is continuously increasing over the Web. The processing of XML documents may require a traversal of all document structure and therefore, the cost could be very high. A strong demand for a means of efficient and effective XML processing has posed a new challenge for the database world. This paper discusses a fast and efficient indexing technique for XML documents, and introduces the XML graph numbering scheme. It can be used for indexing and securing graph structure of XML documents. This technique provides an efficient method to speed up XML data processing. Furthermore, the paper explores the classification of existing methods impact of query processing, and indexing.

  5. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  6. Distinct molecular signatures of mild extrinsic and intrinsic atopic dermatitis

    DEFF Research Database (Denmark)

    Martel, Britta Cathrina; Litman, Thomas; Hald, Andreas

    2016-01-01

    Atopic dermatitis (AD) is a common inflammatory skin disease with underlying defects in epidermal function and immune responses. In this study, we used microarray analysis to investigate differences in gene expression in lesional skin from patients with mild extrinsic or intrinsic AD compared...... with mild extrinsic and intrinsic AD similar to previous reports for severe AD. Interestingly, expression of genes involved in inflammatory responses in intrinsic AD resembled that of psoriasis more than that of extrinsic AD. Overall, differences in expression of inflammation-associated genes found among...... patients with mild intrinsic and extrinsic AD correlated with previous findings for patients with severe intrinsic and extrinsic AD....

  7. Information Security and People: A Conundrum for Compliance

    Directory of Open Access Journals (Sweden)

    Hiep Cong Pham

    2017-01-01

    Full Text Available This evaluation of end-users and IT experts/managers’ attitudes towards performing IT security tasks indicates important differences between their perspectives on what is and is not necessary to establish a secure corporate IT environment. Through a series of case studies, this research illustrates that making it easier for end-users to comply does not necessarily equate to enhanced implementation of security measures. End-users want to be autonomous, competent, self-motivated and active participants in the development of secure environments. However, managers and experts want to limit autonomy to ensure that procedures are followed closely, rather than permitting flexibility. This results in the creation of environments that are intrinsically de-motivating rather than motivating end-users to become self-determined and self-regulating co-creators of a secure IT environment. The paper also discusses alternative approaches to developing a human system that works for end-users and experts.

  8. The Neuroscience of Growth Mindset and Intrinsic Motivation.

    Science.gov (United States)

    Ng, Betsy

    2018-01-26

    Our actions can be triggered by intentions, incentives or intrinsic values. Recent neuroscientific research has yielded some results about the growth mindset and intrinsic motivation. With the advances in neuroscience and motivational studies, there is a global need to utilize this information to inform educational practice and research. Yet, little is known about the neuroscientific interplay between growth mindset and intrinsic motivation. This paper attempts to draw on the theories of growth mindset and intrinsic motivation, together with contemporary ideas in neuroscience, outline the potential for neuroscientific research in education. It aims to shed light on the relationship between growth mindset and intrinsic motivation in terms of supporting a growth mindset to facilitate intrinsic motivation through neural responses. Recent empirical research from the educational neuroscience perspective that provides insights into the interplay between growth mindset and intrinsic motivation will also be discussed.

  9. The Neuroscience of Growth Mindset and Intrinsic Motivation

    Directory of Open Access Journals (Sweden)

    Betsy Ng

    2018-01-01

    Full Text Available Our actions can be triggered by intentions, incentives or intrinsic values. Recent neuroscientific research has yielded some results about the growth mindset and intrinsic motivation. With the advances in neuroscience and motivational studies, there is a global need to utilize this information to inform educational practice and research. Yet, little is known about the neuroscientific interplay between growth mindset and intrinsic motivation. This paper attempts to draw on the theories of growth mindset and intrinsic motivation, together with contemporary ideas in neuroscience, outline the potential for neuroscientific research in education. It aims to shed light on the relationship between growth mindset and intrinsic motivation in terms of supporting a growth mindset to facilitate intrinsic motivation through neural responses. Recent empirical research from the educational neuroscience perspective that provides insights into the interplay between growth mindset and intrinsic motivation will also be discussed.

  10. A tonoplast intrinsic protein in Gardenia jasminoides

    Science.gov (United States)

    Gao, Lan; Li, Hao-Ming

    2017-08-01

    Physiological and molecular studies proved that plasma membrane intrinsic proteins (PIPs) and tonoplast intrinsic proteins (TIPs) subfamily of aquaporins play key functions in plant water homeostasis. Five specialized subgroups (TIP1-5) of TIPs have been found in higher plants, in which the TIP1 and TIP2 isoforms are the largest arbitrary groups. TIPs have high water-transport activity than PIPs, some TIPs can transport other small molecule such as urea, ammonia, hydrogen peroxide, and carbon dioxide. In this work, the structure of the putative tonoplast aquaporin from Gardenia jasminoides (GjTIP) was analyzed. Its transcript level has increased during fruit maturation. A phylogenetic analysis indicates that the protein belongs to TIP1 subfamily. A three-dimensional model structure of GjTIP was built based on crystal structure of an ammonia-permeable AtTIP2-1 from Arabidopsis thaliana. The model structure displayed as a homo-tetramer, each monomer has six trans-membrane and two half-membrane-spanning α helices. The data suggests that the GjTIP has tendency to be a mixed function aquaporin, might involve in water, urea and hydrogen peroxide transport, and the gating machanism founded in some AQPs involving pH and phosphorylation response have not been proved in GjTIP.

  11. Intrinsic radiation resistance in human chondrosarcoma cells

    International Nuclear Information System (INIS)

    Moussavi-Harami, Farid; Mollano, Anthony; Martin, James A.; Ayoob, Andrew; Domann, Frederick E.; Gitelis, Steven; Buckwalter, Joseph A.

    2006-01-01

    Human chondrosarcomas rarely respond to radiation treatment, limiting the options for eradication of these tumors. The basis of radiation resistance in chondrosarcomas remains obscure. In normal cells radiation induces DNA damage that leads to growth arrest or death. However, cells that lack cell cycle control mechanisms needed for these responses show intrinsic radiation resistance. In previous work, we identified immortalized human chondrosarcoma cell lines that lacked p16 ink4a , one of the major tumor suppressor proteins that regulate the cell cycle. We hypothesized that the absence of p16 ink4a contributes to the intrinsic radiation resistance of chondrosarcomas and that restoring p16 ink4a expression would increase their radiation sensitivity. To test this we determined the effects of ectopic p16 ink4a expression on chondrosarcoma cell resistance to low-dose γ-irradiation (1-5 Gy). p16 ink4a expression significantly increased radiation sensitivity in clonogenic assays. Apoptosis did not increase significantly with radiation and was unaffected by p16 ink4a transduction of chondrosarcoma cells, indicating that mitotic catastrophe, rather than programmed cell death, was the predominant radiation effect. These results support the hypothesis that p16 ink4a plays a role in the radiation resistance of chondrosarcoma cell lines and suggests that restoring p16 expression will improve the radiation sensitivity of human chondrosarcomas

  12. Intrinsic position uncertainty impairs overt search performance.

    Science.gov (United States)

    Semizer, Yelda; Michel, Melchi M

    2017-08-01

    Uncertainty regarding the position of the search target is a fundamental component of visual search. However, due to perceptual limitations of the human visual system, this uncertainty can arise from intrinsic, as well as extrinsic, sources. The current study sought to characterize the role of intrinsic position uncertainty (IPU) in overt visual search and to determine whether it significantly limits human search performance. After completing a preliminary detection experiment to characterize sensitivity as a function of visual field position, observers completed a search task that required localizing a Gabor target within a field of synthetic luminance noise. The search experiment included two clutter conditions designed to modulate the effect of IPU across search displays of varying set size. In the Cluttered condition, the display was tiled uniformly with feature clutter to maximize the effects of IPU. In the Uncluttered condition, the clutter at irrelevant locations was removed to attenuate the effects of IPU. Finally, we derived an IPU-constrained ideal searcher model, limited by the IPU measured in human observers. Ideal searchers were simulated based on the detection sensitivity and fixation sequences measured for individual human observers. The IPU-constrained ideal searcher predicted performance trends similar to those exhibited by the human observers. In the Uncluttered condition, performance decreased steeply as a function of increasing set size. However, in the Cluttered condition, the effect of IPU dominated and performance was approximately constant as a function of set size. Our findings suggest that IPU substantially limits overt search performance, especially in crowded displays.

  13. Human dignity: intrinsic or relative value?

    Science.gov (United States)

    Thiel, Marie-Jo

    2010-09-01

    Is human dignity an intrinsic value? Or is it a relative value, depending on the perception or assessment of quality of life? History had delineated some of its key features, but the advent of human rights and the Holocaust put special emphasis on this notion, particularly in the field of bioethics. But if modern medicine regards human dignity as crucial, it tends to support this notion while assessing and measuring it. The quality of life becomes the gauge for measuring human dignity, starting from a distinction between a viable and a non-viable existence, which may eventually lead to assisted death, or to letting die. This article argues that the concept of quality of life is of great relevant for medical practice, but on the condition of not being used as a standard to measure the dignity of the individual. Rather, the quality of life should be regarded as an imperative posed by human dignity, which is necessarily intrinsic. If the quality of life measures dignity, humankind is divided into two categories: lives worthy of living, and lives unworthy of living, and society becomes a jungle. Raising the quality of life as a requirement of the inherent human dignity does not solve automatically all problems and does not eliminate a feeling of unworthiness. But it ensures its 'human' value: the equal respect for every human being.

  14. Intrinsic electromagnetic solitary vortices in magnetized plasma

    International Nuclear Information System (INIS)

    Liu, J.; Horton, W.

    1986-01-01

    Several Rossby type vortex solutions constructed for electromagnetic perturbations in magnetized plasma encounter the difficulty that the perturbed magnetic field and the parallel current are not continuous on the boundary between two regions. We find that fourth order differential equations must be solved to remove this discontinuity. Special solutions for two types of boundary value problems for the fourth order partial differential equations are presented. By applying these solutions to different nonlinear equations in magnetized plasma, the intrinsic electromagnetic solitary drift-Alfven vortex (along with solitary Alfven vortex) and the intrinsic electromagnetic solitary electron vortex (along with short-wavelength drift vortex) are constructed. While still keeping a localized dipole structure, these new vortices have more complicated radial structures in the inner and outer regions than the usual Rossby wave vortex. The new type of vortices guarantees the continuity of the perturbed magnetic field deltaB/sub perpendicular/ and the parallel current j/sub parallel/ on the boundary between inner and outer regions of the vortex. The allowed regions of propagation speeds for these vortices are analyzed, and we find that the complementary relation between the vortex propagating speeds and the corresponding phase velocities of the linear modes no longer exists

  15. Intrinsic terminators in Mycoplasma hyopneumoniae transcription.

    Science.gov (United States)

    Fritsch, Tiago Ebert; Siqueira, Franciele Maboni; Schrank, Irene Silveira

    2015-04-08

    Mycoplasma hyopneumoniae, an important pathogen of swine, exhibits a low guanine and cytosine (GC) content genome. M. hyopneumoniae genome is organised in long transcriptional units and promoter sequences have been mapped upstream of all transcription units. These analysis provided insights into the gene organisation and transcription initiation at the genome scale. However, the presence of transcriptional terminator sequences in the M. hyopneumoniae genome is poorly understood. In silico analyses demonstrated the presence of putative terminators in 82% of the 33 monocistronic units (mCs) and in 74% of the 116 polycistronic units (pCs) considering different classes of terminators. The functional activity of 23 intrinsic terminators was confirmed by RT-PCR and qPCR. Analysis of all terminators found by three software algorithms, combined with experimental results, allowed us to propose a pattern of RNA hairpin formation during the termination process and to predict the location of terminators in the M. hyopneumoniae genome sequence. The stem-loop structures of intrinsic terminators of mycoplasma diverge from the pattern of terminators found in other bacteria due the low content of guanine and cytosine. In M. hyopneumoniae, transcription can end after a transcriptional unit and before its terminator sequence and can also continue past the terminator sequence with RNA polymerases gradually releasing the RNA.

  16. The neglected intrinsic resistome of bacterial pathogens.

    Directory of Open Access Journals (Sweden)

    Alicia Fajardo

    Full Text Available Bacteria with intrinsic resistance to antibiotics are a worrisome health problem. It is widely believed that intrinsic antibiotic resistance of bacterial pathogens is mainly the consequence of cellular impermeability and activity of efflux pumps. However, the analysis of transposon-tagged Pseudomonas aeruginosa mutants presented in this article shows that this phenotype emerges from the action of numerous proteins from all functional categories. Mutations in some genes make P. aeruginosa more susceptible to antibiotics and thereby represent new targets. Mutations in other genes make P. aeruginosa more resistant and therefore define novel mechanisms for mutation-driven acquisition of antibiotic resistance, opening a new research field based in the prediction of resistance before it emerges in clinical environments. Antibiotics are not just weapons against bacterial competitors, but also natural signalling molecules. Our results demonstrate that antibiotic resistance genes are not merely protective shields and offer a more comprehensive view of the role of antibiotic resistance genes in the clinic and in nature.

  17. Structural vs. intrinsic carriers: contrasting effects of cation chemistry and disorder on ionic conductivity in pyrochlores

    International Nuclear Information System (INIS)

    Perriot, Romain; Uberuaga, Blas P.

    2015-01-01

    We use molecular dynamics simulations to investigate the role of cation disorder on oxygen diffusion in Gd 2 Zr 2 O 7 (GZO) and Gd 2 Ti 2 O 7 (GTO) pyrochlores, a class of complex oxides which contain a structural vacancy relative to the basic fluorite structure. The introduction of disorder has distinct effects depending on the chemistry of the material, increasing the mobility of structural carriers by up to four orders of magnitude in GZO. In contrast, in GTO, there is no mobility at zero or low disorder on the ns timescale, but higher disorder liberates the otherwise immobile carriers, allowing diffusion with rates comparable to GZO for the fully disordered material. Here, we show that the cation disorder enhances the diffusivity by both increasing the concentration of mobile structural carriers and their individual mobility. The disorder also influences the diffusion in materials containing intrinsic carriers, such as additional vacancies VO or oxygen interstitials OI. And while in ordered GZO and GTO the contribution of the intrinsic carriers dominates the overall diffusion of oxygen, OI in GZO contributes along with structural carriers, and the total diffusion rate can be calculated by assuming simple additive contributions from the two sources. Although the disorder in the materials with intrinsic defects usually enhances the diffusivity as in the defect-free case, in low concentrations, cation antisites AB or BA, where A = Gd and B = Zr or Ti, can act as traps for fast intrinsic defects. The trapping results in a lowering of the diffusivity, and causes a non-monotonic behavior of the diffusivity with disorder. Conversely, in the case of slow intrinsic defects, the main effect of the disorder is to liberate the structural carriers, resulting in an increase of the diffusivity regardless of the defect trapping.

  18. Fast Evaluation of the Reliability of Container Securing Arrangements

    DEFF Research Database (Denmark)

    Mansour, A.E.; Jensen, Jørgen Juncher; Olsen, Anders Smærup

    2004-01-01

    of container failures are considered including racking and corner post failure. The associated probability of failure is determined using a FORM approach. The procedure can easily be programmed in a simple spreadsheet and the calculation time is very short due to the use of analytical transfer functions...

  19. What's in a name? : Why these proteins are intrinsically disordered: Why these proteins are intrinsically disordered

    NARCIS (Netherlands)

    Dunker, A Keith; Babu, M Madan; Barbar, Elisar; Blackledge, Martin; Bondos, Sarah E; Dosztányi, Zsuzsanna; Dyson, H Jane; Forman-Kay, Julie; Fuxreiter, Monika; Gsponer, Jörg; Han, Kyou-Hoon; Jones, David T; Longhi, Sonia; Metallo, Steven J; Nishikawa, Ken; Nussinov, Ruth; Obradovic, Zoran; Pappu, Rohit V; Rost, Burkhard; Selenko, Philipp; Subramaniam, Vinod; Sussman, Joel L; Tompa, Peter; Uversky, Vladimir N

    2013-01-01

    "What's in a name? That which we call a rose By any other name would smell as sweet." From "Romeo and Juliet", William Shakespeare (1594) This article opens a series of publications on disambiguation of the basic terms used in the field of intrinsically disordered proteins. We start from the

  20. Fast clustering using adaptive density peak detection.

    Science.gov (United States)

    Wang, Xiao-Feng; Xu, Yifan

    2017-12-01

    Common limitations of clustering methods include the slow algorithm convergence, the instability of the pre-specification on a number of intrinsic parameters, and the lack of robustness to outliers. A recent clustering approach proposed a fast search algorithm of cluster centers based on their local densities. However, the selection of the key intrinsic parameters in the algorithm was not systematically investigated. It is relatively difficult to estimate the "optimal" parameters since the original definition of the local density in the algorithm is based on a truncated counting measure. In this paper, we propose a clustering procedure with adaptive density peak detection, where the local density is estimated through the nonparametric multivariate kernel estimation. The model parameter is then able to be calculated from the equations with statistical theoretical justification. We also develop an automatic cluster centroid selection method through maximizing an average silhouette index. The advantage and flexibility of the proposed method are demonstrated through simulation studies and the analysis of a few benchmark gene expression data sets. The method only needs to perform in one single step without any iteration and thus is fast and has a great potential to apply on big data analysis. A user-friendly R package ADPclust is developed for public use.

  1. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  2. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  3. Intrinsically disordered proteins as molecular shields†

    Science.gov (United States)

    Chakrabortee, Sohini; Tripathi, Rashmi; Watson, Matthew; Kaminski Schierle, Gabriele S.; Kurniawan, Davy P.; Kaminski, Clemens F.; Wise, Michael J.; Tunnacliffe, Alan

    2017-01-01

    The broad family of LEA proteins are intrinsically disordered proteins (IDPs) with several potential roles in desiccation tolerance, or anhydrobiosis, one of which is to limit desiccation-induced aggregation of cellular proteins. We show here that this activity, termed molecular shield function, is distinct from that of a classical molecular chaperone, such as HSP70 – while HSP70 reduces aggregation of citrate synthase (CS) on heating, two LEA proteins, a nematode group 3 protein, AavLEA1, and a plant group 1 protein, Em, do not; conversely, the LEA proteins reduce CS aggregation on desiccation, while HSP70 lacks this ability. There are also differences in interaction with client proteins – HSP70 can be co-immunoprecipitated with a polyglutamine-containing client, consistent with tight complex formation, whereas the LEA proteins can not, although a loose interaction is observed by Förster resonance energy transfer. In a further exploration of molecular shield function, we demonstrate that synthetic polysaccharides, like LEA proteins, are able to reduce desiccation-induced aggregation of a water-soluble proteome, consistent with a steric interference model of anti-aggregation activity. If molecular shields operate by reducing intermolecular cohesion rates, they should not protect against intramolecular protein damage. This was tested using the monomeric red fluorescent protein, mCherry, which does not undergo aggregation on drying, but the absorbance and emission spectra of its intrinsic fluorophore are dramatically reduced, indicative of intramolecular conformational changes. As expected, these changes are not prevented by AavLEA1, except for a slight protection at high molar ratios, and an AavLEA1-mCherry fusion protein is damaged to the same extent as mCherry alone. A recent hypothesis proposed that proteomes from desiccation-tolerant species contain a higher degree of disorder than intolerant examples, and that this might provide greater intrinsic stability

  4. Intrinsically disordered proteins as molecular shields.

    Science.gov (United States)

    Chakrabortee, Sohini; Tripathi, Rashmi; Watson, Matthew; Schierle, Gabriele S Kaminski; Kurniawan, Davy P; Kaminski, Clemens F; Wise, Michael J; Tunnacliffe, Alan

    2012-01-01

    The broad family of LEA proteins are intrinsically disordered proteins (IDPs) with several potential roles in desiccation tolerance, or anhydrobiosis, one of which is to limit desiccation-induced aggregation of cellular proteins. We show here that this activity, termed molecular shield function, is distinct from that of a classical molecular chaperone, such as HSP70 - while HSP70 reduces aggregation of citrate synthase (CS) on heating, two LEA proteins, a nematode group 3 protein, AavLEA1, and a plant group 1 protein, Em, do not; conversely, the LEA proteins reduce CS aggregation on desiccation, while HSP70 lacks this ability. There are also differences in interaction with client proteins - HSP70 can be co-immunoprecipitated with a polyglutamine-containing client, consistent with tight complex formation, whereas the LEA proteins can not, although a loose interaction is observed by Förster resonance energy transfer. In a further exploration of molecular shield function, we demonstrate that synthetic polysaccharides, like LEA proteins, are able to reduce desiccation-induced aggregation of a water-soluble proteome, consistent with a steric interference model of anti-aggregation activity. If molecular shields operate by reducing intermolecular cohesion rates, they should not protect against intramolecular protein damage. This was tested using the monomeric red fluorescent protein, mCherry, which does not undergo aggregation on drying, but the absorbance and emission spectra of its intrinsic fluorophore are dramatically reduced, indicative of intramolecular conformational changes. As expected, these changes are not prevented by AavLEA1, except for a slight protection at high molar ratios, and an AavLEA1-mCherry fusion protein is damaged to the same extent as mCherry alone. A recent hypothesis proposed that proteomes from desiccation-tolerant species contain a higher degree of disorder than intolerant examples, and that this might provide greater intrinsic stability

  5. Fast Computation and Assessment Methods in Power System Analysis

    Science.gov (United States)

    Nagata, Masaki

    Power system analysis is essential for efficient and reliable power system operation and control. Recently, online security assessment system has become of importance, as more efficient use of power networks is eagerly required. In this article, fast power system analysis techniques such as contingency screening, parallel processing and intelligent systems application are briefly surveyed from the view point of their application to online dynamic security assessment.

  6. The fast breeder reactor

    International Nuclear Information System (INIS)

    Collier, J.

    1990-01-01

    The arguments for and against the fast breeder reactor are debated. The case for the fast reactor is that the world energy demand will increase due to increasing population over the next forty years and that the damage to the global environment from burning fossil fuels which contribute to the greenhouse effect. Nuclear fission is the only large scale energy source which can achieve a cut in the use of carbon based fuels although energy conservation and renewable sources will also be important. Fast reactors produce more energy from uranium than other types of (thermal) reactors such as AGRs and PWRs. Fast reactors would be important from about 2020 onwards especially as by then many thermal reactors will need to be replaced. Fast reactors are also safer than normal reactors. The arguments against fast reactors are largely economic. The cost, especially the capital cost is very high. The viability of the technology is also questioned. (UK)

  7. The fast breeder reactor

    International Nuclear Information System (INIS)

    Davis, D.A.; Baker, M.A.W.; Hall, R.S.

    1990-01-01

    Following submission of written evidence, the Energy Committee members asked questions of three witnesses from the Central Electricity Generating Board and Nuclear Electric (which will be the government owned company running nuclear power stations after privatisation). Both questions and answers are reported verbatim. The points raised include where the responsibility for the future fast reactor programme should lie, with government only or with private enterprise or both and the viability of fast breeder reactors in the future. The case for the fast reactor was stated as essentially strategic not economic. This raised the issue of nuclear cost which has both a construction and a decommissioning element. There was considerable discussion as to the cost of building a European Fast reactor and the cost of the electricity it would generate compared with PWR type reactors. The likely demand for fast reactors will not arrive for 20-30 years and the need to build a fast reactor now is questioned. (UK)

  8. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  9. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  10. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  11. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  12. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  13. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  14. Fast reactors worldwide

    International Nuclear Information System (INIS)

    Hall, R.S.; Vignon, D.

    1985-01-01

    The paper concerns the evolution of fast reactors over the past 30 years, and their present status. Fast reactor development in different countries is described, and the present position, with emphasis on cost reduction and collaboration, is examined. The French development of the fast breeder type reactor is reviewed, and includes: the acquisition of technical skills, the search for competitive costs and the spx2 project, and more advanced designs. Future prospects are also discussed. (U.K.)

  15. Fast breeder reactors

    International Nuclear Information System (INIS)

    Heinzel, V.

    1975-01-01

    The author gives a survey of 'fast breeder reactors'. In detail the process of breeding, the reasons for the development of fast breeders, the possible breeder reactors, the design criteria, fuels, cladding, coolant, and safety aspects are reported on. Design data of some experimental reactors already in operation are summarized in stabular form. 300 MWe Prototype-Reactors SNR-300 and PFR are explained in detail and data of KWU helium-cooled fast breeder reactors are given. (HR) [de

  16. IMPACT OF BARYONIC PHYSICS ON INTRINSIC ALIGNMENTS

    Energy Technology Data Exchange (ETDEWEB)

    Tenneti, Ananth; Gnedin, Nickolay Y. [Particle Astrophysics Center, Fermi National Accelerator Laboratory, Batavia, IL 60510 (United States); Feng, Yu, E-mail: vat@andrew.cmu.edu [Berkeley Center for Cosmological Physics, Department of Physics, University of California Berkeley, Berkeley, CA 94720 (United States)

    2017-01-10

    We explore the effects of specific assumptions in the subgrid models of star formation and stellar and active galactic nucleus feedback on intrinsic alignments of galaxies in cosmological simulations of the “MassiveBlack-II” family. Using smaller-volume simulations, we explore the parameter space of the subgrid star formation and feedback model and find remarkable robustness of the observable statistical measures to the details of subgrid physics. The one observational probe most sensitive to modeling details is the distribution of misalignment angles. We hypothesize that the amount of angular momentum carried away by the galactic wind is the primary physical quantity that controls the orientation of the stellar distribution. Our results are also consistent with a similar study by the EAGLE simulation team.

  17. Intrinsic Orbital Angular Momentum States of Neutrons

    Science.gov (United States)

    Cappelletti, Ronald L.; Jach, Terrence; Vinson, John

    2018-03-01

    It has been shown that single-particle wave functions, of both photons and electrons, can be created with a phase vortex, i.e., an intrinsic orbital angular momentum (OAM). A recent experiment has claimed similar success using neutrons [C. W. Clark et al., Nature, 525, 504 (2015), 10.1038/nature15265]. We show that their results are insufficient to unambiguously demonstrate OAM, and they can be fully explained as phase contrast interference patterns. Furthermore, given the small transverse coherence length of the neutrons in the original experiment, the probability that any neutron was placed in an OAM state is vanishingly small. We highlight the importance of the relative size of the coherence length, which presents a unique challenge for neutron experiments compared to electron or photon work, and we suggest improvements for the creation of neutron OAM states.

  18. Intrinsic magnetic torque at low magnetic induction

    International Nuclear Information System (INIS)

    Doria, M.M.; Oliveira, I.G. de.

    1993-01-01

    Using anisotropic London theory the intrinsic magnetic torque for extreme type II uniaxial superconductors for any value of the magnetic induction is obtained. It is considered the vortex lines straight and take into account the contribution of the supercurrents flowing inside the vortex core within the London theory. It is shown that the interline and intra line free energies give opposite torque contributions, the first drives the magnetic induction parallel to the superconductor's axis of symmetry and the second orthogonal to it. At high magnetic induction torque expression obtained generalizes V. Kogan's formula since it has no free parameters other than the anisotropy γ = m 1 /m 3 and the Ginzburg-Landau parameter κ. At low magnetic induction it is proposed a way to observe vortex chains effects in the total torque based on the fact that London theory is linear and the energy to make a single vortex line in space is independent of the magnetic induction. (author)

  19. Intrinsic factors associated with pregnancy falls.

    Science.gov (United States)

    Wu, Xuefang; Yeoh, Han T

    2014-10-01

    Approximately 25% to 27% of women sustain a fall during pregnancy, and falls are associated with serious injuries and can affect pregnancy outcomes. The objective of the current study was to identify intrinsic factors associated with pregnancy that may contribute to women's increased risk of falls. A literature search (Medline and Pubmed) identified articles published between January 1980 and June 2013 that measured associations between pregnancy and fall risks, using an existing fall accident investigation framework. The results indicated that physiological, biomechanical, and psychological changes associated with pregnancy may influence the initiation, detection, and recovery phases of falls and increase the risk of falls in this population. Considering the logistic difficulties and ethnic concerns in recruiting pregnant women to participate in this investigation of fall risk factors, identification of these factors could establish effective fall prevention and intervention programs for pregnant women and improve birth outcomes. [Workplace Health Saf 2014;62(10):403-408.]. Copyright 2014, SLACK Incorporated.

  20. Quantum synchronization effects in intrinsic Josephson junctions

    International Nuclear Information System (INIS)

    Machida, M.; Kano, T.; Yamada, S.; Okumura, M.; Imamura, T.; Koyama, T.

    2008-01-01

    We investigate quantum dynamics of the superconducting phase in intrinsic Josephson junctions of layered high-T c superconductors motivated by a recent experimental observation for the switching rate enhancement in the low temperature quantum regime. We pay attention to only the capacitive coupling between neighboring junctions and perform large-scale simulations for the Schroedinger equation derived from the Hamiltonian considering the capacitive coupling alone. The simulation focuses on an issue whether the switching of a junction induces those of the other junctions or not. The results reveal that the superconducting phase dynamics show synchronous behavior with increasing the quantum character, e.g., decreasing the junction plane area and effectively the temperature. This is qualitatively consistent with the experimental result

  1. Intrinsic Dynamics of Quantum-Dash Lasers

    KAUST Repository

    Chen, Cheng; Djie, Hery Susanto; Hwang, James C. M.; Koch, Thomas L.; Lester, Luke F.; Ooi, Boon S.; Wang, Yang

    2011-01-01

    Temperature-dependent intrinsic modulation response of InAs/InAlGaAs quantum-dash lasers was investigated by using pulse optical injection modulation to minimize the effects of parasitics and self-heating. Compared to typical quantum-well lasers, the quantum-dash lasers were found to have comparable differential gain but approximately twice the gain compression factor, probably due to carrier heating by free-carrier absorption, as opposed to stimulated transition. Therefore, the narrower modulation bandwidth of the quantum-dash lasers than that of quantum-well lasers was attributed to their higher gain compression factor. In addition, as expected, quantum-dash lasers with relatively long and uniform dashes exhibit higher temperature stability than quantum-well lasers. However, the lasers with relatively short and nonuniform dashes exhibit stronger temperature dependence, probably due to their higher surface-to-volume ratio and nonuniform dash sizes. © 2011 IEEE.

  2. Intrinsically Safe and Economical Reactor (ISER)

    International Nuclear Information System (INIS)

    Wakabayashi, Hiroaki; Asahi, Yoshiro

    1991-01-01

    The Intrinsically Safe and Economical Reactor (ISER) is designed based on the principle of a process inherent ultimate safe reactor, PIUS, a so-called inherently safe reactor (ISR). ISER has been developed joingly by the members of the Kanagawa Institute of Technology, the University of Tokyo, the Japan Atomic Energy Research Institute (JAERI) and several industrial firms in Japan. This paper describes the requirements for the next generation of power reactor, the safety design philosphy of ISR and ISER, the controllability of ISER and the results of analyses of some of the design-based accidents (DBA) of ISER, namely station blackout, accidents in which the pressurizer relief valve becomes jammed and stuck in open position and tube breaks in the steam generator. It is concluded that the ISER can ensure a wide range of contraollabitily and fuel integrity for all the analysed DBAs. (orig.)

  3. Mechanisms of Intrinsic Tumor Resistance to Immunotherapy

    Directory of Open Access Journals (Sweden)

    John Rieth

    2018-05-01

    Full Text Available An increased understanding of the interactions between the immune system and tumors has opened the door to immunotherapy for cancer patients. Despite some success with checkpoint inhibitors including ipilimumab, pembrolizumab, and nivolumab, most cancer patients remain unresponsive to such immunotherapy, likely due to intrinsic tumor resistance. The mechanisms most likely involve reducing the quantity and/or quality of antitumor lymphocytes, which ultimately are driven by any number of developments: tumor mutations and adaptations, reduced neoantigen generation or expression, indoleamine 2,3-dioxygenase (IDO overexpression, loss of phosphatase and tensin homologue (PTEN expression, and overexpression of the Wnt–β-catenin pathway. Current work in immunotherapy continues to identify various tumor resistance mechanisms; future work is needed to develop adjuvant treatments that target those mechanisms, in order to improve the efficacy of immunotherapy and to expand its scope.

  4. Intrinsic densitometry: In-plant evaluation

    International Nuclear Information System (INIS)

    Nishida, K.; Kurosawa, A.; Masui, J.; Hsue, S.T.

    1994-11-01

    A measurement of the plutonium concentration in a sample is always necessary for nuclear material control and accounting. This report describes the testing of the intrinsic densitometry (ID) technique for implant applications. The authors found that the ID method can determine the plutonium concentrations to between 2 and 3% at concentrations of 100 g/l to 200 g/l with quartz cells and a measurement time of 3600 s. The precision can be improved to 1 to 2% with a higher counting rate. The authors also found that nitric acid concentration and the impurity level of uranium in the product plutonium solution do not affect the concentration measurement. When this technique is applied to plutonium solutions in stainless steel pipes, they found that similar precision in plutonium concentration can be achieved using a high-count-rate detector. The precision, however, is reduced with aged plutonium solutions

  5. Intrinsic thermoelectric power of group VB metals

    Directory of Open Access Journals (Sweden)

    Gunadhor Singh Okram

    2012-03-01

    Full Text Available We have reinvestigated the thermopower of group VB metals in polycrystalline forms in the temperature range of 6-300K, taking into account the critical nature of the sample surface and heat treatment especially for niobium. Strikingly small magnitude, negative sign, phonon drag dip and superconductivity not reported previously were observed in surface-cleaned single crystalline Nb. However, while thermopower magnitudes are small, mixed signs were found in the polycrystalline V, Nb and Ta samples. These properties were therefore interpreted as their intrinsic properties and were briefly discussed taking into account of the existing theory by fitting also the data that give the Fermi energies of 10.94 eV, 5.08 eV and 1.86eV, respectively.

  6. Major Intrinsic Proteins in Biomimetic Membranes

    DEFF Research Database (Denmark)

    Helix Nielsen, Claus

    2010-01-01

    or as sensor devices based on e.g., the selective permeation of metalloids. In principle a MIP based membrane sensor/separation device requires the supporting biomimetic matrix to be virtually impermeable to anything but water or the solute in question. In practice, however, a biomimetic support matrix....../separation technology, a unique class of membrane transport proteins is especially interesting the major intrinsic proteins (MIPs). Generally, MIPs conduct water molecules and selected solutes in and out of the cell while preventing the passage of other solutes, a property critical for the conservation of the cells...... internal pH and salt concentration. Also known as water channels or aquaporins they are highly efficient membrane pore proteins some of which are capable of transporting water at very high rates up to 109 molecules per second. Some MIPs transport other small, uncharged solutes, such as glycerol and other...

  7. Intrinsic Ambipolarity and Rotation in Stellarators

    International Nuclear Information System (INIS)

    Helander, P.; Simakov, A. N.

    2008-01-01

    It is shown that collisional plasma transport is intrinsically ambipolar only in quasiaxisymmetric or quasihelically symmetric magnetic configurations. Only in such fields can the plasma rotate freely, and then only in the direction of quasisymmetry. In a non-quasi-symmetric magnetic field, the average radial electric field is determined by parallel viscosity, which in turn is usually governed by collisional processes. Locally, the radial electric field may be affected by turbulent Reynolds stress producing zonal flows, but on a radial average taken over several ion gyroradii, it is determined by parallel viscosity, at least if the turbulence is electrostatic and obeys the conventional gyrokinetic orderings. This differs from the situation in a tokamak, where there is no flow damping by parallel viscosity in the symmetry direction and the turbulent Reynolds stress may affect the global radial electric field

  8. Nanotechnology Applications for Diffuse Intrinsic Pontine Glioma.

    Science.gov (United States)

    Bredlau, Amy Lee; Dixit, Suraj; Chen, Chao; Broome, Ann-Marie

    2017-01-01

    Diffuse intrinsic pontine gliomas (DIPGs) are invariably fatal tumors found in the pons of elementary school aged children. These tumors are grade II-IV gliomas, with a median survival of less than 1 year from diagnosis when treated with standard of care (SOC) therapy. Nanotechnology may offer therapeutic options for the treatment of DIPGs. Multiple nanoparticle formulations are currently being investigated for the treatment of DIPGs. Nanoparticles based upon stable elements, polymer nanoparticles, and organic nanoparticles are under development for the treatment of brain tumors, including DIPGs. Targeting of nanoparticles is now possible as delivery techniques that address the difficulty in crossing the blood brain barrier (BBB) are developed. Theranostic nanoparticles, a combination of therapeutics and diagnostic nanoparticles, improve imaging of the cancerous tissue while delivering therapy to the local region. However, additional time and attention should be directed to developing a nanoparticle delivery system for treatment of the uniformly fatal pediatric disease of DIPG.

  9. And what if gravity is intrinsically quantic?

    International Nuclear Information System (INIS)

    Ziaeepour, Houri

    2009-01-01

    Since the early days of search for a quantum theory of gravity the attempts have been mostly concentrated on the quantization of an otherwise classical system. The two most contentious candidate theories of gravity, string theory and quantum loop gravity are based on a quantum field theory - the latter is a quantum field theory of connections on a SU(2) group manifold and the former is a quantum field theory in two dimensional spaces. Here we argue that there is a very close relation between quantum mechanics (QM) and gravity. Without gravity, QM becomes ambiguous. We consider this observation as the evidence for an intrinsic relation between these fundamental laws of nature. We suggest a quantum role and definition for gravity in the context of a quantum Universe, and present a preliminary formulation for gravity in a system with a finite number of particles.

  10. Intrinsic Dynamics of Quantum-Dash Lasers

    KAUST Repository

    Chen, Cheng

    2011-10-01

    Temperature-dependent intrinsic modulation response of InAs/InAlGaAs quantum-dash lasers was investigated by using pulse optical injection modulation to minimize the effects of parasitics and self-heating. Compared to typical quantum-well lasers, the quantum-dash lasers were found to have comparable differential gain but approximately twice the gain compression factor, probably due to carrier heating by free-carrier absorption, as opposed to stimulated transition. Therefore, the narrower modulation bandwidth of the quantum-dash lasers than that of quantum-well lasers was attributed to their higher gain compression factor. In addition, as expected, quantum-dash lasers with relatively long and uniform dashes exhibit higher temperature stability than quantum-well lasers. However, the lasers with relatively short and nonuniform dashes exhibit stronger temperature dependence, probably due to their higher surface-to-volume ratio and nonuniform dash sizes. © 2011 IEEE.

  11. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  12. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  13. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  14. Intrinsic spin-relaxation induced negative tunnel magnetoresistance in a single-molecule magnet

    Science.gov (United States)

    Xie, Haiqing; Wang, Qiang; Xue, Hai-Bin; Jiao, HuJun; Liang, J.-Q.

    2013-06-01

    We investigate theoretically the effects of intrinsic spin-relaxation on the spin-dependent transport through a single-molecule magnet (SMM), which is weakly coupled to ferromagnetic leads. The tunnel magnetoresistance (TMR) is obtained by means of the rate-equation approach including not only the sequential but also the cotunneling processes. It is shown that the TMR is strongly suppressed by the fast spin-relaxation in the sequential region and can vary from a large positive to slight negative value in the cotunneling region. Moreover, with an external magnetic field along the easy-axis of SMM, a large negative TMR is found when the relaxation strength increases. Finally, in the high bias voltage limit the TMR for the negative bias is slightly larger than its characteristic value of the sequential region; however, it can become negative for the positive bias caused by the fast spin-relaxation.

  15. Intrinsic Chirality Origination in Carbon Nanotubes.

    Science.gov (United States)

    Pierce, Neal; Chen, Gugang; P Rajukumar, Lakshmy; Chou, Nam Hawn; Koh, Ai Leen; Sinclair, Robert; Maruyama, Shigeo; Terrones, Mauricio; Harutyunyan, Avetik R

    2017-10-24

    Elucidating the origin of carbon nanotube chirality is key for realizing their untapped potential. Currently, prevalent theories suggest that catalyst structure originates chirality via an epitaxial relationship. Here we studied chirality abundances of carbon nanotubes grown on floating liquid Ga droplets, which excludes the influence of catalyst features, and compared them with abundances grown on solid Ru nanoparticles. Results of growth on liquid droplets bolsters the intrinsic preference of carbon nuclei toward certain chiralities. Specifically, the abundance of the (11,1)/χ = 4.31° tube can reach up to 95% relative to (9,4)/χ = 17.48°, although they have exactly the same diameter, (9.156 Å). However, the comparative abundances for the pair, (19,3)/χ = 7.2° and (17,6)/χ = 14.5°, with bigger diameter, (16.405 Å), fluctuate depending on synthesis temperature. The abundances of the same pairs of tubes grown on floating solid polyhedral Ru nanoparticles show completely different trends. Analysis of abundances in relation to nucleation probability, represented by a product of the Zeldovich factor and the deviation interval of a growing nuclei from equilibrium critical size, explain the findings. We suggest that the chirality in the nanotube in general is a result of interplay between intrinsic preference of carbon cluster and induction by catalyst structure. This finding can help to build the comprehensive theory of nanotube growth and offers a prospect for chirality-preferential synthesis of carbon nanotubes by the exploitation of liquid catalyst droplets.

  16. An Overview of DRAM-Based Security Primitives

    Directory of Open Access Journals (Sweden)

    Nikolaos Athanasios Anagnostopoulos

    2018-03-01

    Full Text Available Recent developments have increased the demand for adequate security solutions, based on primitives that cannot be easily manipulated or altered, such as hardware-based primitives. Security primitives based on Dynamic Random Access Memory (DRAM can provide cost-efficient and practical security solutions, especially for resource-constrained devices, such as hardware used in the Internet of Things (IoT, as DRAMs are an intrinsic part of most contemporary computer systems. In this work, we present a comprehensive overview of the literature regarding DRAM-based security primitives and an extended classification of it, based on a number of different criteria. In particular, first, we demonstrate the way in which DRAMs work and present the characteristics being exploited for the implementation of security primitives. Then, we introduce the primitives that can be implemented using DRAM, namely Physical Unclonable Functions (PUFs and True Random Number Generators (TRNGs, and present the applications of each of the two types of DRAM-based security primitives. We additionally proceed to assess the security such primitives can provide, by discussing potential attacks and defences, as well as the proposed security metrics. Subsequently, we also compare these primitives to other hardware-based security primitives, noting their advantages and shortcomings, and proceed to demonstrate their potential for commercial adoption. Finally, we analyse our classification methodology, by reviewing the criteria employed in our classification and examining their significance.

  17. Fast wave current drive

    International Nuclear Information System (INIS)

    Goree, J.; Ono, M.; Colestock, P.; Horton, R.; McNeill, D.; Park, H.

    1985-07-01

    Fast wave current drive is demonstrated in the Princeton ACT-I toroidal device. The fast Alfven wave, in the range of high ion-cyclotron harmonics, produced 40 A of current from 1 kW of rf power coupled into the plasma by fast wave loop antenna. This wave excites a steady current by damping on the energetic tail of the electron distribution function in the same way as lower-hybrid current drive, except that fast wave current drive is appropriate for higher plasma densities

  18. Hydrogenic fast-ion diagnostic using Balmer-alpha light

    International Nuclear Information System (INIS)

    Heidbrink, W W; Burrell, K H; Luo, Y; Pablant, N A; Ruskov, E

    2004-01-01

    Hydrogenic fast-ion populations are common in toroidal magnetic fusion devices, especially in devices with neutral beam injection. As the fast ions orbit around the device and pass through a neutral beam, some fast ions neutralize and emit Balmer-alpha light. The intensity of this emission is weak compared with the signals from the injected neutrals, the warm (halo) neutrals and the cold edge neutrals, but, for a favourable viewing geometry, the emission is Doppler shifted away from these bright interfering signals. Signals from fast ions are detected in the DIII-D tokamak. When the electron density exceeds ∼7 x 10 19 m -3 , visible bremsstrahlung obscures the fast-ion signal. The intrinsic spatial resolution of the diagnostic is ∼5 cm for 40 keV amu -1 fast ions. The technique is well suited for diagnosis of fast-ion populations in devices with fast-ion energies (∼30 keV amu -1 ), minor radii (∼0.6 m) and plasma densities (∼ 20 m -3 ) that are similar to those of DIII-D

  19. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  20. Personality traits associated with intrinsic academic motivation in medical students.

    Science.gov (United States)

    Tanaka, Masaaki; Mizuno, Kei; Fukuda, Sanae; Tajima, Seiki; Watanabe, Yasuyoshi

    2009-04-01

    Motivation is one of the most important psychological concepts in education and is related to academic outcomes in medical students. In this study, the relationships between personality traits and intrinsic academic motivation were examined in medical students. The study group consisted of 119 Year 2 medical students at Osaka City University Graduate School of Medicine. They completed questionnaires dealing with intrinsic academic motivation (the Intrinsic Motivation Scale toward Learning) and personality (the Temperament and Character Inventory [TCI]). On simple regression analyses, the TCI dimensions of persistence, self-directedness, co-operativeness and self-transcendence were positively associated with intrinsic academic motivation. On multiple regression analysis adjusted for age and gender, the TCI dimensions of persistence, self-directedness and self-transcendence were positively associated with intrinsic academic motivation. The temperament dimension of persistence and the character dimensions of self-directedness and self-transcendence are associated with intrinsic academic motivation in medical students.

  1. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  2. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  3. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  4. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  5. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  6. Data backup security in cloud storage system

    OpenAIRE

    Атаян, Борис Геннадьевич; Национальный политехнический университет Армении; Багдасарян, Татевик Араевна; Национальный политехнический университет Армении

    2016-01-01

    Cloud backup system is proposed, which provides means for effective creation, secure storage and restore of backups inCloud. For data archiving new efficient SGBP file format is being used in the system, which is based on DEFLATE compressionalgorithm. Proposed format provides means for fast archive creation, which can contain significant amounts of data. Modernapproaches of backup archive protection are described in the paper. Also the SGBP format is compared to heavily used ZIP format(both Z...

  7. Increased intrinsic mitochondrial function in humans with mitochondrial haplogroup H

    DEFF Research Database (Denmark)

    Larsen, Steen; Díez-Sánchez, Carmen; Rabøl, Rasmus

    2014-01-01

    and determined their mitochondrial haplogroup, mitochondrial oxidative phosphorylation capacity (OXPHOS), mitochondrial content (citrate synthase (CS)) and VO2max. Intrinsic mitochondrial function is calculated as mitochondrial OXPHOS capacity divided by mitochondrial content (CS). Haplogroup H showed a 30......% higher intrinsic mitochondrial function compared with the other haplo group U. There was no relationship between haplogroups and VO2max. In skeletal muscle from men with mitochondrial haplogroup H, an increased intrinsic mitochondrial function is present....

  8. Do intrinsic and extrinsic motivation relate differently to employee outcomes?

    OpenAIRE

    Kuvaas, Bard; Buch, Robert; Weibel, Antoinette; Dysvik, Anders; Nerstad, Christina

    2017-01-01

    In most theories that address how individual financial incentives affect work performance, researchers have assumed that two types of motivation—intrinsic and extrinsic—mediate the relationship between incentives and performance. Empirically, however, extrinsic motivation is rarely investigated. To explore the predictive validity of these theories of intrinsic and extrinsic motivation in work settings, we tested how both intrinsic and extrinsic motivation affected supervisor-ra...

  9. The effects of extrinsic rewards on children's intrinsic motivation

    OpenAIRE

    大槻, 千秋

    1981-01-01

    An experiment was conducted with preschool children to test whether a person's intrinsic motivation in an activity may be decreased by extrinsic salient rewards in Japan like in America. Children solved some jigsaw puzzles and received assorted candies, then they were observed how long they did other jigsaw puzzles. The results showed that the effects of extrinsic rewards on intrinsic motivation in an activity varied with the subject's social background. In uptown children's intrinsic motivat...

  10. Sources of intrinsic rotation in the low-flow ordering

    International Nuclear Information System (INIS)

    Parra, Felix I.; Barnes, Michael; Catto, Peter J.

    2011-01-01

    A low flow, δf gyrokinetic formulation to obtain the intrinsic rotation profiles is presented. The momentum conservation equation in the low-flow ordering contains new terms, neglected in previous first-principles formulations, that may explain the intrinsic rotation observed in tokamaks in the absence of external sources of momentum. The intrinsic rotation profile depends on the density and temperature profiles and on the up-down asymmetry.

  11. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  12. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  13. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  14. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  15. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  16. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  17. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  18. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  19. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  20. Bluetooth and security

    Science.gov (United States)

    Ivo, Penn

    2004-04-01

    frequency band, the Bluetooth radio typically hops faster and uses shorter packets. This is because short packages and fast hopping limit the impact of microwave ovens and other sources of disturbances. Use of Forward Error Correction (FEC) limits the impact of random noise on long-distance links. Bluetooth transmissions are secure in a business and home environment. Bluetooth has built in sufficient encryption and authentication and is thus very secure in any environment. In addition to this, a frequency-hopping scheme with 1600 hops/sec. is employed. This is far quicker than any other competing system. This, together with an automatic output power adaption to reduce the range exactly to requirement, makes the system extremely difficult to eavesdrop. Information Integrity in Bluetooth has these components: Random Number Generation, Encryption, Encryption Key Management and Authentication.

  1. Neuromodulation intrinsic to the central pattern generator for escape swimming in Tritonia.

    Science.gov (United States)

    Katz, P S

    1998-11-16

    Extrinsic neuromodulatory inputs to central pattern generators (CPGs) can alter the properties and synaptic interactions of neurons in those circuits and thereby modify the output of the CPG. Recent work in a number of systems has now demonstrated that neurons intrinsic to CPG can also evoke neuromodulatory actions on other members of the CPG. Such "intrinsic neuromodulation" plays a role in controlling the CPG underlying the escape swim response of the nudibrach mollusc, Tritonia diomedea. The dorsal swim interneurons (DSIs) are a bilaterally represented set of three serotonergic neurons that participate in the generation of the rhythmic swim motor program. Serotonin released from these CPG neurons functions both as a fast neurotransmitter and as a slower neuromodulator. In its modulatory role, serotonin enhances the release of neurotransmitter from another CPG neuron, C2, and also increases C2 excitability by decreasing spike frequency adaptation. These neuromodulatory actions intrinsic to the CPG may be important for the initial self-configuration of the system into a function CPG and for experience-dependent changes in the output such as behavioral sensitization and habituation.

  2. Intrinsically active and pacemaker neurons in pluripotent stem cell-derived neuronal populations.

    Science.gov (United States)

    Illes, Sebastian; Jakab, Martin; Beyer, Felix; Gelfert, Renate; Couillard-Despres, Sébastien; Schnitzler, Alfons; Ritter, Markus; Aigner, Ludwig

    2014-03-11

    Neurons generated from pluripotent stem cells (PSCs) self-organize into functional neuronal assemblies in vitro, generating synchronous network activities. Intriguingly, PSC-derived neuronal assemblies develop spontaneous activities that are independent of external stimulation, suggesting the presence of thus far undetected intrinsically active neurons (IANs). Here, by using mouse embryonic stem cells, we provide evidence for the existence of IANs in PSC-neuronal networks based on extracellular multielectrode array and intracellular patch-clamp recordings. IANs remain active after pharmacological inhibition of fast synaptic communication and possess intrinsic mechanisms required for autonomous neuronal activity. PSC-derived IANs are functionally integrated in PSC-neuronal populations, contribute to synchronous network bursting, and exhibit pacemaker properties. The intrinsic activity and pacemaker properties of the neuronal subpopulation identified herein may be particularly relevant for interventions involving transplantation of neural tissues. IANs may be a key element in the regulation of the functional activity of grafted as well as preexisting host neuronal networks.

  3. Fast multichannel analyser

    Energy Technology Data Exchange (ETDEWEB)

    Berry, A; Przybylski, M M; Sumner, I [Science Research Council, Daresbury (UK). Daresbury Lab.

    1982-10-01

    A fast multichannel analyser (MCA) capable of sampling at a rate of 10/sup 7/ s/sup -1/ has been developed. The instrument is based on an 8 bit parallel encoding analogue to digital converter (ADC) reading into a fast histogramming random access memory (RAM) system, giving 256 channels of 64 k count capacity. The prototype unit is in CAMAC format.

  4. A fast multichannel analyser

    International Nuclear Information System (INIS)

    Berry, A.; Przybylski, M.M.; Sumner, I.

    1982-01-01

    A fast multichannel analyser (MCA) capable of sampling at a rate of 10 7 s -1 has been developed. The instrument is based on an 8 bit parallel encoding analogue to digital converter (ADC) reading into a fast histogramming random access memory (RAM) system, giving 256 channels of 64 k count capacity. The prototype unit is in CAMAC format. (orig.)

  5. Characterization of the intrinsic density profiles for liquid surfaces

    International Nuclear Information System (INIS)

    Chacon, Enrique; Tarazona, Pedro

    2005-01-01

    This paper presents recent advances in the characterization of the intrinsic structures in computer simulations of liquid surfaces. The use of operational definitions for the intrinsic surface, associated with each molecular configuration of a liquid slab, gives direct access to the intrinsic profile and to the wavevector dependent surface tension. However, the characteristics of these functions depend on the definition used for the intrinsic surface. We discuss the pathologies associated with a local Gibbs dividing surface definition, and consider the alternative definition of a minimal area surface, going though a set of surface pivots, self-consistently chosen to represent the first liquid layer

  6. Hamiltonian reductions in plasma physics about intrinsic gyrokinetic

    International Nuclear Information System (INIS)

    Guillebon de Resnes, L. de

    2013-01-01

    Gyrokinetic is a key model for plasma micro-turbulence, commonly used for fusion plasmas or small-scale astrophysical turbulence, for instance. The model still suffers from several issues, which could imply to reconsider the equations. This thesis dissertation clarifies three of them. First, one of the coordinates caused questions, both from a physical and from a mathematical point of view; a suitable constrained coordinate is introduced, which removes the issues from the theory and explains the intrinsic structures underlying the questions. Second, the perturbative coordinate transformation for gyrokinetic was computed only at lowest orders; explicit induction relations are obtained to go arbitrary order in the expansion. Third, the introduction of the coupling between the plasma and the electromagnetic field was not completely satisfactory; using the Hamiltonian structure of the dynamics, it is implemented in a more appropriate way, with strong consequences on the gyrokinetic equations, especially about their Hamiltonian structure. In order to address these three main points, several other results are obtained, for instance about the origin of the guiding-center adiabatic invariant, about a very efficient minimal guiding center transformation, or about an intermediate Hamiltonian model between Vlasov-Maxwell and gyrokinetic, where the characteristics include both the slow guiding-center dynamics and the fast gyro-angle dynamics. In addition, various reduction methods are used, introduced or developed, e.g. a Lie-transform of the equations of motion, a lifting method to transfer particle reductions to the corresponding Hamiltonian field dynamics, or a truncation method related both to Dirac's theory of constraints and to a projection onto a Lie-subalgebra. Besides gyrokinetic, this is useful to clarify other Hamiltonian reductions in plasma physics, for instance for incompressible or electrostatic dynamics, for magnetohydrodynamics, or for fluid closures including

  7. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  8. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  9. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  10. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  11. Operations Security (OPSEC) Guide

    Science.gov (United States)

    2011-04-01

    Request for Proposal TAC Threat Analysis Center TECHINT Technical Intelligence TMAP Telecommunications Monitoring and Assessment Program TTP...communications security, use of secure telephones, and a robust Telecommunications Monitoring and Assessment Program ( TMAP ) prevents undetermined...and AFI 33-219, Telecommunications Monitoring and Assessment Program ( TMAP ), or Information Assurance (IA) or Communications Security (COMSEC

  12. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  13. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  14. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  15. Refelctions on the security

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  16. Islamic Fasting and Diabetes

    Directory of Open Access Journals (Sweden)

    Fereidoun Azizi

    2013-07-01

    Full Text Available The aim of this article is to review health-related aspects of Ramadan fasting in normal individuals and diabetics. During fasting days of Ramadan, glucose homeostasis is maintained by meal taken bepore dawn and by liver glycogen stores. Changes in serum lipids are variable and defend on the quality and quantity of food consumption and changes in weight. Compliant, well controlled type 2 diabetics may observe Ramadan fasting; but fasting is not recommended for type 1, non complaint, poorly controlled and pregnant diabetics. Although Ramadan fasting is safe for all healthy individuals and well controlled diabetics, those with uncontrolled diabetics and diabetics with complications should consult physicians and follow scientific recommendations.

  17. Fast Spectrum Reactors

    CERN Document Server

    Todd, Donald; Tsvetkov, Pavel

    2012-01-01

    Fast Spectrum Reactors presents a detailed overview of world-wide technology contributing to the development of fast spectrum reactors. With a unique focus on the capabilities of fast spectrum reactors to address nuclear waste transmutation issues, in addition to the well-known capabilities of breeding new fuel, this volume describes how fast spectrum reactors contribute to the wide application of nuclear power systems to serve the global nuclear renaissance while minimizing nuclear proliferation concerns. Readers will find an introduction to the sustainable development of nuclear energy and the role of fast reactors, in addition to an economic analysis of nuclear reactors. A section devoted to neutronics offers the current trends in nuclear design, such as performance parameters and the optimization of advanced power systems. The latest findings on fuel management, partitioning and transmutation include the physics, efficiency and strategies of transmutation, homogeneous and heterogeneous recycling, in addit...

  18. Fast ejendom III

    DEFF Research Database (Denmark)

    Munk-Hansen, Carsten

    Bogen er det tredje bind af tre planlagte bind om fast ejendom: I Overdragelsen, II Bolighandlen og III Ejerbeføjelsen. Fremstillingens giver et grundigt overblik over centrale områder af en omfattende regulering af fast ejendom, med angivelse af litteratur, hvor læseren kan søge yderligere...... oplysning. En ejer af fast ejendom er på særdeles mange områder begrænset i sin råden sammenlignet med ejeren af et formuegode i almindelighed. Fremstillingen tager udgangspunkt i ejerens perspektiv (fremfor samfundets eller myndighedernes). Både den privatretlige og offentligretlige regulering behandles......, eksempelvis ejendomsdannelsen, servitutter, naboretten, hævd, zoneinddelingen, den fysiske planlægning, beskyttelse af natur, beskyttelse af kultur, forurening fra fast ejendom, erstatning for forurening, jordforurening, ekspropriation, byggeri og adgang til fast ejendom....

  19. Fast fission phenomena

    International Nuclear Information System (INIS)

    Gregoire, Christian.

    1982-03-01

    Experimental studies of fast fission phenomena are presented. The paper is divided into three parts. In the first part, problems associated with fast fission processes are examined in terms of interaction potentials and a dynamic model is presented in which highly elastic collisions, the formation of compound nuclei and fast fission appear naturally. In the second part, a description is given of the experimental methods employed, the observations made and the preliminary interpretation of measurements suggesting the occurence of fast fission processes. In the third part, our dynamic model is incorporated in a general theory of the dissipative processes studied. This theory enables fluctuations associated with collective variables to be calculated. It is applied to highly inelastic collisions, to fast fission and to the fission dynamics of compound nuclei (for which a schematic representation is given). It is with these calculations that the main results of the second part can be interpreted [fr

  20. Interventions for primary (intrinsic tracheomalacia in children

    Directory of Open Access Journals (Sweden)

    Vikas Goyal

    Full Text Available BACKGROUNDTracheomalacia, a disorder of the large airways where the trachea is deformed or malformed during respiration, is commonly seen in tertiary paediatric practice. It is associated with a wide spectrum of respiratory symptoms from life-threatening recurrent apnoea to common respiratory symptoms such as chronic cough and wheeze. Current practice following diagnosis of tracheomalacia includes medical approaches aimed at reducing associated symptoms of tracheomalacia, ventilation modalities of continuous positive airway pressure (CPAP and bi-level positive airway pressure (BiPAP, and surgical approaches aimed at improving the calibre of the airway (airway stenting, aortopexy, tracheopexy.OBJECTIVESTo evaluate the efficacy of medical and surgical therapies for children with intrinsic (primary tracheomalacia.METHODSSearchThe Cochrane Airways Group searched the Cochrane Central Register of Controlled Trials (CENTRAL, the Cochrane Airways Group's Specialized Register, Medline and Embase databases. The Cochrane Airways Group performed the latest searches in March 2012.Selection criteriaAll randomized controlled trials (RCTs of therapies related to symptoms associated with primary or intrinsic tracheomalacia.Data collection and analysisTwo reviewers extracted data from the included study independently and resolved disagreements by consensus.MAIN RESULTSWe included one RCT that compared nebulized recombinant human deoxyribonuclease (rhDNase with placebo in 40 children with airway malacia and a respiratory tract infection. We assessed it to be a RCT with overall low risk of bias. Data analyzed in this review showed that there was no significant difference between groups for the primary outcome of proportion cough-free at two weeks (odds ratio (OR 1.38; 95% confidence interval (CI 0.37 to 5.14. However, the mean change in night time cough diary scores significantly favoured the placebo group (mean difference (MD 1.00; 95% CI 0.17 to 1.83, P = 0

  1. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  2. Fast and precise method of contingency ranking in modern power system

    DEFF Research Database (Denmark)

    Rather, Zakir Hussain; Chen, Zhe; Thøgersen, Paul

    2011-01-01

    Contingency Analysis is one of the most important aspect of Power System Security Analysis. This paper presents a fast and precise method of contingency ranking for effective power system security analysis. The method proposed in this research work takes due consideration of both apparent power o...... is based on realistic approach taking practical situations into account. Besides taking real situations into consideration the proposed method is fast enough to be considered for on-line security analysis.......Contingency Analysis is one of the most important aspect of Power System Security Analysis. This paper presents a fast and precise method of contingency ranking for effective power system security analysis. The method proposed in this research work takes due consideration of both apparent power...

  3. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  4. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  5. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  6. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  7. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  8. Comparison of extrinsic and intrinsic neuromodulation in two central pattern generator circuits in invertebrates.

    Science.gov (United States)

    Katz, P S

    1998-05-01

    There are many sources of modulatory input to CPGs and other types of neuronal circuits. These inputs can change the properties of cells and synapses and dramatically alter the production of motor patterns. Sometimes this enables the production of motor patterns by the circuit. At other times, the modulation allows alternate motor patterns to be produced by a single circuit. Modulatory neurones have fast as well as slow actions. In some cases, such as with GPR, the two types of effects are due to the release of co-transmitters. In other cases, such as with the DSIs, a single substance can act at different receptors to cause fast and slow postsynaptic actions. The effect of a neuromodulatory neurone is determined by the type of receptor on the target neurone. Thus a single modulatory neurone evokes a suite of actions in a circuit and thereby produces a co-ordinated output. Extrinsic and intrinsic sources of neuromodulation have different sets of constraints acting upon them. For example, extrinsic neuromodulation can easily be used for motor pattern selection; a different pattern is produced depending upon which modulatory inputs are active. However, intrinsic neuromodulation is not well suited to that task. Instead, it is useful for self-organizing properties and experience-dependent effects. One clear conclusion from this work and other work in the field is that neuromodulation by neurones intrinsic and extrinsic to CPGs is not uncommon (Katz, 1995; Katz & Frost, 1996). It is part of the normal process of motor pattern generation. As such, it needs to be considered when discussing mechanisms for neuronal circuit actions.

  9. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  10. Functional Anthology of Intrinsic Disorder. III. Ligands, Postranslational Modifications and Diseases Associated with Intrinsically Disordered Proteins

    Science.gov (United States)

    Xie, Hongbo; Vucetic, Slobodan; Iakoucheva, Lilia M.; Oldfield, Christopher J.; Dunker, A. Keith; Obradovic, Zoran; Uversky, Vladimir N.

    2008-01-01

    Currently, the understanding of the relationships between function, amino acid sequence and protein structure continues to represent one of the major challenges of the modern protein science. As much as 50% of eukaryotic proteins are likely to contain functionally important long disordered regions. Many proteins are wholly disordered but still possess numerous biologically important functions. However, the number of experimentally confirmed disordered proteins with known biological functions is substantially smaller than their actual number in nature. Therefore, there is a crucial need for novel bioinformatics approaches that allow projection of the current knowledge from a few experimentally verified examples to much larger groups of known and potential proteins. The elaboration of a bioinformatics tool for the analysis of functional diversity of intrinsically disordered proteins and application of this data mining tool to >200,000 proteins from Swiss-Prot database, each annotated with at least one of the 875 functional keywords was described in the first paper of this series (Xie H., Vucetic S., Iakoucheva L.M., Oldfield C.J., Dunker A.K., Obradovic Z., Uversky V.N. (2006) Functional anthology of intrinsic disorder. I. Biological processes and functions of proteins with long disordered regions. J. Proteome Res.). Using this tool, we have found that out of the 711 Swiss-Prot functional keywords associated with at least 20 proteins, 262 were strongly positively correlated with long intrinsically disordered regions, and 302 were strongly negatively correlated. Illustrative examples of functional disorder or order were found for the vast majority of keywords showing strongest positive or negative correlation with intrinsic disorder, respectively. Some 80 Swiss-Prot keywords associated with disorder- and order-driven biological processes and protein functions were described in the first paper (Xie H., Vucetic S., Iakoucheva L.M., Oldfield C.J., Dunker A.K., Obradovic

  11. i=0 (Information has no intrinsic meaning

    Directory of Open Access Journals (Sweden)

    F.J. Miller

    2002-01-01

    Full Text Available This paper was written mainly to help identify some contradictions that can be found in the notion of knowledge management though its application is wider-ranging. The author suggests that knowledge - that is to say 'what we know' - can scarcely be understood and managed even by ourselves, much less by means of sophisticated information and communications (ie groupware and shareware technologies. We have progressed from the industrial age through the information age into what is being promoted as the 'golden age' of knowledge and, in the process, we've been led to believe that information contains meaning - rather than just standing for, provoking or evoking meaning in others. The paper argues that unless we take the trouble to face and understand the significance and implications of i=0 (ie that information has no intrinsic meaning and that knowledge is the uniquely human capability of making meaning from information - ideally in face-to-face relationships with other human beings - we may never emerge into any 'golden' age at all! The consequences of i=0 for communications, learning, safety, quality, management (itself, and winning work are also discussed.

  12. Altered intrinsic and extrinsic connectivity in schizophrenia.

    Science.gov (United States)

    Zhou, Yuan; Zeidman, Peter; Wu, Shihao; Razi, Adeel; Chen, Cheng; Yang, Liuqing; Zou, Jilin; Wang, Gaohua; Wang, Huiling; Friston, Karl J

    2018-01-01

    Schizophrenia is a disorder characterized by functional dysconnectivity among distributed brain regions. However, it is unclear how causal influences among large-scale brain networks are disrupted in schizophrenia. In this study, we used dynamic causal modeling (DCM) to assess the hypothesis that there is aberrant directed (effective) connectivity within and between three key large-scale brain networks (the dorsal attention network, the salience network and the default mode network) in schizophrenia during a working memory task. Functional MRI data during an n-back task from 40 patients with schizophrenia and 62 healthy controls were analyzed. Using hierarchical modeling of between-subject effects in DCM with Parametric Empirical Bayes, we found that intrinsic (within-region) and extrinsic (between-region) effective connectivity involving prefrontal regions were abnormal in schizophrenia. Specifically, in patients (i) inhibitory self-connections in prefrontal regions of the dorsal attention network were decreased across task conditions; (ii) extrinsic connectivity between regions of the default mode network was increased; specifically, from posterior cingulate cortex to the medial prefrontal cortex; (iii) between-network extrinsic connections involving the prefrontal cortex were altered; (iv) connections within networks and between networks were correlated with the severity of clinical symptoms and impaired cognition beyond working memory. In short, this study revealed the predominance of reduced synaptic efficacy of prefrontal efferents and afferents in the pathophysiology of schizophrenia.

  13. Intrinsic and extrinsic measurement for Brownian motion

    International Nuclear Information System (INIS)

    Castro-Villarreal, Pavel

    2014-01-01

    Based upon the Smoluchowski equation on curved manifolds, three physical observables are considered for Brownian displacement, namely geodesic displacement s, Euclidean displacement δR, and projected displacement δR ⊥ . The Weingarten–Gauss equations are used to calculate the mean-square Euclidean displacements in the short-time regime. Our findings show that from an extrinsic point of view the geometry of the space affects the Brownian motion in such a way that the particle’s diffusion is decelerated, contrasting with the intrinsic point of view where dynamics is controlled by the sign of the Gaussian curvature (Castro-Villarreal, 2010 J. Stat. Mech. P08006). Furthermore, it is possible to give exact formulas for 〈δR〉 and 〈δR 2 〉 on spheres and minimal surfaces, which are valid for all values of time. In the latter case, surprisingly, Brownian motion corresponds to the usual diffusion in flat geometries, albeit minimal surfaces have non-zero Gaussian curvature. Finally, the two-dimensional case is emphasized due to its close relation to surface self-diffusion in fluid membranes. (paper)

  14. Intrinsic ferromagnetism in hexagonal boron nitride nanosheets

    Energy Technology Data Exchange (ETDEWEB)

    Si, M. S.; Gao, Daqiang, E-mail: gaodq@lzu.edu.cn, E-mail: xueds@lzu.edu.cn; Yang, Dezheng; Peng, Yong; Zhang, Z. Y.; Xue, Desheng, E-mail: gaodq@lzu.edu.cn, E-mail: xueds@lzu.edu.cn [Key Laboratory for Magnetism and Magnetic Materials of the Ministry of Education, Lanzhou University, Lanzhou 730000 (China); Liu, Yushen [Jiangsu Laboratory of Advanced Functional Materials and College of Physics and Engineering, Changshu Institute of Technology, Changshu 215500 (China); Deng, Xiaohui [Department of Physics and Electronic Information Science, Hengyang Normal University, Hengyang 421008 (China); Zhang, G. P. [Department of Physics, Indiana State University, Terre Haute, Indiana 47809 (United States)

    2014-05-28

    Understanding the mechanism of ferromagnetism in hexagonal boron nitride nanosheets, which possess only s and p electrons in comparison with normal ferromagnets based on localized d or f electrons, is a current challenge. In this work, we report an experimental finding that the ferromagnetic coupling is an intrinsic property of hexagonal boron nitride nanosheets, which has never been reported before. Moreover, we further confirm it from ab initio calculations. We show that the measured ferromagnetism should be attributed to the localized π states at edges, where the electron-electron interaction plays the role in this ferromagnetic ordering. More importantly, we demonstrate such edge-induced ferromagnetism causes a high Curie temperature well above room temperature. Our systematical work, including experimental measurements and theoretical confirmation, proves that such unusual room temperature ferromagnetism in hexagonal boron nitride nanosheets is edge-dependent, similar to widely reported graphene-based materials. It is believed that this work will open new perspectives for hexagonal boron nitride spintronic devices.

  15. Does intrinsic motivation enhance motor cortex excitability?

    Science.gov (United States)

    Radel, Rémi; Pjevac, Dusan; Davranche, Karen; d'Arripe-Longueville, Fabienne; Colson, Serge S; Lapole, Thomas; Gruet, Mathieu

    2016-11-01

    Intrinsic motivation (IM) is often viewed as a spontaneous tendency for action. Recent behavioral and neuroimaging evidence indicate that IM, in comparison to extrinsic motivation (EM), solicits the motor system. Accordingly, we tested whether IM leads to greater excitability of the motor cortex than EM. To test this hypothesis, we used two different tasks to induce the motivational orientation using either words representing each motivational orientation or pictures previously linked to each motivational orientation through associative learning. Single-pulse transcranial magnetic stimulation over the motor cortex was applied when viewing the stimuli. Electromyographic activity was recorded on the contracted first dorsal interosseous muscle. Two indexes of corticospinal excitability (the amplitude of motor-evoked potential and the length of cortical silent period) were obtained through unbiased automatic detection and analyzed using a mixed model that provided both statistical power and a high level of control over all important individual, task, and stimuli characteristics. Across the two tasks and the two indices of corticospinal excitability, the exposure to IM-related stimuli did not lead to a greater corticospinal excitability than EM-related stimuli or than stimuli with no motivational valence (ps > .20). While these results tend to dismiss the advantage of IM at activating the motor cortex, we suggest alternative hypotheses to explain this lack of effect, which deserves further research. © 2016 Society for Psychophysiological Research.

  16. Intrinsic bioremediation of an Arctic spill

    International Nuclear Information System (INIS)

    Ziervogel, H.; Selann, J.

    2002-01-01

    An environmental site assessment was conducted in summer 2001 at Repulse Bay, Nunavut where a recent diesel spill flowed from groundwater into a small creek leading to Hudson Bay. The spill produced a microbial mat several mm in thickness and which colonized the creek for about 50 m from the point where the groundwater entered the creek. Further down the gradient, the mat increased in thickness and changed in colour from yellowish brown to green. Sedimentary iron deposition was occurring along the banks of the creek where the mat was found and a free phase diesel product was found a few mm below the sediment-water interface. The microbial mats were found to have gradients of oxygen which peaked at surface and decreased with depth. Hydrogen sulphide concentrations were formed by sulphate reduction. In comparison, an older weathered diesel spill did not appear to have much effect on the stream's geochemistry and did not form a microbial mat. It is noted that the mat may have formed in the new spill because its' volatile component may have had a toxic effect on bacterial predators in the stream. It was concluded that intrinsic bioremediation takes place through dissimilatory sulphate and iron reduction and aerobic degradation. This may be cause for about 13 per cent ppm of hydrocarbon degradation known as BTEX (benzene, toluene, ethylbenzene, and xylene). 12 refs., 1 tab., 5 figs

  17. Diffuse intrinsic pontine glioma: poised for progress

    International Nuclear Information System (INIS)

    Warren, Katherine E.

    2012-01-01

    Diffuse intrinsic pontine gliomas (DIPGs) are amongst the most challenging tumors to treat. Surgery is not an option, the effects of radiation therapy are temporary, and no chemotherapeutic agent has demonstrated significant efficacy. Numerous clinical trials of new agents and novel therapeutic approaches have been performed over the course of several decades in efforts to improve the outcome of children with DIPG, yet without success. The diagnosis of DIPG is based on radiographic findings in the setting of a typical clinical presentation, and tissue is not routinely obtained as the standard of care. The paradigm for treating children with these tumors has been based on that for supratentorial high-grade gliomas in adults as the biology of these lesions were presumed to be similar. However, recent pivotal studies demonstrate that DIPGs appear to be their own entity. Simply identifying this fact releases a number of constraints and opens opportunities for biologic investigation of these lesions, setting the stage to move forward in identifying DIPG-specific treatments. This review will summarize the current state of knowledge of DIPG, discuss obstacles to therapy, and summarize results of recent biologic studies.

  18. Understanding oceanic migrations with intrinsic biogeochemical markers.

    Directory of Open Access Journals (Sweden)

    Raül Ramos

    2009-07-01

    Full Text Available Migratory marine vertebrates move annually across remote oceanic water masses crossing international borders. Many anthropogenic threats such as overfishing, bycatch, pollution or global warming put millions of marine migrants at risk especially during their long-distance movements. Therefore, precise knowledge about these migratory movements to understand where and when these animals are more exposed to human impacts is vital for addressing marine conservation issues. Because electronic tracking devices suffer from several constraints, mainly logistical and financial, there is emerging interest in finding appropriate intrinsic markers, such as the chemical composition of inert tissues, to study long-distance migrations and identify wintering sites. Here, using tracked pelagic seabirds and some of their own feathers which were known to be grown at different places and times within the annual cycle, we proved the value of biogeochemical analyses of inert tissue as tracers of marine movements and habitat use. Analyses of feathers grown in summer showed that both stable isotope signatures and element concentrations can signal the origin of breeding birds feeding in distinct water masses. However, only stable isotopes signalled water masses used during winter because elements mainly accumulated during the long breeding period are incorporated into feathers grown in both summer and winter. Our findings shed new light on the simple and effective assignment of marine organisms to distinct oceanic areas, providing new opportunities to study unknown migration patterns of secretive species, including in relation to human-induced mortality on specific populations in the marine environment.

  19. Intrinsic Turbulence Stabilization in a Stellarator

    Directory of Open Access Journals (Sweden)

    P. Xanthopoulos

    2016-06-01

    Full Text Available The magnetic surfaces of modern stellarators are characterized by complex, carefully optimized shaping and exhibit locally compressed regions of strong turbulence drive. Massively parallel computer simulations of plasma turbulence reveal, however, that stellarators also possess two intrinsic mechanisms to mitigate the effect of this drive. In the regime where the length scale of the turbulence is very small compared to the equilibrium scale set by the variation of the magnetic field, the strongest fluctuations form narrow bandlike structures on the magnetic surfaces. Thanks to this localization, the average transport through the surface is significantly smaller than that predicted at locations of peak turbulence. This feature results in a numerically observed upshift of the onset of turbulence on the surface towards higher ion temperature gradients as compared with the prediction from the most unstable regions. In a second regime lacking scale separation, the localization is lost and the fluctuations spread out on the magnetic surface. Nonetheless, stabilization persists through the suppression of the large eddies (relative to the equilibrium scale, leading to a reduced stiffness for the heat flux dependence on the ion temperature gradient. These fundamental differences with tokamak turbulence are exemplified for the QUASAR stellarator [G. H. Neilson et al., IEEE Trans. Plasma Sci. 42, 489 (2014].

  20. Genetic architecture of intrinsic antibiotic susceptibility.

    Directory of Open Access Journals (Sweden)

    Hany S Girgis

    2009-05-01

    Full Text Available Antibiotic exposure rapidly selects for more resistant bacterial strains, and both a drug's chemical structure and a bacterium's cellular network affect the types of mutations acquired.To better characterize the genetic determinants of antibiotic susceptibility, we exposed a transposon-mutagenized library of Escherichia coli to each of 17 antibiotics that encompass a wide range of drug classes and mechanisms of action. Propagating the library for multiple generations with drug concentrations that moderately inhibited the growth of the isogenic parental strain caused the abundance of strains with even minor fitness advantages or disadvantages to change measurably and reproducibly. Using a microarray-based genetic footprinting strategy, we then determined the quantitative contribution of each gene to E. coli's intrinsic antibiotic susceptibility. We found both loci whose removal increased general antibiotic tolerance as well as pathways whose down-regulation increased tolerance to specific drugs and drug classes. The beneficial mutations identified span multiple pathways, and we identified pairs of mutations that individually provide only minor decreases in antibiotic susceptibility but that combine to provide higher tolerance.Our results illustrate that a wide-range of mutations can modulate the activity of many cellular resistance processes and demonstrate that E. coli has a large mutational target size for increasing antibiotic tolerance. Furthermore, the work suggests that clinical levels of antibiotic resistance might develop through the sequential accumulation of chromosomal mutations of small individual effect.

  1. Toward a tripartite model of intrinsic motivation.

    Science.gov (United States)

    Carbonneau, Noémie; Vallerand, Robert J; Lafrenière, Marc-André K

    2012-10-01

    Intrinsic motivation (IM) refers to engaging in an activity for the pleasure inherent in the activity. The present article presents a tripartite model of IM consisting of IM to know (i.e., engaging in an activity to experience pleasure while learning and trying to understand something new), IM toward accomplishment (i.e., engaging in an activity for the pleasure experienced when attempting task mastery), and IM to experience stimulation (i.e., engaging in an activity for feelings of sensory pleasure). The tripartite model of IM posits that each type of IM can result from task, situational, and personality determinants and can lead to specific types of cognitive, affective, and behavioral outcomes. The purpose of this research was to test some predictions derived from this model. Across 4 studies (Study 1: N = 331; Study 2: N = 113; Study 3: N = 58; Study 4: N = 135), the 3 types of IM as well as potential determinants and consequences were assessed. Results revealed that experiencing one type of IM over the others depends in part on people's personality styles. Also, each type of IM was found to predict specific outcomes (i.e., affective states and behavioral choices). The implications of the tripartite model of IM for motivation research are discussed. © 2011 The Authors. Journal of Personality © 2011, Wiley Periodicals, Inc.

  2. Intrinsic gain modulation and adaptive neural coding.

    Directory of Open Access Journals (Sweden)

    Sungho Hong

    2008-07-01

    Full Text Available In many cases, the computation of a neural system can be reduced to a receptive field, or a set of linear filters, and a thresholding function, or gain curve, which determines the firing probability; this is known as a linear/nonlinear model. In some forms of sensory adaptation, these linear filters and gain curve adjust very rapidly to changes in the variance of a randomly varying driving input. An apparently similar but previously unrelated issue is the observation of gain control by background noise in cortical neurons: the slope of the firing rate versus current (f-I curve changes with the variance of background random input. Here, we show a direct correspondence between these two observations by relating variance-dependent changes in the gain of f-I curves to characteristics of the changing empirical linear/nonlinear model obtained by sampling. In the case that the underlying system is fixed, we derive relationships relating the change of the gain with respect to both mean and variance with the receptive fields derived from reverse correlation on a white noise stimulus. Using two conductance-based model neurons that display distinct gain modulation properties through a simple change in parameters, we show that coding properties of both these models quantitatively satisfy the predicted relationships. Our results describe how both variance-dependent gain modulation and adaptive neural computation result from intrinsic nonlinearity.

  3. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  4. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  5. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  6. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  7. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  8. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  9. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  10. Parallel-Bit Stream for Securing Iris Recognition

    OpenAIRE

    Elsayed Mostafa; Maher Mansour; Heba Saad

    2012-01-01

    Biometrics-based authentication schemes have usability advantages over traditional password-based authentication schemes. However, biometrics raises several privacy concerns, it has disadvantages comparing to traditional password in which it is not secured and non revocable. In this paper, we propose a fast method for securing revocable iris template using parallel-bit stream watermarking to overcome these problems. Experimental results prove that the proposed method has low computation time ...

  11. Quantum Secure Direct Communication with Five-Qubit Entangled State

    International Nuclear Information System (INIS)

    Lin Song; Liu Xiao-Fen; Gao Fei

    2011-01-01

    Recently, a genuine five-qubit entangled state has been achieved by Brown et al.[J. Phys. A 38 (2005) 1119]. Later it was indicated that this state can be used for quantum teleportation and quantum state sharing. Here we build a quantum secure direct communication protocol with this state, and prove that it is secure in ideal conditions. In the protocol, the sender performs unitary transformations to encode a secret message on his/her particles and sends them to the receiver. The receiver then performs projective determinate measurement to decode the secret message directly. Furthermore, this protocol utilizes superdense coding to achieve a high intrinsic efficiency and source capacity. (general)

  12. Fast Breeder Reactor studies

    International Nuclear Information System (INIS)

    Till, C.E.; Chang, Y.I.; Kittel, J.H.; Fauske, H.K.; Lineberry, M.J.; Stevenson, M.G.; Amundson, P.I.; Dance, K.D.

    1980-07-01

    This report is a compilation of Fast Breeder Reactor (FBR) resource documents prepared to provide the technical basis for the US contribution to the International Nuclear Fuel Cycle Evaluation. The eight separate parts deal with the alternative fast breeder reactor fuel cycles in terms of energy demand, resource base, technical potential and current status, safety, proliferation resistance, deployment, and nuclear safeguards. An Annex compares the cost of decommissioning light-water and fast breeder reactors. Separate abstracts are included for each of the parts

  13. Fast track-hoftealloplastik

    DEFF Research Database (Denmark)

    Hansen, Torben Bæk; Gromov, Kirill; Kristensen, Billy B

    2017-01-01

    Fast-track surgery implies a coordinated perioperative approach aimed at reducing surgical stress and facilitating post-operative recovery. The fast-track programme has reduced post-operative length of stay and has led to shorter convalescence with more rapid functional recovery and decreased...... morbidity and mortality in total hip arthroplasty. It should now be a standard total hip arthroplasty patient pathway, but fine tuning of the multiple factors in the fast-track pathway is still needed in patients with special needs or high comorbidity burden....

  14. Fast Breeder Reactor studies

    Energy Technology Data Exchange (ETDEWEB)

    Till, C.E.; Chang, Y.I.; Kittel, J.H.; Fauske, H.K.; Lineberry, M.J.; Stevenson, M.G.; Amundson, P.I.; Dance, K.D.

    1980-07-01

    This report is a compilation of Fast Breeder Reactor (FBR) resource documents prepared to provide the technical basis for the US contribution to the International Nuclear Fuel Cycle Evaluation. The eight separate parts deal with the alternative fast breeder reactor fuel cycles in terms of energy demand, resource base, technical potential and current status, safety, proliferation resistance, deployment, and nuclear safeguards. An Annex compares the cost of decommissioning light-water and fast breeder reactors. Separate abstracts are included for each of the parts.

  15. Intrinsic and Extrinsic Motivation for Stereotypic and Repetitive Behavior

    Science.gov (United States)

    Joosten, Annette V.; Bundy, Anita C.; Einfeld, Stewart L.

    2009-01-01

    This study provides evidence for intrinsic and extrinsic motivators for stereotypical and repetitive behavior in children with autism and intellectual disability and children with intellectual disability alone. We modified the Motivation Assessment Scale (MAS) (1988b); dividing it into intrinsic and extrinsic measures and adding items to assess…

  16. A prototype empirical framework of intrinsic and extrinsic EERQI indicators

    NARCIS (Netherlands)

    Mooij, Ton

    2012-01-01

    The research question is: What do statistical analyses show us about the relationships between intrinsic and extrinsic indicators of quality and what does this mean when constructing a prototype EERQI framework? The pilot study involved the scoring on both intrinsic and extrinsic indica-tors for 177

  17. Intrinsic Motivation and Flow Condition on the Music Teacher's Performance

    Science.gov (United States)

    Torres Delgado, Gabriela

    2017-01-01

    The aim of these research is to identify if music teachers and teachers from other areas are intrinsically or extrinsically motivated, to identify the dimensions of the flow state, and to identify if there is a relationship between intrinsic motivation and flow state in these teachers. The sample was made up of 738 active teachers. The presence of…

  18. Palatalization and Intrinsic Prosodic Vowel Features in Russian

    Science.gov (United States)

    Ordin, Mikhail

    2011-01-01

    The presented study is aimed at investigating the interaction of palatalization and intrinsic prosodic features of the vowel in CVC (consonant+vowel+consonant) syllables in Russian. The universal nature of intrinsic prosodic vowel features was confirmed with the data from the Russian language. It was found that palatalization of the consonants…

  19. Cooperative motion of intrinsic and actuated semiflexible swimmers

    NARCIS (Netherlands)

    Llopis, I.; Pagonabarraga, I.; Lagomarsino, M.C.; Lowe, C.P.

    2013-01-01

    We examine the phenomenon of hydrodynamic-induced cooperativity for pairs of flagellated micro-organism swimmers, of which spermatozoa cells are an example. We consider semiflexible swimmers, where inextensible filaments are driven by an internal intrinsic force and torque-free mechanism (intrinsic

  20. The Relations of Mothers' Controlling Vocalizations to Children's Intrinsic Motivation.

    Science.gov (United States)

    Deci, Edward L.; And Others

    1993-01-01

    Coded maternal vocalizations during videotaped play sessions of mothers and their six- or seven-year-old children. Children's intrinsic motivation was assessed by observing children's play when they were alone in a room. Found a negative relationship between maternal controlling vocalizations and children's intrinsic motivation. (MM)

  1. Importance of Intrinsic and Instrumental Value of Education in Pakistan

    Science.gov (United States)

    Kumar, Mahendar

    2017-01-01

    Normally, effectiveness of any object or thing is judged by two values; intrinsic and instrumental. To compare intrinsic value of education with instrumental value, this study has used the following variables: getting knowledge for its own sake, getting knowledge for social status, getting knowledge for job or business endeavor and getting…

  2. College Student Intrinsic and/or Extrinsic Motivation and Learning.

    Science.gov (United States)

    Lin, Yi-Guang; McKeachie, Wilbert J.

    This paper investigates the joint effects of intrinsic and extrinsic goals on college students' learning in an introductory psychology course, a biology course, and several social science courses. The study questioned whether higher levels of motivation lead to better student performance. College students were surveyed using the Intrinsic Goal…

  3. Self-Determination Theory: Intrinsic Motivation and Behavioral Change.

    Science.gov (United States)

    Flannery, Marie

    2017-03-01

    Motivation is a central concept in behavioral change. This article reviews the self-determination theory with an emphasis on "intrinsic motivation," which is facilitated when three basic psychological needs (autonomy, competence, and relatedness) are met. Intrinsic motivation is associated with improved well-being and sustained behavioral change.

  4. Leadership style and employees' intrinsic job satisfaction in the ...

    African Journals Online (AJOL)

    This study investigates the impact of leadership style on employees' intrinsic job satisfaction in the Cross River State Newspaper Corporation, Calabar, Nigeria. The study examined the problem of dissatisfaction in the work place as far as intrinsic factors of job satisfaction are concerned. Structured questionnaire was used ...

  5. Elderly Taiwanese's Intrinsic Risk Factors for Fall-related Injuries

    Directory of Open Access Journals (Sweden)

    In-Fun Li

    2016-09-01

    Conclusion: Elderly Taiwanese inpatients with existing intrinsic conditions of cancer, vertigo, and lower leg weakness were at high risk of falling, resulting in severe injuries. Additional research including controlled trials is necessary to further identify treatable, causal intrinsic risk factors for this elderly group.

  6. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  7. On the Security of Mexican Digital Fiscal Documents

    OpenAIRE

    González García, Vladimir; Rodríguez Henríquez, Francisco; Cruz Cortés, Nareli

    2008-01-01

    In January 2005, the Mexican Tributary Administration System (SAT) introduced an official norm that stipulates how to generate electronic invoices that were termed by SAT, Comprobante Fiscal Digital (CFD). Supporting the CFD service implies the exchange of confidential information over Internet and other communication channels that are intrinsically highly vulnerable. Therefore, it becomes indispensable to incorporate to this service reliable and sound information security mechanisms. In the ...

  8. Intrinsic motivation and sportsmanship: mediating role of interpersonal relationships.

    Science.gov (United States)

    Núñez, Juan L; Martín-Albo, José; Navarro, José G; Sánchez, Juana M; González-Cutre, David

    2009-06-01

    This study analyzed the mediating role of interpersonal relations between intrinsic motivation and sportsmanship. Athletes (98 men, 97 women), ages 11 to 43 years, completed measures of intrinsic motivation toward sports, self-concept of social and family relations, and sportsmanship orientation. A structural equation model indicated that self-concept of interpersonal relations mediated the relation between intrinsic motivation and sportsmanship. Also, intrinsic motivation was directly and positively associated with self-concept of interpersonal relations, which, in turn, was positively and significantly related to sportsmanship. Variances explained by self-concept of interpersonal relations and by sportsmanship were 32 and 56%, respectively. The motivational interaction between the context of interpersonal relations and the sports context proposed in the hierarchical model of intrinsic and extrinsic motivation was discussed.

  9. Ethnic Stigma, Academic Anxiety, and Intrinsic Motivation in Middle Childhood

    Science.gov (United States)

    Gillen-O’Neel, Cari; Ruble, Diane N.; Fuligni, Andrew J.

    2011-01-01

    Previous research addressing the dynamics of stigma and academics has focused on African-American adolescents and adults. The present study examined stigma awareness, academic anxiety, and intrinsic motivation among 451 young (ages 6–11) and diverse (African-American, Chinese, Dominican, Russian, and European-American) students. Results indicated that ethnic-minority children reported higher stigma awareness than European-American children. For all children, stigma awareness was associated with higher academic anxiety and lower intrinsic motivation. Despite these associations, ethnic-minority children reported higher levels of intrinsic motivation than their European-American peers. A significant portion of the higher intrinsic motivation among Dominican students was associated with their higher levels of school belonging, suggesting that supportive school environments may be important sources of intrinsic motivation among some ethnic-minority children. PMID:21883152

  10. Extrinsic and intrinsic regulation of axon regeneration at a crossroads.

    Science.gov (United States)

    Kaplan, Andrew; Ong Tone, Stephan; Fournier, Alyson E

    2015-01-01

    Repair of the injured spinal cord is a major challenge in medicine. The limited intrinsic regenerative response mounted by adult central nervous system (CNS) neurons is further hampered by astrogliosis, myelin debris and scar tissue that characterize the damaged CNS. Improved axon regeneration and recovery can be elicited by targeting extrinsic factors as well as by boosting neuron-intrinsic growth regulators. Our knowledge of the molecular basis of intrinsic and extrinsic regulators of regeneration has expanded rapidly, resulting in promising new targets to promote repair. Intriguingly certain neuron-intrinsic growth regulators are emerging as promising targets to both stimulate growth and relieve extrinsic inhibition of regeneration. This crossroads between the intrinsic and extrinsic aspects of spinal cord injury is a promising target for effective therapies for this unmet need.

  11. Motivating crowding theory - opening the black box of intrinsic motivation

    DEFF Research Database (Denmark)

    Jacobsen, Christian Bøtcher

    2010-01-01

    Public employees work for many other reasons than because they are paid for it. In other words, intrinsic motivation is an important determinant for their performance. Nonetheless, public sector organizations increasingly rely on extrinsic motivation factors such as monetary incentives to motivate...... employees. Motivation crowding theory claims that this may be at the expense of intrinsic motivation, if the extrinsic motivation factor is perceived to be controlling. On the other hand, intrinsic motivation will be enhanced (crowded in), if the extrinsic motivation factor is perceived to be supportive......, monetary incentives are found to cause different crowding effects for these different types of intrinsic motivation. The results call for more theoretical work on the drivers of motivation crowding effects and for practitioners to pay more attention to what type of intrinsic motivation is at stake, when...

  12. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  13. Overview of security culture

    International Nuclear Information System (INIS)

    Matulanya, M. A.

    2014-04-01

    Nuclear Security culture concept has been aggressively promoted over the past several years as a tool to improve the physical protection of the nuclear and radioactive materials due to growing threats of catastrophic terrorism and other new security challenges. It is obvious that, the scope of nuclear security and the associated cultures need to be extended beyond the traditional task of protecting weapons-usable materials. The role of IAEA is to strengthen the nuclear security framework globally and in leading the coordination of international activities in this field. Therefore all governments should work closely with the IAEA to take stronger measures to ensure the physical protection, the safety and security of the nuclear and radioactive materials. In the effort to reflect this new realities and concerns, the IAEA in 2008 came up with the document, the Nuclear Security Culture, Nuclear Security Series No. 7, Implementing Guide to the member states which urged every member state to take appropriate measures to promote security culture with respect to nuclear and radioactive materials. The document depicted this cultural approach as the way to protect individual, society and the environment. Among other things, the document defined nuclear security culture as characteristics and attitudes in organizations and of individuals which establishes that, nuclear security issues receives attention warranted by their significance. (au)

  14. Theory, Demonstration and Methods: Research on Social Security of Migrant Workers by Domestic Scholar

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Social security of migrant workers has been significant in dissolving social contradictions and achieving the economic and social development in China during the transitional period. The researches of domestic scholar on social security of migrant workers can be classified into three categories. Firstly, theoretical analysis on social security of migrant workers, including researches on the appeal of social security and misunderstanding of recognition, theory-construction of rural worker social security, policy defects and equity construction in social security system of migrant workers. Secondly, real studies on social security of migrant workers, including researches on sequence of demand and influencing factors of social security of migrant workers as well as intrinsic motivation forming the perspective on social security. Lastly, road exploration of establishing social security system, including researches on the multi-level development of rural worker social security system, comparison of "Double-low method", "Guangdong Method" and "Shanghai Method" of the social security of migrant workers in Zhejiang Province and establishing multi-level social security system according to the hierarchy after the internal differentiation.

  15. FastStats: Measles

    Science.gov (United States)

    ... Women’s Health State and Territorial Data Reproductive Health Contraceptive Use Infertility Reproductive Health Notice Regarding FastStats Mobile ... measles, mumps, rubella: 91.9% (2015) Percent of adolescents aged 13-17 years vaccinated against measles, mumps, ...

  16. Dounreay fast reactor

    International Nuclear Information System (INIS)

    Maclennan, R.; Eggar, T.; Skeet, T.

    1992-01-01

    The short debate which followed a private notice question asking for a statement on Government policy on the future of the European fast breeder nuclear research programme is reported verbatim. In response to the question, the Minister for Energy said that the Government had decided in 1988 that the Dounreay prototype fast reactor would close in 1994. That decision had been confirmed. Funding of fast breeder research and development beyond 1993 is not a priority as commercialization is not expected until well into the next century. Dounreay will be supported financially until 1994 and then for its subsequent decommissioning and reprocessing of spent fuel. The debate raised issues such as Britain losing its lead in fast breeder research, loss of jobs and the Government's nuclear policy in general. However, the Government's position was that the research had reached a stage where it could be left and returned to in the future. (UK)

  17. CMS Fast Facts

    Data.gov (United States)

    U.S. Department of Health & Human Services — CMS has developed a new quick reference statistical summary on annual CMS program and financial data. CMS Fast Facts includes summary information on total program...

  18. Brug af faste vendinger

    DEFF Research Database (Denmark)

    Bergenholtz, Henning; Bjærge, Esben

    Ordbogen indelholder tekstproduktionsangivelser til ca. 17.000 idiomer, ordsprog, bevingede ord og andre faste vendinger. Det drejer sig bl.a. om angivelser til betydningen, grammatik, kollokationer, eksempler, synonymer og antonymer....

  19. Intrinsic Evaporative Cooling by Hygroscopic Earth Materials

    Directory of Open Access Journals (Sweden)

    Alexandra R. Rempel

    2016-08-01

    Full Text Available The phase change of water from liquid to vapor is one of the most energy-intensive physical processes in nature, giving it immense potential for cooling. Diverse evaporative cooling strategies have resulted worldwide, including roof ponds and sprinklers, courtyard fountains, wind catchers with qanats, irrigated green roofs, and fan-assisted evaporative coolers. These methods all require water in bulk liquid form. The evaporation of moisture that has been sorbed from the atmosphere by hygroscopic materials is equally energy-intensive, however, yet has not been examined for its cooling potential. In arid and semi-arid climates, hygroscopic earth buildings occur widely and are known to maintain comfortable indoor temperatures, but evaporation of moisture from their walls and roofs has been regarded as unimportant since water scarcity limits irrigation and rainfall; instead, their cool interiors are attributed to well-established mass effects in delaying the transmission of sensible gains. Here, we investigate the cooling accomplished by daily cycles of moisture sorption and evaporation which, requiring only ambient humidity, we designate as “intrinsic” evaporative cooling. Connecting recent soil science to heat and moisture transport studies in building materials, we use soils, adobe, cob, unfired earth bricks, rammed earth, and limestone to reveal the effects of numerous parameters (temperature and relative humidity, material orientation, thickness, moisture retention properties, vapor diffusion resistance, and liquid transport properties on the magnitude of intrinsic evaporative cooling and the stabilization of indoor relative humidity. We further synthesize these effects into concrete design guidance. Together, these results show that earth buildings in diverse climates have significant potential to cool themselves evaporatively through sorption of moisture from humid night air and evaporation during the following day’s heat. This finding

  20. Fasting and Urinary Stones

    Directory of Open Access Journals (Sweden)

    Ali Shamsa

    2013-11-01

    Full Text Available Introduction: Fasting is considered as one of the most important practices of Islam, and according to Prophet Mohammad, fasting is obligatory upon Muslims. The aim of this study is to evaluate the effects of fasting on urinary stones. Materials and Methods: Very few studies have been carried out on urinary stones and the effect of Ramadan fasting. The sources of the present study are Medline and articles presented by local and Muslim researchers. Meanwhile, since we are acquainted with three well-known researchers in the field of urology, we contacted them via email and asked for their professional opinions. Results: The results of studies about the relationship of urinary stones and their incidence in Ramadan are not alike, and are even sometimes contradictory. Some believe that increased incidence of urinary stones in Ramadan is related not to fasting, but to the rise of weather temperature in hot months, and an increase in humidity. Conclusion: Numerous biological and behavioral changes occur in people who fast in Ramadan and some researchers believe that urinary stone increases during this month.

  1. The safety of the fast reactor

    International Nuclear Information System (INIS)

    Matthews, R.R.

    1977-01-01

    Verbatim of an address by R.R. Matthews, Chief Nuclear Health and Safety Officer, UK Central Electricity Generating Board given on January 15th 1977. The object of this address was to give some opinions on the safety issues of fast reactors as seen from an operational point of view. An outline of the basic responsibilities for nuclear safety is first given, and it is emphasized that the Central Electricity Generating Board has a statutory responsibility for the safe operation of its nuclear plant. The Nuclear Installations Act places absolute responsibility on the operator for ensuring that injury to persons and damage to property do not occur, and the new Health and Safety at Work Act does likewise. In addition the Board has a Nuclear Health and Safety Department that has to ensure that adequate provision for safety is made in the design, construction, and operation of nuclear plant, and safety at operational stations is monitored continuously by inspectors. In addition the requirements of the Nuclear Installations Inspectorate, laid down in the site licence conditions, must be satisfied. All these requirements are here discussed in the light of application to commercial fast reactors. It is considered that the hazards to fast reactor operating personnel are small and little different from those of other types of reactor, and in some respects the fast reactor has advantages, particularly in regard to the use of a Na coolant. The possibility of various types of accident is considered. Radioactive effluent discharge is also considered. The fast reactor as an international problem is discussed, including security matters. The extensive experience gained in operation of the experimental and prototype fast reactors at Dounreay is emphasized. (U.K.)

  2. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  3. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t ... in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...

  4. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  5. Materialism and food security.

    Science.gov (United States)

    Allen, M W; Wilson, M

    2005-12-01

    The present studies examined if materialists have an elevated concern about food availability, presumably stemming from a general survival security motivation. Study 1 found that materialists set a greater life goal of food security, and reported more food insecurity during their childhood. Materialists reported less present-day food insecurity. Study 2 revealed that materialists stored/hoarded more food at home, and that obese persons endorsed materialism more than low/normal weight persons. Study 3 found that experimentally decreasing participants' feelings of survival security (via a mortality salience manipulation) led to greater endorsement of materialism, food security as goal, and using food for emotional comfort. The results imply that materialists overcame the food insecurity of their childhood by making food security a top life goal, but that materialists' current concerns about food security may not wholly stem from genuine threats to their food supply.

  6. PRIVATE SECURITY IN SPORT

    Directory of Open Access Journals (Sweden)

    Dragan Vukasović

    2011-09-01

    Full Text Available Given the importance of sport for international integration, affirmation, a sense of belonging and other values of general interest, in order to maintain and open new prospects of development, it is necessary to form the private security system along with state security system, with a view to creating conditions for development sports athletes to achieve better results both in domestic and international competitions. Private security is only one element of an integrated security system which, with its efficient organization with the use of adequate means and measures should provide answers to new challenges, risks and threats. Private security in line with the new understanding of the concept of security has an important role in providing athletes.

  7. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard...... IT security mechanisms or via workarounds, it will influence their experience of security. If researchers and designers only focus on IT security artifacts and fail to take the user experience into account, incorrect processes or workarounds will occur. Accordingly, to get users to follow the correct process...... may seem to be a criterion of success, even though it may yield a less appropriate experience of security. This dissertation deals with an improved understanding of IT security sensitive IT artifacts and presents three design methods, and a framework for addressing the complexities and contingencies...

  8. While working around security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  9. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  10. ITIL® and information security

    International Nuclear Information System (INIS)

    Jašek, Roman; Králík, Lukáš; Popelka, Miroslav

    2015-01-01

    This paper discusses the context of ITIL framework and management of information security. It is therefore a summary study, where the first part is focused on the safety objectives in connection with the ITIL framework. First of all, there is a focus on ITIL process ISM (Information Security Management), its principle and system management. The conclusion is about link between standards, which are related to security, and ITIL framework

  11. Towards Information Security Awareness

    OpenAIRE

    Marius Petrescu; Delia Mioara Popescu; Nicoleta Sirbu

    2010-01-01

    Information security has come to be recognized as increasingly important because global communication and information systems allow a potentially large number of unauthorized users to access and possibly alter information from around the world. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity, no matter if it is a company or a public institution. Information security involves both technology and people. Any securi...

  12. Outsourcing information security

    CERN Document Server

    Axelrod, Warren

    2004-01-01

    This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

  13. Cloud Infrastructure Security

    OpenAIRE

    Velev , Dimiter; Zlateva , Plamena

    2010-01-01

    Part 4: Security for Clouds; International audience; Cloud computing can help companies accomplish more by eliminating the physical bonds between an IT infrastructure and its users. Users can purchase services from a cloud environment that could allow them to save money and focus on their core business. At the same time certain concerns have emerged as potential barriers to rapid adoption of cloud services such as security, privacy and reliability. Usually the information security professiona...

  14. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  15. Addressing Software Security

    Science.gov (United States)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  16. Auditing Organizational Security

    Science.gov (United States)

    2017-01-01

    Organi- zation for Standardiza- tion ( ISO ): ISO 27000 : Information Systems Se- curity Management. A robust program of internal auditing of a...improvement is the basis and underpinning of the ISO . All processes must be considered ongoing and never at an “end state.” Top management develops a...security management system, including security policies and security objectives, plus threats and risks. Orga- nizations already working with ISO 9000

  17. Intercorporate Security Event Correlation

    Directory of Open Access Journals (Sweden)

    D. O. Kovalev

    2010-03-01

    Full Text Available Security controls are prone to false positives and false negatives which can lead to unwanted reputation losses for the bank. The reputational database within the security operations center (SOC and intercorporate correlation of security events are offered as a solution to increase attack detection fidelity. The theses introduce the definition and structure of the reputation, architectures of reputational exchange and the place of intercorporate correlation in overall SOC correlation analysis.

  18. Assessment of plutonium security effect using import premium method

    International Nuclear Information System (INIS)

    Ohkubo, Hiroo; Aoyagi, Tadashi; Kikuchi, Masahiro; Suzuki, Atsuyuki.

    1994-01-01

    A mathematical formulation was developed to describe the concept of import premium method, which can quantify a security effect of demand reduction of imports by introducing the alternative before its supply disruption (or variation) may happen. Next, by using this formula, a security value of plutonium use (especially, fast breeder reactor), defined as a contributor to reduction of possibilities of disruption (or variation) of natural uranium supply was estimated. From these studies, it is concluded that although the formula proposed here is simplified, it may be available for assessing an energy security if only we prepare the data concerning future motions of supply and demand curves. (author)

  19. Chemical Security Analysis Center

    Data.gov (United States)

    Federal Laboratory Consortium — In 2006, by Presidential Directive, DHS established the Chemical Security Analysis Center (CSAC) to identify and assess chemical threats and vulnerabilities in the...

  20. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  1. VoIP Security

    OpenAIRE

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  2. Secure Virtual Enclaves

    National Research Council Canada - National Science Library

    Shands, Deborah

    2002-01-01

    The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application resources, while respecting organizational autonomy over local resources...

  3. Beginning ASPNET Security

    CERN Document Server

    Dorrans, Barry

    2010-01-01

    Beginning ASP.NET 3.5 Security is geared for novice to intermediate ASP.NET programmers who wish to protect and defend their web sites against attack and exploitation. Beginning with a discussion of why we need security and the things that may occur when it is ignored and an overview of how ASP.NET works, readers are taken through the common steps in developing a web site, the security problems each area exposes and how these can be exploited. Visual Studio Security MVP Barry Dorrans teaches readers how they can defend their applications using the standard .NET framework, industry patterns and

  4. Governing for Enterprise Security

    National Research Council Canada - National Science Library

    Allen, Julia

    2005-01-01

    ... business. If an organization's management -- including boards of directors, senior executives, and all managers -- does not establish and reinforce the business need for effective enterprise security...

  5. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  6. National Security Whistleblowers

    National Research Council Canada - National Science Library

    Fisher, Louis

    2005-01-01

    .... Domestic and national security information is provided through agency reports and direct communications from department heads, but lawmakers also receive information directly from employees within the agencies...

  7. Linux Security Cookbook

    CERN Document Server

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  8. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  9. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  10. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  11. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  12. Separating intrinsic from extrinsic fluctuations in dynamic biological systems.

    Science.gov (United States)

    Hilfinger, Andreas; Paulsson, Johan

    2011-07-19

    From molecules in cells to organisms in ecosystems, biological populations fluctuate due to the intrinsic randomness of individual events and the extrinsic influence of changing environments. The combined effect is often too complex for effective analysis, and many studies therefore make simplifying assumptions, for example ignoring either intrinsic or extrinsic effects to reduce the number of model assumptions. Here we mathematically demonstrate how two identical and independent reporters embedded in a shared fluctuating environment can be used to identify intrinsic and extrinsic noise terms, but also how these contributions are qualitatively and quantitatively different from what has been previously reported. Furthermore, we show for which classes of biological systems the noise contributions identified by dual-reporter methods correspond to the noise contributions predicted by correct stochastic models of either intrinsic or extrinsic mechanisms. We find that for broad classes of systems, the extrinsic noise from the dual-reporter method can be rigorously analyzed using models that ignore intrinsic stochasticity. In contrast, the intrinsic noise can be rigorously analyzed using models that ignore extrinsic stochasticity only under very special conditions that rarely hold in biology. Testing whether the conditions are met is rarely possible and the dual-reporter method may thus produce flawed conclusions about the properties of the system, particularly about the intrinsic noise. Our results contribute toward establishing a rigorous framework to analyze dynamically fluctuating biological systems.

  13. VELOCITY EVOLUTION AND THE INTRINSIC COLOR OF TYPE Ia SUPERNOVAE

    International Nuclear Information System (INIS)

    Foley, Ryan J.; Sanders, Nathan E.; Kirshner, Robert P.

    2011-01-01

    To understand how best to use observations of Type Ia supernovae (SNe Ia) to obtain precise and accurate distances, we investigate the relations between spectra of SNe Ia and their intrinsic colors. Using a sample of 1630 optical spectra of 255 SNe, based primarily on data from the CfA Supernova Program, we examine how the velocity evolution and line strengths of Si II λ6355 and Ca II H and K are related to the B – V color at peak brightness. We find that the maximum-light velocity of Si II λ6355 and Ca II H and K and the maximum-light pseudo-equivalent width of Si II λ6355 are correlated with intrinsic color, with intrinsic color having a linear relation with the Si II λ6355 measurements. Ca II H and K does not have a linear relation with intrinsic color, but lower-velocity SNe tend to be intrinsically bluer. Combining the spectroscopic measurements does not improve intrinsic color inference. The intrinsic color scatter is larger for higher-velocity SNe Ia—even after removing a linear trend with velocity—indicating that lower-velocity SNe Ia are more 'standard crayons'. Employing information derived from SN Ia spectra has the potential to improve the measurements of extragalactic distances and the cosmological properties inferred from them.

  14. Beyond the evoked/intrinsic neural process dichotomy

    Directory of Open Access Journals (Sweden)

    Taylor Bolt

    2018-03-01

    Full Text Available Contemporary functional neuroimaging research has increasingly focused on characterization of intrinsic or “spontaneous” brain activity. Analysis of intrinsic activity is often contrasted with analysis of task-evoked activity that has traditionally been the focus of cognitive neuroscience. But does this evoked/intrinsic dichotomy adequately characterize human brain function? Based on empirical data demonstrating a close functional interdependence between intrinsic and task-evoked activity, we argue that the dichotomy between intrinsic and task-evoked activity as unobserved contributions to brain activity is artificial. We present an alternative picture of brain function in which the brain’s spatiotemporal dynamics do not consist of separable intrinsic and task-evoked components, but reflect the enaction of a system of mutual constraints to move the brain into and out of task-appropriate functional configurations. According to this alternative picture, cognitive neuroscientists are tasked with describing both the temporal trajectory of brain activity patterns across time, and the modulation of this trajectory by task states, without separating this process into intrinsic and task-evoked components. We argue that this alternative picture of brain function is best captured in a novel explanatory framework called enabling constraint. Overall, these insights call for a reconceptualization of functional brain activity, and should drive future methodological and empirical efforts.

  15. SELECTING QUASARS BY THEIR INTRINSIC VARIABILITY

    International Nuclear Information System (INIS)

    Schmidt, Kasper B.; Rix, Hans-Walter; Jester, Sebastian; Hennawi, Joseph F.; Marshall, Philip J.; Dobler, Gregory

    2010-01-01

    We present a new and simple technique for selecting extensive, complete, and pure quasar samples, based on their intrinsic variability. We parameterize the single-band variability by a power-law model for the light-curve structure function, with amplitude A and power-law index γ. We show that quasars can be efficiently separated from other non-variable and variable sources by the location of the individual sources in the A-γ plane. We use ∼60 epochs of imaging data, taken over ∼5 years, from the SDSS stripe 82 (S82) survey, where extensive spectroscopy provides a reference sample of quasars, to demonstrate the power of variability as a quasar classifier in multi-epoch surveys. For UV-excess selected objects, variability performs just as well as the standard SDSS color selection, identifying quasars with a completeness of 90% and a purity of 95%. In the redshift range 2.5 < z < 3, where color selection is known to be problematic, variability can select quasars with a completeness of 90% and a purity of 96%. This is a factor of 5-10 times more pure than existing color selection of quasars in this redshift range. Selecting objects from a broad griz color box without u-band information, variability selection in S82 can afford completeness and purity of 92%, despite a factor of 30 more contaminants than quasars in the color-selected feeder sample. This confirms that the fraction of quasars hidden in the 'stellar locus' of color space is small. To test variability selection in the context of Pan-STARRS 1 (PS1) we created mock PS1 data by down-sampling the S82 data to just six epochs over 3 years. Even with this much sparser time sampling, variability is an encouragingly efficient classifier. For instance, a 92% pure and 44% complete quasar candidate sample is attainable from the above griz-selected catalog. Finally, we show that the presented A-γ technique, besides selecting clean and pure samples of quasars (which are stochastically varying objects), is also

  16. Bigdata Driven Cloud Security: A Survey

    Science.gov (United States)

    Raja, K.; Hanifa, Sabibullah Mohamed

    2017-08-01

    Cloud Computing (CC) is a fast-growing technology to perform massive-scale and complex computing. It eliminates the need to maintain expensive computing hardware, dedicated space, and software. Recently, it has been observed that massive growth in the scale of data or big data generated through cloud computing. CC consists of a front-end, includes the users’ computers and software required to access the cloud network, and back-end consists of various computers, servers and database systems that create the cloud. In SaaS (Software as-a-Service - end users to utilize outsourced software), PaaS (Platform as-a-Service-platform is provided) and IaaS (Infrastructure as-a-Service-physical environment is outsourced), and DaaS (Database as-a-Service-data can be housed within a cloud), where leading / traditional cloud ecosystem delivers the cloud services become a powerful and popular architecture. Many challenges and issues are in security or threats, most vital barrier for cloud computing environment. The main barrier to the adoption of CC in health care relates to Data security. When placing and transmitting data using public networks, cyber attacks in any form are anticipated in CC. Hence, cloud service users need to understand the risk of data breaches and adoption of service delivery model during deployment. This survey deeply covers the CC security issues (covering Data Security in Health care) so as to researchers can develop the robust security application models using Big Data (BD) on CC (can be created / deployed easily). Since, BD evaluation is driven by fast-growing cloud-based applications developed using virtualized technologies. In this purview, MapReduce [12] is a good example of big data processing in a cloud environment, and a model for Cloud providers.

  17. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  18. 21st Century Security Manager

    OpenAIRE

    Stelian ARION

    2010-01-01

    We live in world of uncertainty that generates major paradigms changing that affect security risk management. Modern organization’s security risks management can’t be done without a profound knowlegde and daily practice for security governance, security risk management and resilience. 21st Century security manager need to deal with several areas of konwledge in order to succesfully manage security risks. The document presents the advantages, disadvantages and challenges for security managers ...

  19. Intrinsic and Extrinsic Motivations: Classic Definitions and New Directions.

    Science.gov (United States)

    Ryan; Deci

    2000-01-01

    Intrinsic and extrinsic types of motivation have been widely studied, and the distinction between them has shed important light on both developmental and educational practices. In this review we revisit the classic definitions of intrinsic and extrinsic motivation in light of contemporary research and theory. Intrinsic motivation remains an important construct, reflecting the natural human propensity to learn and assimilate. However, extrinsic motivation is argued to vary considerably in its relative autonomy and thus can either reflect external control or true self-regulation. The relations of both classes of motives to basic human needs for autonomy, competence and relatedness are discussed. Copyright 2000 Academic Press.

  20. Congenital hypertrophy of multiple intrinsic muscles of the foot.

    Science.gov (United States)

    Shiraishi, Tomohiro; Park, Susam; Niu, Atushi; Hasegawa, Hiromi

    2014-12-01

    Congenital hypertrophy of a single intrinsic muscle of the foot is rare, and as far as we know, only six cases have been reported. We describe a case of congenital anomaly that showed hypertrophy of multiple intrinsic muscles of the foot; the affected muscles were all the intrinsic muscles of the foot except the extensor digitorum brevis or extensor hallucis. Other tissues such as adipose tissue, nervous tissue, or osseous tissue showed no abnormalities. To reduce the volume of the foot we removed parts of the enlarged muscles.

  1. Some chaotic features of intrinsically coupled Josephson junctions

    International Nuclear Information System (INIS)

    Kolahchi, M.R.; Shukrinov, Yu.M.; Hamdipour, M.; Botha, A.E.; Suzuki, M.

    2013-01-01

    Highlights: ► Intrinsically coupled Josephson junctions model a high-T c superconductor. ► Intrinsically coupled Josephson junctions can act as a chaotic nonlinear system. ► Chaos could be due to resonance overlap. ► Avoiding parameters that lead to chaos is important for the design of resonators. -- Abstract: We look for chaos in an intrinsically coupled system of Josephson junctions. This study has direct applications for the high-T c resonators which require coherence amongst the junctions

  2. Intrinsic Density Matrices of the Nuclear Shell Model

    International Nuclear Information System (INIS)

    Deveikis, A.; Kamuntavichius, G.

    1996-01-01

    A new method for calculation of shell model intrinsic density matrices, defined as two-particle density matrices integrated over the centre-of-mass position vector of two last particles and complemented with isospin variables, has been developed. The intrinsic density matrices obtained are completely antisymmetric, translation-invariant, and do not employ a group-theoretical classification of antisymmetric states. They are used for exact realistic density matrix expansion within the framework of the reduced Hamiltonian method. The procedures based on precise arithmetic for calculation of the intrinsic density matrices that involve no numerical diagonalization or orthogonalization have been developed and implemented in the computer code. (author). 11 refs., 2 tabs

  3. The intrinsic stochasticity of near-integrable Hamiltonian systems

    Energy Technology Data Exchange (ETDEWEB)

    Krlin, L [Ceskoslovenska Akademie Ved, Prague (Czechoslovakia). Ustav Fyziky Plazmatu

    1989-09-01

    Under certain conditions, the dynamics of near-integrable Hamiltonian systems appears to be stochastic. This stochasticity (intrinsic stochasticity, or deterministic chaos) is closely related to the Kolmogorov-Arnold-Moser (KAM) theorem of the stability of near-integrable multiperiodic Hamiltonian systems. The effect of the intrinsic stochasticity attracts still growing attention both in theory and in various applications in contemporary physics. The paper discusses the relation of the intrinsic stochasticity to the modern ergodic theory and to the KAM theorem, and describes some numerical experiments on related astrophysical and high-temperature plasma problems. Some open questions are mentioned in conclusion. (author).

  4. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  5. Security dialogues: building better relationships between security and business

    OpenAIRE

    Ashenden, Debi; Lawrence, Darren

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.

  6. Fast breeder reactors

    International Nuclear Information System (INIS)

    Waltar, A.E.; Reynolds, A.B.

    1981-01-01

    This book describes the major design features of fast breeder reactors and the methods used for their design and analysis. The foremost objective of this book is to fulfill the need for a textbook on Fast Breeder Reactor (FBR) technology at the graduate level or the advanced undergraduate level. It is assumed that the reader has an introductory understanding of reactor theory, heat transfer, and fluid mechanics. The book is expected to be used most widely for a one-semester general course on fast breeder reactors, with the extent of material covered to vary according to the interest of the instructor. The book could also be used effectively for a two-quarter or a two-semester course. In addition, the book could serve as a text for a course on fast reactor safety since many topics other than those appearing in the safety chapters relate to FBR safety. Methodology in fast reactor design and analysis, together with physical descriptions of systems, is emphasized in this text more than numerical results. Analytical and design results continue to change with the ongoing evolution of FBR design whereas many design methods have remained fundamentally unchanged for a considerable time

  7. Fast reactor programme

    International Nuclear Information System (INIS)

    Plakman, J.C.

    1982-01-01

    This progress report summarizes the fast reactor research carried out by ECN during the period covering the year 1980. This research is mainly concerned with the cores of sodium-cooled breeders, in particular the SNR-300, and its related safety aspects. It comprises six items: A programme to determine relevant nuclear data of fission- and corrosion-products; A fuel performance programme comprising in-pile cladding failure experiments and a study of the consequences of loss-of-cooling and overpower; Basic research on fuel; Investigation of the changes in the mechanical properties of austenitic stainless steel DIN 1.4948 due to fast neutron doses, this material has been used in the manufacture of the reactor vessel and its internal components; Study of aerosols which could be formed at the time of a fast reactor accident and their progressive behaviour on leaking through cracks in the concrete containment; Studies on heat transfer in a sodium-cooled fast reactor core. As fast breeders operate at high power densities, an accurate knowledge of the heat transfer phenomena under single-phase and two-phase conditions is sought. (Auth.)

  8. The impact of intrinsic and extrinsic factors on the job satisfaction of dentists.

    Science.gov (United States)

    Goetz, K; Campbell, S M; Broge, B; Dörfer, C E; Brodowski, M; Szecsenyi, J

    2012-10-01

    The Two-Factor Theory of job satisfaction distinguishes between intrinsic-motivation (i.e. recognition, responsibility) and extrinsic-hygiene (i.e. job security, salary, working conditions) factors. The presence of intrinsic-motivation facilitates higher satisfaction and performance, whereas the absences of extrinsic factors help mitigate against dissatisfaction. The consideration of these factors and their impact on dentists' job satisfaction is essential for the recruitment and retention of dentists. The objective of the study is to assess the level of job satisfaction of German dentists and the factors that are associated with it. This cross-sectional study was based on a job satisfaction survey. Data were collected from 147 dentists working in 106 dental practices. Job satisfaction was measured with the 10-item Warr-Cook-Wall job satisfaction scale. Organizational characteristics were measured with two items. Linear regression analyses were performed in which each of the nine items of the job satisfaction scale (excluding overall satisfaction) were handled as dependent variables. A stepwise linear regression analysis was performed with overall job satisfaction as the dependent outcome variable, the nine items of job satisfaction and the two items of organizational characteristics controlled for age and gender as predictors. The response rate was 95.0%. Dentists were satisfied with 'freedom of working method' and mostly dissatisfied with their 'income'. Both variables are extrinsic factors. The regression analyses identified five items that were significantly associated with each item of the job satisfaction scale: 'age', 'mean weekly working time', 'period in the practice', 'number of dentist's assistant' and 'working atmosphere'. Within the stepwise linear regression analysis the intrinsic factor 'opportunity to use abilities' (β = 0.687) showed the highest score of explained variance (R(2) = 0.468) regarding overall job satisfaction. With respect to the Two

  9. Application Security for the Android Platform Processes, Permissions, and Other Safeguards

    CERN Document Server

    Six, Jeff

    2011-01-01

    This book will educate readers on the need for application security and secure coding practices when designing any app. No prior knowledge of security or secure programming techniques is assumed. The book will discuss the need for such practices, how the Android environment is structured with respect to security considerations, what services and techniques are available on the platform to protect data, and how developers can build and code applications that address the risk to their applications and the data processed by them. This text is especially important now, as Android is fast becoming

  10. Social Security Administration

    Science.gov (United States)

    ... Suze Orman on Why Creating an Account is Important Suze Orman explains how a my Social Security account can help you plan for your retirement ... for same-sex couples? Open Government at Social Security Explore the benefits you may be due Plain ... About Us Accessibility FOIA Open Government Glossary ...

  11. Network Security Is Manageable

    Science.gov (United States)

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  12. Women and social security

    NARCIS (Netherlands)

    Westerveld, M.; Pennings, F.; Vonk, G.

    2015-01-01

    Does ‘the’ social security take sufficient account of women? Are its protection schemes sufficiently aimed at safeguarding women’s interests? These are the questions I was invited to answer for this handbook on social security law. At the same time I was asked to adopt an unorthodox approach, one

  13. Sustainability and National Security

    Science.gov (United States)

    2012-01-01

    to U.S. overseas campaigns since the early 1900s. Environmental Security Environmental Security is an element under the larger rubric of Human...oldest seedbank, with a network of research facilities, and well over 300,000 ‘accessions’ of plant genetic material (Sinitsyna 2007b; Roslof

  14. Information security management principles

    CERN Document Server

    Taylor, Andy; Finch, Amanda; Sutton, David; Taylor, Andy

    2013-01-01

    In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources.

  15. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  16. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  17. Security in the Sahel

    DEFF Research Database (Denmark)

    Hahonou, Eric Komlavi

    of volatile security. In this policy brief, Eric Hahonou argues that without complementary activities, the multiplication of border offices could even expand opportunities for corruption. Instead, security policy should focus on creating a culture of effectiveness including systematic and regular staff...

  18. Reconciling privacy and security

    NARCIS (Netherlands)

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  19. Security in the cloud.

    Science.gov (United States)

    Degaspari, John

    2011-08-01

    As more provider organizations look to the cloud computing model, they face a host of security-related questions. What are the appropriate applications for the cloud, what is the best cloud model, and what do they need to know to choose the best vendor? Hospital CIOs and security experts weigh in.

  20. Systems Security Engineering

    Science.gov (United States)

    2010-08-22

    environment that contains network- borne cybersecurity threats, an argument may be made that the firewall increases overall system functionality by reserving...the number of administered devices. This approach to security analysis is at once old and new. In the early days of eCommerce , security

  1. Smart grid security

    Energy Technology Data Exchange (ETDEWEB)

    Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology

    2013-11-01

    The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.

  2. Formalizing physical security procedures

    NARCIS (Netherlands)

    Meadows, C.; Pavlovic, Dusko

    Although the problems of physical security emerged more than 10,000 years before the problems of computer security, no formal methods have been developed for them, and the solutions have been evolving slowly, mostly through social procedures. But as the traffic on physical and social networks is now

  3. No energy security without climate security

    International Nuclear Information System (INIS)

    Hiller, M.

    2006-06-01

    WWF urges the G8 nations to embark on a serious global 'Climate and Energy Security Plan' akin in dimension to the Marshall plan after the Second World War. The plan would aim at dramatically augmenting energy efficiency measures and renewable energy sources within the next five years

  4. The fast breeder reactor

    International Nuclear Information System (INIS)

    Patterson, W.

    1990-01-01

    The author criticises the United Kingdom Atomic Energy Authority's fast breeder reactor programme in his evidence to the House of Commons Select Committee on Energy in January 1990. He argues for power generation by renewable means and greater efficiency in the use rather than in the generation of electricity. He refutes the arguments for nuclear power on the basis of reduced global warming as he claims support technology produces significant amounts of carbon dioxide in any case. Serious doubts are raised about the costs of a fast breeder reactor programme compared to, say, generation by pressurised water reactors. The idea of a uranium scarcity in several decades is also refuted. The reliability of fast breeder reactor technology is called into question. He argues against reprocessing plutonium for economic, health and safety reasons. (UK)

  5. The fast code

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, L.N.; Wilson, R.E. [Oregon State Univ., Dept. of Mechanical Engineering, Corvallis, OR (United States)

    1996-09-01

    The FAST Code which is capable of determining structural loads on a flexible, teetering, horizontal axis wind turbine is described and comparisons of calculated loads with test data are given at two wind speeds for the ESI-80. The FAST Code models a two-bladed HAWT with degrees of freedom for blade bending, teeter, drive train flexibility, yaw, and windwise and crosswind tower motion. The code allows blade dimensions, stiffnesses, and weights to differ and models tower shadow, wind shear, and turbulence. Additionally, dynamic stall is included as are delta-3 and an underslung rotor. Load comparisons are made with ESI-80 test data in the form of power spectral density, rainflow counting, occurrence histograms, and azimuth averaged bin plots. It is concluded that agreement between the FAST Code and test results is good. (au)

  6. Fast harmonic field mapper

    International Nuclear Information System (INIS)

    Au, R.; Fowler, M.; Hanawa, H.; Riedel, J.; Qua, Z.G.

    1984-01-01

    In early 1983 it was decided to mount coils on arms separated by 120 degrees and buck them out so that the third harmonic dphi/dt component would be cancelled and thus the first and second field harmonics could be very accurately measured. The original intention was to do as others had done, namely, use fast ADC's to read the voltages, and computer process the result to get the Fourier components. However, because of the 100 to 1 dynamic range of the fast ADC's and the likelihood that noise would be a problem, the authors decided to do things differently. Using a fast Fourier transform analyzer was considered, but this instrument is very expensive, so they decided to use a completely electronic analog approach: The authors decided to use active bandpass filters to render the harmonic components

  7. The fast breeder reactor

    International Nuclear Information System (INIS)

    Keck, O.

    1984-01-01

    Nowadays the fast-breeder reactor is a negative symbol of advanced technology which is getting out of control and, due to its complexity, is incomprehensible for politicians and therefore by-passes the established order. The author lists the most important decisions over state aid to the fast-breeder-reactors up until the mid-seventies and uses documents from the appropriate advisory bodies as reference. He was also aided by interviews with those directly involved with the project. The empirical facts forces us to discard our traditional view of the relationship between state and industry with regard to advanced technology. The author explains that it is impossible to find any economic value in the fast-breeder reactor. The insight gained through this project allows him to draw conclusions which apply to all aspects of state aid to advanced technology. (orig.) [de

  8. Adopting preoperative fasting guidelines.

    Science.gov (United States)

    Anderson, Megan; Comrie, Rhonda

    2009-07-01

    In 1999, the American Society of Anesthesiologists adopted preoperative fasting guidelines to enhance the quality and efficiency of patient care. Guidelines suggest that healthy, non-pregnant patients should fast six hours from solids and two hours from liquids. Although these guidelines are in place, studies suggest that providers are still using the blanket statement "NPO after midnight" without regard to patient characteristics, the procedure, or the time of the procedure. Using theory to help change provider's beliefs may help make change more successful. Rogers' Theory of Diffusion of Innovations can assist in changing long-time practice by laying the groundwork for an analysis of the benefits and disadvantages of proposed changes, such as changes to fasting orders, while helping initiate local protocols instead of additional national guidelines.

  9. Security Issues Model on Cloud Computing: A Case of Malaysia

    OpenAIRE

    Komeil Raisian; Jamaiah Yahaya

    2015-01-01

    By developing the cloud computing, viewpoint of many people regarding the infrastructure architectures, software distribution and improvement model changed significantly. Cloud computing associates with the pioneering deployment architecture, which could be done through grid calculating, effectiveness calculating and autonomic calculating. The fast transition towards that, has increased the worries regarding a critical issue for the effective transition of cloud computing. From the security v...

  10. Relaxing Chosen-Ciphertext Security

    DEFF Research Database (Denmark)

    Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus

    2003-01-01

    Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within...... general protocols and applications. Indeed, CCA security was shown to suffice in a large variety of contexts. However, CCA security often appears to be somewhat too strong: there exist encryption schemes (some of which come up naturally in practice) that are not CCA secure, but seem sufficiently secure...... “for most practical purposes.” We propose a relaxed variant of CCA security, called Replayable CCA (RCCA) security. RCCA security accepts as secure the non-CCA (yet arguably secure) schemes mentioned above; furthermore, it suffices for most existing applications of CCA security. We provide three...

  11. The secure heating reactor

    International Nuclear Information System (INIS)

    Pind, C.

    1987-01-01

    The SECURE heating reactor was designed by ASEA-ATOM as a realistic alternative for district heating in urban areas and for supplying heat to process industries. SECURE has unique safety characteristics, that are based on fundamental laws of physics. The safety does not depend on active components or operator intervention for shutdown and cooling of the reactor. The inherent safety characteristics of the plant cannot be affected by operator errors. Due to its very low environment impact, it can be sited close to heat consumers. The SECURE heating reactor has been shown to be competitive in comparison with other alternatives for heating Helsinki and Seoul. The SECURE heating reactor forms a basis for the power-producing SECURE-P reactor known as PIUS (Process Inherent Ultimate Safety), which is based on the same inherent safety principles. The thermohydraulic function and transient response have been demonstrated in a large electrically heated loop at the ASEA-ATOM laboratories

  12. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  13. Energy security in Yemen

    International Nuclear Information System (INIS)

    Torosyan, Emil

    2009-09-01

    Yemen, situated in the Arab world, has considerable energy resources. However, its history of repeated revolts, civil wars and terrorism and also the presence of the Wahabi movement and al Qaeda in the country constitute security issues for the energy industry and its infrastructure. The aim of this paper is to assess the impact level on the security of the energy sector in Yemen and the effect that the threats to that sector could have on global energy security. Analyses of the political environment, the security threats and the measures taken to respond to these threats have been carried out. Results showed that Yemen's resources are depleting and that the government is having trouble containing the escalation of conflicts; this situation could lead to Yemen's political collapse which could have an important impact on global energy security.

  14. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  15. Indirection and computer security.

    Energy Technology Data Exchange (ETDEWEB)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  16. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  17. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  18. Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy

    Science.gov (United States)

    Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan

    2016-11-01

    Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.

  19. The Development of Intrinsic Motivation for Physical Activity

    National Research Council Canada - National Science Library

    Beaty, James D

    2005-01-01

    .... Having found this to be so, it is worthy of researchers' efforts to determine the constructs that will move individuals to become more intrinsically motivated to engage in regular exercise and/or physical activity...

  20. Stochastic synchronization of neuronal populations with intrinsic and extrinsic noise.

    KAUST Repository

    Bressloff, Paul C; Lai, Yi Ming

    2011-01-01

    We extend the theory of noise-induced phase synchronization to the case of a neural master equation describing the stochastic dynamics of an ensemble of uncoupled neuronal population oscillators with intrinsic and extrinsic noise. The master