WorldWideScience

Sample records for macro security strategy

  1. Strategy of Increasing Food Security based on Macro and Micro Aspects

    Directory of Open Access Journals (Sweden)

    Neni Widayaningsih

    2016-06-01

    Full Text Available The preliminary studies that have been conducted show that the food availability in 27 districts in Banyumas Regency on average is still low. The purpose of this research is to formulate of a strategy to improve the food security by synergizing the macro and micro aspects. The method used is the tabulation analysis, IFE and EFE Matrix, and also IE Matrix. The IE matrix shows the food security based on the macro and micro aspects that are in the first cell, which means that the food security conditions are experiencing the growing and buliding. The strategies of improving the food security from the micro and macro aspects are first, to develop the food production in accordance with the potential and comodities of the excellent food in accordance with the specializations of regions (districts. Second, it requires a partnership and a cooperation of distributing the excellent food production. Third, the investment is required to improve the diversification of food. Fourth, it requires the cooperation between the farmers and the government agencies concerned with the development, supply and service of excellent means of agricultural production with supervision and increased credit services. Fifth, the off-farm activities should be developed by forming the cooperatives or the small and household businesses on the basis of farming activities. Besides, in order to meet the consumption of food that is safe, qualified, and nutritious, it is necessary to increase the knowledge and awareness about the food security at the household level by empowering the cooperatives or small and household businesses by utilizing Dasa Wisma group, PKK, Majelis Ta'lim, and other non-governmental groups.

  2. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    International Nuclear Information System (INIS)

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-01-01

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a 'dirty bomb'. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  3. Technology strategy as macro-actor

    DEFF Research Database (Denmark)

    Tryggestad, Kjell

    2003-01-01

    -human entities to the explanatory repertoire of strategy research, another line of inquiry is pursued. The performative perspective thus proposed, is inspired by the classical work of Von Clausewitz and the recent anthropology of science, technology and organizational identities. In the proposed perspective...... case account for how the strategic technology and the strategic collective emerge and co-produce each other as a macro-actor, only to become transformed in unexpected ways - as common technology and reflective human subjects.In the concluding section, it is argued that the humanity of the reflective...... outcomes, as providers of explanations and observations. The expression `technological strategy as macro-actor' summarizes these findings and the associated implications for research and practice....

  4. MACRO

    International Nuclear Information System (INIS)

    Rogner, H.H.

    1989-01-01

    The description is given to MACRO which is a numerically formulated macroeconomic model constructed to reflect the economy of the European Community. The model belongs to the group of general equilibrium models often applied in long-term macroeconomic energy modeling. Furthermore, MACRO was designed so as to interact with other more technically oriented energy demand and supply models. It's main objective is to provide consistency checks between assumptions concerning energy trade, energy prices, resource availability and energy-related capital requirements. 5 figs

  5. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  6. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  7. Strategies for online test security.

    Science.gov (United States)

    Hart, Leigh; Morgan, Lesley

    2009-01-01

    As online courses continue to increase, maintaining academic integrity in student evaluation is a challenge. The authors review several strategies, with varying degrees of cost and technology, to improve test security in the online classroom.

  8. Pure National Security Strategy

    Science.gov (United States)

    2011-06-01

    gd1ne997g1lu3p7d&size=largest Berlin, Isaiah . Four Essays on Liberty. New York, NY: Oxford University Press, 1970. Bijker, Wiebe E., Thomas P. Hughes and...of the first scientists to formalize what has long been known to kings and emperors is American economist Thomas C. Schelling. In his influential...Robert Pape simplifies the mechanism where coercion affects 45 Schelling, Thomas C. The Strategy of

  9. Security solutions: strategy and architecture

    Science.gov (United States)

    Seto, Myron W. L.

    2002-04-01

    Producers of banknotes, other documents of value and brand name goods are being presented constantly with new challenges due to the ever increasing sophistication of easily-accessible desktop publishing and color copying machines, which can be used for counterfeiting. Large crime syndicates have also shown that they have the means and the willingness to invest large sums of money to mimic security features. To ensure sufficient and appropriate protection, a coherent security strategy has to be put into place. The feature has to be appropriately geared to fight against the different types of attacks and attackers, and to have the right degree of sophistication or ease of authentication depending upon by whom or where a check is made. Furthermore, the degree of protection can be considerably increased by taking a multi-layered approach and using an open platform architecture. Features can be stratified to encompass overt, semi-covert, covert and forensic features.

  10. Kanttekeningen bij de Europese cyber security strategie

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Smulders, A.C.M.; Kamphuis, P.

    2013-01-01

    In februari presenteerde de Europese Unie de Europese cyber security strategie en begeleidende concept richtlijn. The Hague Security Delta (HSD) is verheugd dat de Nederlandse Nationale Cyber Security Strategie nu ook op Europees niveau navolging krijgt. Toch plaatsen we een paar kantekeningen.

  11. Food Security Strategies for Vanuatu

    OpenAIRE

    Welegtabit, Shadrack R.

    2001-01-01

    This report describes and analyzes food security conditions and policies in Vanuatu. The national food security systems are dualistic in nature, and the rural and urban food security systems are weakly related. Household food security in rural areas is primarily determined by access to arable land and fishery resources, whereas in urban areas household food security is primarily determined by access to employment. Household food security has been a concern in both rural and urban areas. Both ...

  12. Public Diplomacy: Enabling National Security Strategy

    National Research Council Canada - National Science Library

    Smith, Russell H

    2007-01-01

    Public diplomacy seeks to promote the national interests of the United States through understanding, informing and influencing foreign audiences in accord with the 2006 National Security Strategy (NSS...

  13. Energy scope of handoff strategies in macro-femtocell environments

    KAUST Repository

    Leon, Jaime

    2012-06-01

    Energy consumption in downlink mode is becoming an important topic as cellular communications grow into a large scale enterprise. The search for high rates keeping energy constraints low has put forward the idea that cells with smaller size may improve not only the capacity of the network, but also reduce the amount of energy that is needed to achieve such capacities. When using heterogeneous networks, users can be encouraged to handoff to a femtocell, that offers better capacity per unit energy spent, by means of different handoff strategies. These strategies may also improve the energy use of the network if the handoff priority is given to both, capacity, and energy use. © 2012 IEEE.

  14. Guide to National Security Policy and Strategy

    National Research Council Canada - National Science Library

    Bartholomees, Jr, J. B

    2006-01-01

    ...: Theory of War and Strategy and National Security Policy and Strategy. The result for this book is the expansion of the block on strategic theory and the introduction of a block on specific strategic issues...

  15. Low carbon national strategy. A macro-economical assessment

    International Nuclear Information System (INIS)

    Baiz, Adam; Monnoyer-Smith, Laurence; Callonnec, Gael

    2016-11-01

    This publication briefly reports the use of the Three-ME model (Multi-sector Macroeconomic Model for the Evaluation of Environmental and Energy) to assess the combined effect of the several instruments mobilised for the transition towards a low carbon economy within the French National Low Carbon Strategy (SNBC). It first presents the Three-ME model which has been developed since 2008 by the OFCE and the Ademe, is a neo-Keynesian and hybrid model, and which comprises 14.000 equations and 70.000 parameters dealing with prices, interest rates, investments, salaries, foreign trade, State policy, a production function, and a consumption function. Some characteristics of the SNBC scenario are indicated, as well as those of a reference trend-based scenario. Obtained results are then briefly commented in terms of positive ecological and economic impacts of a carbon tax and of sector-based measures defined within the SNBC

  16. Food Security Strategy Based on Computer Innovation

    OpenAIRE

    Ruihui Mu

    2015-01-01

    Case analysis to identify innovative strategies for food security occurred in the Oriental Hotel, voluntarily implement food safety control. Food security strategy investigation and the reasons for their use of multiple data sources, including accommodation and catering industry to implement and document interviews with key decision makers in the hotel performed to observe the business environment were examined. This finding suggests that addressing food security, not only is the food control...

  17. Energy security strategy and nuclear power

    International Nuclear Information System (INIS)

    Toichi, Tsutomu; Shibata, Masaharu; Uchiyama, Yoji; Suzuki, Tatsujiro; Yamazaki, Kazuo

    2006-01-01

    This special edition of 'Energy security strategy and nuclear power' is abstracts of the 27 th Policy Recommendations 'The Establishment of an International Energy Security System' by the Japan Forum on International Relations, Inc on May 18 th , 2006. It consists of five papers: Energy security trend in the world and Japan strategy by Tsutomu Toichi, Establishment of energy strategy supporting Japan as the focus on energy security by Masaharu Shibata, World pays attention to Japan nuclear power policy and nuclear fuel cycle by Yoji Uchiyama, Part of nuclear power in the energy security - the basic approach and future problems by Tatsujiro Suzuki, and Drawing up the energy strategy focused on the national interests - a demand for the next government by Kazuo Yamazaki. (S.Y.)

  18. Ten national cyber security strategies: A comparison

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Besseling, K. van; Spoelstra, M.; Graaf, P. de

    2013-01-01

    A number of nations developed and published a national cyber security strategy (NCSS). Most of them were published in the period 2009 - 2011. Despite the fact that each of these NCSS intends to address the cyber security threat, large differences exist between the NCSS approaches. This paper

  19. Achieving National Security Strategy: An Effective Process?

    National Research Council Canada - National Science Library

    Mullery, Brian W

    2008-01-01

    The purpose of this research paper is two-fold: 1) to examine whether the U.S. government is properly organized and equipped at the Executive level, to achieve the goals of the President's National Security Strategy and 2...

  20. Cultivation Strategy for Freshwater Macro- and Micro-Algae as Biomass Stock for Lipid Production

    Directory of Open Access Journals (Sweden)

    Marieska Verawaty

    2017-07-01

    Full Text Available In this research, an algae cultivation strategy was studied. Integrating algae cultivation with wastewater treatment is currently seen as one of the most economical ways of producing algae biomass. A combination of an anaerobic baffled reactor (ABR and a constructed wetland (CW was applied for treating domestic wastewater with an additional collection tank for improving effluent quality. The effluent produced from the three stages was used as algae cultivation media and suplemented with 10% bold basal medium (BBM. The results showed both micro- and macro-algae growth and their lipid contents were higher when they were grown in effluent-BBM (9:1 v/v media. The lipid content of the micro-algae mixed culture was 16.5% while for macro-algae Oedogonium sp and Cladophora sp it was 6.90% and 6.75% respectively.

  1. Nuclear security: strategies and techniques

    International Nuclear Information System (INIS)

    Khan, I.K.

    2010-05-01

    The modern society, whether in developed or in developing countries, depend on the availability of nuclear energy and on the day-to-day use of radioactive materials in medicine, agriculture, industry and for research. Before 9/11, these activities were mainly covered by safety rules regarding health and environment. Since 9/ 11, it is clear, that these activities also require adequate security. For the continued and expanded use of nuclear energy or radioactive materials, nuclear security is indispensable and an important prerequisite for successful and sustainable development. Many of our nuclear security services, expert assistance and training events, we have assisted Member States in their efforts to improve their preparedness and response capabilities and acquired a much better understanding of Member States prob and the need for further support. The end of the Cold War was marked by a shift from a bi-polar structure of global security into a more complex and unpredictable configuration of world affairs. It also brought about new security challenges, i.e. an increased probability for low-density regional, national or sub-national conflicts with new and more dispersed threats emanating from a larger number of actors, including non-state actors; terrorists or criminals. The audio-visual impact of modern media has enhanced the socio-psychological impact on a global scale of such conflicts. The number of cases of illicit trafficking in nuclear materials that were recorded since the 90's raised concern about the international physical protection regime and triggered an effort to enhance our capabilities for prevention, detection and responses regarding terrorist acts, as well as to strengthen the Convention on the Physical Protection of Nuclear Material

  2. The National Security Strategy and National Interests: Quantity or Quality?

    National Research Council Canada - National Science Library

    Mercado, Leo

    2001-01-01

    The national security strategy (NSS), National Security Strategy for a New Century, published in December 1999, categorizes national interests as vital, important, and humanitarian and other interests...

  3. Security Problems of Communicative Strategies

    Directory of Open Access Journals (Sweden)

    Elena B. Perelygina

    2011-01-01

    Full Text Available The main directions of safety formation in communication strategies are connected with their adaptation to the conditions of social and psychological variability. Building up a communicative strategy is a versatile process, in which it is necessary to consider a wide spectrum of social and psychological parameters, especially topical in the modern period of social development. Forms of social interactions in schematic formats of contemporary social and economic revolution are reduced, social and functional potentials are depleted, mass society is further differentiating, the pace of historic changes is growing, all this determines the necessity to prepare changes in personality structures to the dynamics of social and fluidity.

  4. A macro-economic framework for evaluation of cyber security risks related to protection of intellectual property.

    Science.gov (United States)

    Andrijcic, Eva; Horowitz, Barry

    2006-08-01

    The article is based on the premise that, from a macro-economic viewpoint, cyber attacks with long-lasting effects are the most economically significant, and as a result require more attention than attacks with short-lasting effects that have historically been more represented in literature. In particular, the article deals with evaluation of cyber security risks related to one type of attack with long-lasting effects, namely, theft of intellectual property (IP) by foreign perpetrators. An International Consequence Analysis Framework is presented to determine (1) the potential macro-economic consequences of cyber attacks that result in stolen IP from companies in the United States, and (2) the likely sources of such attacks. The framework presented focuses on IP theft that enables foreign companies to make economic gains that would have otherwise benefited the U.S. economy. Initial results are presented.

  5. Impact of water scarcity on food security at macro level in Pakistan

    OpenAIRE

    Fahim, Muhammad Amir

    2011-01-01

    Pakistan is confronting the problem of water scarcity which is rendering an adverse impact on food security. The study examines the impact of water scarcity on food security in an era of climate change. It further focuses on projecting the future trends of water and food stock. The research effort probes the links among water scarcity, climate change, food security, water security, food inflation, poverty and management of water resources. Data on food security was collected from the FSA (Foo...

  6. Spacepower for Australias Security - Grand Strategy or Strategy of Grandeur

    Science.gov (United States)

    2012-06-01

    2000), 34–35; Also see Peter H Diamandis and Steven Kotler , Abundance: The Future Is Better Than You Think (New York: Free Press, 2012... Kotler . Abundance: The Future Is Better Than You Think. New York: Free Press, 2012. DOD. “National Security Space Strategy -Unclassified Summary

  7. US National Security Strategy and preemption

    International Nuclear Information System (INIS)

    Kristensen, H.M.

    2006-01-01

    According to a US National Security Strategy analysis conducted in 2006, preemption has evolved from concept into doctrine. The concept plan for Global Strike (CONPLAN 8022-02) will be maintained by the Joint Functional Component Command for Space and Global Strike (JFCC-SGS), which is planned to be fully operational from the autumn of 2006. The aim of CONPLAN 8022 is to be able to destroy by nuclear weapons those targets that cannot be destroyed by other means. Should deterrence fail, weapons must be ready to be put to use, be they nuclear or conventional. (author)

  8. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  9. The Role of Corporate Defense Services in International Security Strategy

    National Research Council Canada - National Science Library

    Baroody, J. R

    2000-01-01

    National military strategy involves evaluating all elements of power, analyzing their capabilities and limitations, and incorporating these tools into a course of military action to secure political goals...

  10. The Role of Corporate Defense Services in International Security Strategy

    National Research Council Canada - National Science Library

    Baroody, J. R

    2000-01-01

    .... The privatization and outsourcing of activities that were once solely the province of sovereign governments provide challenges and opportunities to planners and analysts involved in national security strategy...

  11. Airline Security and a Strategy for Change

    National Research Council Canada - National Science Library

    Welch, Timothy J

    2006-01-01

    .... Obligated to secure the Homeland the United States Government scrambled to develop measures that would uphold societal values while providing an in-depth defense capable of ensuring a more secure society...

  12. Why Europe needs a new European Security Strategy

    NARCIS (Netherlands)

    Drent, M.E.; Landman, Lennart

    2012-01-01

    Next year, the European Security Strategy: A Secure Europe in a Better World will be ten years old. Both the European Union and the world around it have changed in that time. In this Clingendael Policy Brief Margriet Drent and Lennart Landman argue that the European Union's foreign and security

  13. Assessing Information Security Strategies, Tactics, Logic and Framework

    CERN Document Server

    Vladimirov, Andrew; Michajlowski, Andriej

    2010-01-01

    This book deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours. It will give readers the founding principles around information security assessments and why they are important, whilst providing a fluid framework for developing an astute 'information security mind' capable of rapid adaptation to evolving technologies, markets, regulations, and laws.

  14. Drie nationale cyber security strategieën vergeleken

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2011-01-01

    Onafhankelijk van elkaar brachten Frankrijk, Duitsland en Nederland hun nationale cyber security strategieën vrijwel tegelijk uit. De strategieën hebben overeenkomsten, maar tonen ook grote verschillen. De drie landen onderkennen een urgente noodzaak om cyber security aan te pakken, maar hebben

  15. Some security strategies for smart cards

    Energy Technology Data Exchange (ETDEWEB)

    Ros, F [Gemalto, St Cyr en Val, BP 6021, 45060 Orlans Cedex (France); Harba, R [LESI, Polytech' Orlans-LESI, 12 rue de Blois, 45067 Orleans Cedex 2 (France)

    2007-07-15

    This paper details current developments at Gemalto in the field of security. It focuses on two different security processes for ID cards. The first one consists in adding observable security features in the ID image to allow quick visual verification and serves mainly to detect counterfeit attempts. The second consists in watermarking ID images during the pre personalization step by a secret key stored in the chip. The interest of the different approaches is demonstrated with several real ID images.

  16. Threat Prioritization Process for the Czech Security Strategy Making

    Directory of Open Access Journals (Sweden)

    Milos Balaban

    2012-06-01

    Full Text Available This article offers systematic view of a process of identification of security threats and, subsequently, their use in the making of strategic documents, notably the Security Strategy of the Czech Republic. It is not the aim of the authors to name or define such threats, but to present the process itself. It is paramount to any credible security strategy that it deals with the threat identification in the most precise fashion. The authors take reservations against the “catalogue” approach and claim the processes of prioritization and categorization to be essential for any policies derived from the security strategy, especially in times of economic need. It is also the 2011 final paper of the project “Trends, Risks, and Scenarios of the Security Developments in the World, Europe, and the Czech Republic – Impacts on the Policy and Security System of the Czech Republic” (TRS / VG20102013009.

  17. Synthesis of securement device options and strategies

    Science.gov (United States)

    2002-03-01

    The Americans with Disabilities Act of 1990 (ADA) requires that public transit vehicles be equipped with securement location(s) and device(s) that are able to secure common wheelchairs," as defined in the ADA regulations. The definition and size spec...

  18. Organisational Information Security Strategy: Review, Discussion and Future Research

    Directory of Open Access Journals (Sweden)

    Craig A. Horne

    2017-05-01

    Full Text Available Dependence on information, including for some of the world’s largest organisations such as governments and multi-national corporations, has grown rapidly in recent years. However, reports of information security breaches and their associated consequences indicate that attacks are escalating on organisations conducting these information-based activities. Organisations need to formulate strategy to secure their information, however gaps exist in knowledge. Through a thematic review of academic security literature, (1 we analyse the antecedent conditions that motivate the adoption of a comprehensive information security strategy, (2 the conceptual elements of strategy and (3 the benefits that are enjoyed post-adoption. Our contributions include a definition of information security strategy that moves from an internally-focussed protection of information towards a strategic view that considers the organisation, its resources and capabilities, and its external environment. Our findings are then used to suggest future research directions.

  19. Strategy to Enhance International Supply Chain Security

    National Research Council Canada - National Science Library

    2007-01-01

    .... at 1901, 1903, October 13, 2006) which require the development of a strategic plan to enhance the security of the international supply chain, including protocols for the expeditious resumption of the flow of trade following...

  20. SECURITY STRATEGIES OF MEMBER STATES OF THE EUROPEAN UNION FROM THE LISBON TREATY AND THE EUROPEAN SECURITY STRATEGY

    Directory of Open Access Journals (Sweden)

    PABLO RIVAS PARDO

    2017-09-01

    in mind, it is possible to study the variability of the Security Strategy in relation to four strategic guidelines: strategic self-perception, the necessity to tune these postulates with the common objectives of the European Union, the statement of threats and finally the actions projected by these strategies to face the changing environment of international security. This variability will seek the fact of the existence or nonexistence of tuning and consistency between the Security Strategies and the community positions in the matter of security and defense. The selected countries are those who have published their documents after the signing of the Treaty of Lisbon and the publication of the European Security Strategy, in other words, after2009: Austria, Bulgaria, Slovenia, Spain, Estonia, Holland, Hungary, Lithuania, UK and the Czech Republic.

  1. Polish Defense Policy in the Context of National Security Strategy

    National Research Council Canada - National Science Library

    Bieniek, Piotr S

    2006-01-01

    ...) and the North Atlantic Treaty Organization (NATO). Polish security policy and strategy is shaped by its geographical location, which places Poland in NATO's main strategic area opposite the Russian Federation and Belarus...

  2. The Path to a Culturally Relevant National Security Strategy

    National Research Council Canada - National Science Library

    Frappler, John

    2008-01-01

    .... In an attempt to remain ahead of its enemies in the prosecution of the GWOT, the United States has proceeded with an extensive review of its National Security Strategy and an historic transformation...

  3. It's Time for a National Energy Security Strategy

    National Research Council Canada - National Science Library

    Wright, George G

    2008-01-01

    .... can preserve that standing in the world. Colonel Greg Wright argues that what is needed to retain our military and economic superpower advantage is a new overarching United States National Energy Security Strategy...

  4. On the merits of plant-based proteins for global food security: Marrying macro and micro perspectives

    NARCIS (Netherlands)

    de Boer, J.; Aiking, H.

    2011-01-01

    This paper aims to demonstrate the importance of protein production for the global environment and to give insight into the way consumers frame the protein part of their meal. Using a macro perspective, it presents a review of the literature on current and future impacts of the nutritional

  5. Security Isolation Strategy Mechanism for Lightweight Virtualization Environment

    Directory of Open Access Journals (Sweden)

    Liu Qian

    2017-01-01

    Full Text Available For cloud service providers, lightweight virtualization is a more economical way of virtualization. While the user is worried about the safety of applications and data of the container, due to the container sharing the underlying interface and the kernel, therefore the security and trusted degree of lightweight virtualization container isolation mechanism is critical for the promotion of lightweight virtualization service. Because the user cannot directly participate in the process of the construction and management of container isolation mechanism, it is difficult for them to establish confidence in the security and trusted degree of container isolation mechanism. Based on the research and analysis of system credible and virtualization isolation mechanism, this paper puts forward a set of lightweight virtualization security isolation strategy mechanism, divides lightweight virtualization container storage address space into several parts, puts forward the definition of lightweight virtualization security isolation, gives the formal description and proof of container security isolation strategy, and combines with related technology to verify the feasibility of lightweight virtualization security isolation strategy mechanism. The mechanism has important guiding significance for cloud services providers to deploy container security isolation.

  6. Computing security strategies in finite horizon repeated Bayesian games

    KAUST Repository

    Lichun Li

    2017-07-10

    This paper studies security strategies in two-player zero-sum repeated Bayesian games with finite horizon. In such games, each player has a private type which is independently chosen according to a publicly known a priori probability. Players\\' types are fixed all through the game. The game is played for finite stages. At every stage, players simultaneously choose their actions which are observed by the public. The one-stage payoff of player 1 (or penalty to player 2) depends on both players types and actions, and is not directly observed by any player. While player 1 aims to maximize the total payoff over the game, player 2 wants to minimize it. This paper provides each player two ways to compute the security strategy, i.e. the optimal strategy in the worst case. First, a security strategy that directly depends on both players\\' history actions is derived by refining the sequence form. Noticing that history action space grows exponentially with respect to the time horizon, this paper further presents a security strategy that depends on player\\'s fixed sized sufficient statistics. The sufficient statistics is shown to consist of the belief on one\\'s own type, the regret on the other player\\'s type, and the stage, and is independent of the other player\\'s strategy.

  7. Finger multibiometric cryptosystems: fusion strategy and template security

    Science.gov (United States)

    Peng, Jialiang; Li, Qiong; Abd El-Latif, Ahmed A.; Niu, Xiamu

    2014-03-01

    We address two critical issues in the design of a finger multibiometric system, i.e., fusion strategy and template security. First, three fusion strategies (feature-level, score-level, and decision-level fusions) with the corresponding template protection technique are proposed as the finger multibiometric cryptosystems to protect multiple finger biometric templates of fingerprint, finger vein, finger knuckle print, and finger shape modalities. Second, we theoretically analyze different fusion strategies for finger multibiometric cryptosystems with respect to their impact on security and recognition accuracy. Finally, the performance of finger multibiometric cryptosystems at different fusion levels is investigated on a merged finger multimodal biometric database. The comparative results suggest that the proposed finger multibiometric cryptosystem at feature-level fusion outperforms other approaches in terms of verification performance and template security.

  8. Per-energy capacity and handoff strategies in macro-femto cells environment

    KAUST Repository

    Leon, Jaime; Bader, Faouzi; Alouini, Mohamed-Slim

    2012-01-01

    The effect of smaller cells being placed in a heterogenous network can improve the way energy is spent in a system. Handoff strategies, bandwidth allocation and path loss calculations in different scenarios show how this is possible as the size of the cell is decreased. As a result, users can experience the same or better capacities while maximising the capacity per unit energy spent. The per-energy capacity metric is introduced as a suitable handoff strategy that considers the energy spent as an important criterion. © 2012 IEEE.

  9. Per-energy capacity and handoff strategies in macro-femto cells environment

    KAUST Repository

    Leon, Jaime

    2012-04-01

    The effect of smaller cells being placed in a heterogenous network can improve the way energy is spent in a system. Handoff strategies, bandwidth allocation and path loss calculations in different scenarios show how this is possible as the size of the cell is decreased. As a result, users can experience the same or better capacities while maximising the capacity per unit energy spent. The per-energy capacity metric is introduced as a suitable handoff strategy that considers the energy spent as an important criterion. © 2012 IEEE.

  10. Strategy and management of network security at KEK

    International Nuclear Information System (INIS)

    Kiyoharu Hashimoto; Teiji Nakamura; Hitoshi Hirose, Yukio Karita; Youhei Morita; Soh Suzuki; Fukuko Yuasa

    2001-01-01

    Recently the troubles related to the network security have often occurred at KEK. According to their security policy, the authors have started the strategy against the daily attacks. It consists of two fundamental things; the monitoring and the access control. To monitor the network, the authors have installed the intrusion detection system and have managed it since 1998. For the second thing, the authors arranged three categories to classify all hosts (about 5000 hosts) at KEK according to their security level. To realize these three categories, the authors filter the incoming packet from outside KEK whether it has a SYN flag or not. The network monitoring and the access control produced good effects in keeping the security level high. Since 2000 the authors have started the transition of LAN from shared-media network to switched network. Now almost part of LAN was re-configured and in this new LAN 10 Mbps 100 Mbps/1Gbps Ethernet are supported. Currently the authors are planning further speedup (10 Gbps) and redundancy of network. Not only LAN but also WAN, network speed will be upgraded to 10 Gbps thanks to the strong promotion of IT by Japanese government. In this very high speed network, the authors' current strategy will be affected and again the network security becomes a big issue. The authors describe the experiences in practice of the current strategy and management know-how together with the discussion on the new strategy

  11. CHINA’S STRATEGY OF ENERGY SECURITY IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Xing Li

    2013-01-01

    Full Text Available U.S.recently launched strategy of rebalancing to Asia worsens the atmosphere forChina’s energy security and increases the risks for energy transportation from Africa and theMiddle East. The diversification of energy sources is a reasonable strategic choice, so the importance of the Eurasian continent forChinaincreases. Central Asia does not play anymore a supporting role in the agenda ofChina’s energy security strategy. It is rather becoming a region of major strategic importance.

  12. Cultivation Strategy for Freshwater Macro- and Micro-Algae as Biomass Stock for Lipid Production

    OpenAIRE

    Verawaty, Marieska; Melwita, Elda; Apsari, Putri; Mayumi, Mayumi

    2017-01-01

    In this research, an algae cultivation strategy was studied. Integrating algae cultivation with wastewater treatment is currently seen as one of the most economical ways of producing algae biomass. A combination of an anaerobic baffled reactor (ABR) and a constructed wetland (CW) was applied for treating domestic wastewater with an additional collection tank for improving effluent quality. The effluent produced from the three stages was used as algae cultivation media and suplemented with 10%...

  13. Parents' experience of hospitalization: different strategies for feeling secure.

    Science.gov (United States)

    Kristensson-Hallström, I; Elander, G

    1997-01-01

    Twenty parents of boys (ages 2-14 years) hospitalized for hypospadias repair in a pediatric surgery department in Sweden, were interviewed concerning their experience when their child was hospitalized. A qualitative analysis of the interviews indicated that the most important issue to the parents was finding security at the hospital. Parents manifested one of three different strategies that enabled them to feel secure at the hospital; (a) relinquishing the care of their children to the nursing staff; (b) obtaining a measure of control over their children's care; and (c) relying on knowing their child best. The parental strategy adopted to feel secure was found to correspond with the way parents experienced the hospitalization. Differences were found in their children's experiences of pain and the alleviation of the pain during the hospitalization.

  14. Computing security strategies in finite horizon repeated Bayesian games

    KAUST Repository

    Lichun Li; Langbort, Cedric; Shamma, Jeff S.

    2017-01-01

    in the worst case. First, a security strategy that directly depends on both players' history actions is derived by refining the sequence form. Noticing that history action space grows exponentially with respect to the time horizon, this paper further presents a

  15. Citizen-based Strategies to Improve Community Security: Working ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Citizen-based Strategies to Improve Community Security: Working with Vulnerable Populations to Address Urban Violence in Medellin ... Water Resources Association, in close collaboration with IDRC, is holding a webinar titled “Climate change and adaptive water management: Innovative solutions from the Global South”.

  16. Resilient Communication: A New Crisis Communication Strategy for Homeland Security

    Science.gov (United States)

    2012-03-01

    communication theory. Author, Timothy Coombs , in Ongoing Crisis Communication , discusses the need for a crisis management 10 plan to prepare for potential... COMMUNICATION : A NEW CRISIS COMMUNICATION STRATEGY FOR HOMELAND SECURITY by Sharon L. Watson March 2012 Thesis Advisor: Christopher Bellavita...REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Resilient Communication : A New Crisis Communication

  17. Household food security status and coping strategies of rural ...

    African Journals Online (AJOL)

    Household food security status and coping strategies of rural dwellers in Irewole local government areas of Osun State. CG Ajala. Abstract. No Abstract. Bowen Journal of Agriculture Vol. 3 (2) 2006: pp. 192-199. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  18. DOD/COCOM Water Security Program Strategy Document

    Science.gov (United States)

    2011-04-22

    treatment and disposal. DOD/COCOM Water Security Program Strategy 22 18. Toxic Minerals In regions where there are naturally occurring unsafe...surface hydrologic observations using remote sensing to provide data on precipitation, radiation, temperature, soil moisture, groundwater, snowcover...habitat alteration and aquaculture . 13. Centers for Disease Control (CDC) Works with partners throughout the nation and the world to monitor health

  19. Analysis of handoff strategies in macro-femto cells environment based on per-energy capacity

    KAUST Repository

    Leon, Jaime; Bader, Faouzi; Alouini, Mohamed-Slim

    2012-01-01

    Placing smaller cells in a heterogeneous network can be beneficial in terms of energy because better capacities can be obtained for a given energy constraint. These type of deployments not only highlight the need for appropriate metrics to evaluate how well energy is being spent, but also raise important issues that need to be taken into account when analysing the overall use of energy. In this study, handoff strategies, bandwidth allocation and path loss calculations in different scenarios, illustrate how energy can be consumed in a more efficient way when cell size is decreased. As a result, users can experience higher capacities while spending less energy, depending whether they handoff or not, increasing the overall performance of the network. © 2012 The Institution of Engineering and Technology.

  20. An RNA-Seq strategy to detect the complete coding and non-coding transcriptome including full-length imprinted macro ncRNAs.

    Directory of Open Access Journals (Sweden)

    Ru Huang

    Full Text Available Imprinted macro non-protein-coding (nc RNAs are cis-repressor transcripts that silence multiple genes in at least three imprinted gene clusters in the mouse genome. Similar macro or long ncRNAs are abundant in the mammalian genome. Here we present the full coding and non-coding transcriptome of two mouse tissues: differentiated ES cells and fetal head using an optimized RNA-Seq strategy. The data produced is highly reproducible in different sequencing locations and is able to detect the full length of imprinted macro ncRNAs such as Airn and Kcnq1ot1, whose length ranges between 80-118 kb. Transcripts show a more uniform read coverage when RNA is fragmented with RNA hydrolysis compared with cDNA fragmentation by shearing. Irrespective of the fragmentation method, all coding and non-coding transcripts longer than 8 kb show a gradual loss of sequencing tags towards the 3' end. Comparisons to published RNA-Seq datasets show that the strategy presented here is more efficient in detecting known functional imprinted macro ncRNAs and also indicate that standardization of RNA preparation protocols would increase the comparability of the transcriptome between different RNA-Seq datasets.

  1. The Maritime Infrastructure Recovery Plan for the National Strategy for Maritime Security

    National Research Council Canada - National Science Library

    2006-01-01

    ... to the jurisdiction of the United States. The MIRP, the Maritime Commerce Security Plan, and the Maritime Transportation System Security Plan were developed in close coordination under the National Strategy for Maritime Security (NSMS...

  2. Universal compliance: The Carnegie Endowment's new strategy for nuclear security

    International Nuclear Information System (INIS)

    Gottemoeller, R.

    2005-01-01

    I would like to give a short briefing on Universal Compliance, the Carnegie Endowment's new strategy for nuclear security. It contains our recommendations for a new, effective nuclear non-proliferation strategy, set out against a description of the rapidly evolving security environment. I will begin with a description of that environment, but first I would like to remind you of the process that we followed in producing this report: - We launched a draft of the report at the Carnegie International Nonproliferation Conference in June 2004. In the months afterwards we sought comments and expert opinion from experts in the United States of America and around the world - we visited 15 countries. We truly tried to get comments from the broadest possible community. - I would also like to emphasize that this was a team effort, involving our President, Jessica Mathews, and four other senior experts at the Endowment

  3. The Nuclear Imperative in Russia’s Security Strategy

    Directory of Open Access Journals (Sweden)

    J. Oscar Alvarez Calzada

    2005-10-01

    Full Text Available The process which culminated in the disappearance of the USSR was heavily influenced by that Soviet Union’s inability to maintain the level of technology reached by the US in the arms race. Under the circumstances of deteriorating Russian power which have been developing since 1991, and given the precariousness that affects its armed forces, nuclear weapons have become the core element of the Russian Federation’s national security strategy. This article explores the causes that have led to this nuclear imperative in Russia’s security strategy; and secondly, it presents the most relevant, and worrying, consequence that this dependence has generated, which is the lowering of the threshold necessary forthe use of nuclear weapons.

  4. The new terrorism and the American national security strategy : implications for Turkey's security

    OpenAIRE

    Türe, Nail

    2004-01-01

    Cataloged from PDF version of article. This thesis analyzes the consequences of the American National Security Strategy, carried out as part of the post September 11 ‘war on terrorism’, in terms of Turkey’s security. Whether the reasons or aims of a declaration of war on terrorism are right or not, the reality is that the U.S. has made important steps with significant implications for the whole world as well as for Turkey. Terrorism, which has changed some of its features by th...

  5. Balanced Scorecard: A Strategic Tool in Implementing Homeland Security Strategies

    OpenAIRE

    Caudle, Sharon

    2008-01-01

    This article appeared in Homeland Security Affairs (October 2008), v.4 no.3 Starting in the early 1990s, Robert S. Kaplan and David P. Norton advocated a 'balanced scorecard' translating an organization's mission and existing business strategy into specific strategic objectives that could be linked in cause and effect relationships and measured operationally. The balanced scorecard stressed drivers of future organizational performance -- capabilities, resources, and business processes -- a...

  6. FINANCIAL-ECONOMICAL ENTERPRISE SECURITY STRATEGY FORMING IN THE TERMS OF UNCONFORMITY

    Directory of Open Access Journals (Sweden)

    Galyna Mykhayliv

    2016-03-01

    Full Text Available Theoretical points as for definition of “financial-economical security” have been researched and summing up. The present attitude were analyzed as for the financial-economical enterprise security forming in the terms of unconformity and system attitude necessity stipulated for strategy system management by a financial-economical enterprise security. Keywords: financial-economical enterprise security, strategy management, financial security, economical security, financial stability, economical security, external JEL: M 20

  7. What Type of State Homeland Security Strategy Should the State of New Jersey Develop?

    National Research Council Canada - National Science Library

    Rosell, Richard G

    2007-01-01

    The State of New Jersey does not have a written homeland security strategy. This thesis argues that New Jersey should have such a strategy, particularly since it risks losing federal homeland security funding if it does...

  8. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process guidance and assistance and strategy review in collaboration...

  9. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Science.gov (United States)

    2010-07-26

    ... National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... National Health Security Strategy (NHSS) of the United States of America (2009) and build upon the NHSS Interim Implementation Guide for the National Health Security Strategy of the United States of America...

  10. Development Of A Macro-Batch Qualification Strategy For The Hanford Tank Waste Treatment And Immobilization Plant

    International Nuclear Information System (INIS)

    Herman, Connie C.

    2013-01-01

    The Savannah River National Laboratory (SRNL) has evaluated the existing waste feed qualification strategy for the Hanford Tank Waste Treatment and Immobilization Plant (WTP) based on experience from the Savannah River Site (SRS) Defense Waste Processing Facility (DWPF) waste qualification program. The current waste qualification programs for each of the sites are discussed in the report to provide a baseline for comparison. Recommendations on strategies are then provided that could be implemented at Hanford based on the successful Macrobatch qualification strategy utilized at SRS to reduce the risk of processing upsets or the production of a staged waste campaign that does not meet the processing requirements of the WTP. Considerations included the baseline WTP process, as well as options involving Direct High Level Waste (HLW) and Low Activity Waste (LAW) processing, and the potential use of a Tank Waste Characterization and Staging Facility (TWCSF). The main objectives of the Hanford waste feed qualification program are to demonstrate compliance with the Waste Acceptance Criteria (WAC), determine waste processability, and demonstrate unit operations at a laboratory scale. Risks to acceptability and successful implementation of this program, as compared to the DWPF Macro-Batch qualification strategy, include: Limitations of mixing/blending capability of the Hanford Tank Farm; The complexity of unit operations (i.e., multiple chemical and mechanical separations processes) involved in the WTP pretreatment qualification process; The need to account for effects of blending of LAW and HLW streams, as well as a recycle stream, within the PT unit operations; and The reliance on only a single set of unit operations demonstrations with the radioactive qualification sample. This later limitation is further complicated because of the 180-day completion requirement for all of the necessary waste feed qualification steps. The primary recommendations/changes include the

  11. Maternal Strategies to Access Food Differ by Food Security Status.

    Science.gov (United States)

    Gorman, Kathleen S; McCurdy, Karen; Kisler, Tiffani; Metallinos-Katsaras, Elizabeth

    2017-01-01

    Household food insecurity is associated with health and behavior risk. Much less is known about how food insecurity is related to strategies that adults use in accessing food: how and where they shop, use of alternative food sources, and their ability to manage resources. To examine how maternal behaviors, including shopping, accessing alternative sources of food, and managing resources, are related to household food security status (HHFSS). Cross-sectional study collecting survey data on HHFSS, shopping behaviors, use of alternative food sources, and managing resources obtained from low-income mothers of preschool-aged children. One hundred sixty-four low-income mothers of young children (55% Hispanic) from two communities in Rhode Island. HHFSS was measured using 10 items from the 18-item Core Food Security Module to assess adult food security. Mothers were surveyed about where, when, and how often they shopped; the strategies they use when shopping; their use of alternative sources of food, including federal, state, and local assistance; and their ability to manage their resources. Analysis of variance and χ 2 analyses assessed the associations between demographic variables, shopping, accessing alternative food sources, and managing resources, and HHFSS. Multivariate logistic regression assessed the associations between HHFSS and maternal demographic variables, food shopping, strategies, alternative sources of food, and ability to manage resources. Maternal age and language spoken at home were significantly associated with HHFSS; food insecurity was 10% more likely among older mothers (adjusted odds ratio [aOR] 1.10, 95% CI 1.03 to 1.17) and 2.5 times more likely among Spanish-speaking households (compared with non-Spanish speaking [aOR 3.57, 95% CI 1.25 to 10.18]). Food insecurity was more likely among mothers reporting more informal strategies (aOR 1.98, 95% CI 1.28 to 3.01; P<0.05) and perceiving greater inability to manage resources (aOR 1.60, 95% CI 1

  12. Minapadi Development Strategy in Supporting National Food Security

    Science.gov (United States)

    Lestari, Sri; Bambang, Azis Nur

    2018-02-01

    Efforts to achieve food security, especially food self-sufficiency, face severe challenges. Intensification needs to be done in optimizing the existing land by applying integrated agriculture. One of them is by integrating agriculture and fishery aspect with implementation of minapadi. Minapadi cultivation has actually grown since a long time, but in the course of time this system Began displaced because of pesticides and chemical fertilizers. Become flagship Minapadi back in line with the increasing public awareness of the importance of sustainable environment, health, increasing demand for organic products that are free from pesticide residues which means safe for consumption. Minapadi is the answer to the fulfillment of people's need for carbohydrate and protein food. Blending the fulfillment of carbohydrates is rice as the staple food of most people with the fulfillment of animal protein from fish commodities to add nutritional value. In realizing the food security strategy is required Minapadi development. This descriptive research aims to find out various minapadi development strategies in several regions with different methods based on the literature and previous studies. The result is the formulation of minapadi development strategy in an area not necessarily can be applied in other areas.This occurs because of differences in setting criteria/ variables based on the characteristics and potential of a region, the strengths and opportunities, as well as the weaknesses and threats that the area may encounter.

  13. Cyber Security Test Strategy for Non-safety Display System

    International Nuclear Information System (INIS)

    Son, Han Seong; Kim, Hee Eun

    2016-01-01

    Cyber security has been a big issue since the instrumentation and control (I and C) system of nuclear power plant (NPP) is digitalized. A cyber-attack on NPP should be dealt with seriously because it might cause not only economic loss but also the radioactive material release. Researches on the consequences of cyber-attack onto NPP from a safety point of view have been conducted. A previous study shows the risk effect brought by initiation of event and deterioration of mitigation function by cyber terror. Although this study made conservative assumptions and simplifications, it gives an insight on the effect of cyber-attack. Another study shows that the error on a non-safety display system could cause wrong actions of operators. According to this previous study, the failure of the operator action caused by a cyber-attack on a display system might threaten the safety of the NPP by limiting appropriate mitigation actions. This study suggests a test strategy focusing on the cyber-attack on the information and display system, which might cause the failure of operator. The test strategy can be suggested to evaluate and complement security measures. Identifying whether a cyber-attack on the information and display system can affect the mitigation actions of operator, the strategy to obtain test scenarios is suggested. The failure of mitigation scenario is identified first. Then, for the test target in the scenario, software failure modes are applied to identify realistic failure scenarios. Testing should be performed for those scenarios to confirm the integrity of data and to assure effectiveness of security measures

  14. Cyber Security Test Strategy for Non-safety Display System

    Energy Technology Data Exchange (ETDEWEB)

    Son, Han Seong [Joongbu University, Geumsan (Korea, Republic of); Kim, Hee Eun [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security has been a big issue since the instrumentation and control (I and C) system of nuclear power plant (NPP) is digitalized. A cyber-attack on NPP should be dealt with seriously because it might cause not only economic loss but also the radioactive material release. Researches on the consequences of cyber-attack onto NPP from a safety point of view have been conducted. A previous study shows the risk effect brought by initiation of event and deterioration of mitigation function by cyber terror. Although this study made conservative assumptions and simplifications, it gives an insight on the effect of cyber-attack. Another study shows that the error on a non-safety display system could cause wrong actions of operators. According to this previous study, the failure of the operator action caused by a cyber-attack on a display system might threaten the safety of the NPP by limiting appropriate mitigation actions. This study suggests a test strategy focusing on the cyber-attack on the information and display system, which might cause the failure of operator. The test strategy can be suggested to evaluate and complement security measures. Identifying whether a cyber-attack on the information and display system can affect the mitigation actions of operator, the strategy to obtain test scenarios is suggested. The failure of mitigation scenario is identified first. Then, for the test target in the scenario, software failure modes are applied to identify realistic failure scenarios. Testing should be performed for those scenarios to confirm the integrity of data and to assure effectiveness of security measures.

  15. Assessing information security strategies, tactics, logic and framewortk

    CERN Document Server

    Vladimirov, Andrew; Gavrilenko, Konstantin

    2015-01-01

    Build a strategic response to cyber attacks The activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations. Many people in business understand that the insights from the classics of military strategy are as relevant to modern commerce as they are to war. It is clear that organisations need to develop a view of cybersecurity that goes beyond technology: all staff in the organisation have a role to play, and it is the senior managers who must ensure, like generals marshalling their forces, that all staff know the cyber security policies that

  16. Control Systems Cyber Security:Defense in Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  17. Modeling Turkey’s future LNG supply security strategy

    International Nuclear Information System (INIS)

    Efe Biresselioglu, Mehmet; Hakan Demir, Muhittin; Kandemir, Cansu

    2012-01-01

    Turkey was among those countries which decided to increase its natural gas consumption in the 1990s, due to its relative low cost and lack of impact on the environment. However, a heavy dependence on imports, from Algeria, Qatar and Nigeria, respectively, creates a threat to energy security, both in terms of source and supply diversity. Accordingly, we follow an analytical approach to identify the accuracy of our assumption, considering the current economic, political and security risk. To this end, we formulate and solve a mixed integer programming model that determines the optimal sourcing strategy for Turkey’s increasing LNG demand. This model demonstrates a number of alternative policy options for LNG supply. Furthermore, we consider that increasing the proportion of LNG in the overall gas supply will contribute to the aim of improving Turkey’s level of energy security. - Highlights: ► Turkey’s best policy option is to increase the share of LNG. ► Turkey’s main suppliers of LNG will be Algeria, Egypt, Nigeria, and Trinidad and Tobago. ► Norway, Libya, and Oman contribute to the supply with rather smaller shares. ► With high risk scenario Algeria, Egypt, Nigeria and Libya will not be suppliers. ► Oman and Qatar will cover; even though they are high-cost suppliers.

  18. Energy access and security strategies in Small Island Developing States

    International Nuclear Information System (INIS)

    Wolf, Franziska; Surroop, Dinesh; Singh, Anirudh; Leal, Walter

    2016-01-01

    Small Islands Developing States (SIDS) are isolated and surrounded by ocean. The generation and use of energy resources are two very important aspects for the development of SIDS. Unfortunately, most of SIDS do not use their potential in respect of energy resources, and they as a result have to depend on the import of fossil fuels in order to meet their energy needs. This increases the overall vulnerability of SIDS as they have to depend on the rising or fluctuating fossil fuels prices. Some SIDS, especially in the geographically dispersed Pacific region, do not have proper access to energy whereas other SIDS struggle more with energy security issue. At the same time, SIDS are most vulnerable to the impacts and effects of climate change, as they are among the ones to be most severely affected in case of natural calamities and sea-level rise. Drawing on experiences from Fiji and Mauritius, this paper explains core elements related to energy access and security in SIDS, contextualizes and discusses barriers and list some of the strategies that may be used to ensure access to and a continuous supply of energy in SIDS. A situational analysis of two SIDS outlines their current energy situation and compares their energy policies to globally accepted criteria for SIDS policies as well as with each other. It is claimed that the diverging energy performances of Fiji and Mauritius cannot be explained by policies differences. The reasons for the varying energy performances may therefore lie in the administrative and institutional mechanisms used by the two countries in implementing their energy policies. Finally, to enable SIDS to reduce their overall vulnerability and become truly sustainable islands, it is recommended to undertake careful assessments of the particular local contexts under which island energy regimes operate. - Highlights: • Core elements related to energy access/security in SIDS, barriers and strategies. • Situational analysis of two SIDS: Fiji and

  19. Toward an energy security strategy for Canada : a discussion paper

    International Nuclear Information System (INIS)

    2005-12-01

    Energy security strategies for Canada were presented in this paper. Article 6.05 of North American Free Trade Agreement (NAFTA) prohibits Canada from reducing the proportion of energy exported to the United States or Mexico. Between 1982 and 2002, natural gas consumption in Canada rose by 96 per cent while exports increased by 396 per cent. Crude oil consumption increased by 29 per cent, while exports rose by 595 per cent. Government practices have tended towards extracting and exporting resources as quickly as possible with no consideration to resource availability for future generations. In addition, much of the value of Canadian resources has been given to private corporations. The environment has been damaged in order to enable faster extraction, and First Nations, employees, and communities have been placed at the mercy of corporations and international markets. Canada's unique cultural and societal arrangements have not been protected. Four principles to address these concerns were presented: (1) managing non-renewable resources as responsible stewards and conserving their economic availability for future generations; (2) ensuring that the benefits from fossil fuels are invested in other forms of capital that will ensure the future prosperity and energy security of Canada; (3) ensuring that the extraction and use of resources has minimal impacts on the planet and (4) a re-direction of the proceeds from resource exploitation towards education, social and health services, land claims and land use settlements, and the elimination of poverty among First Nations people. It was suggested that energy-related jobs and workers should be protected through the development of an industrial strategy which includes investment in renewable energy development and re-training programs for workers. Consistent depoliticized policies are needed to reduce the impact on low-income Canadians of free-market price swings and the unavoidable costs of environmental protection. It was

  20. Turkey’s Strategy towards Afghanistan: Security and Development Assistance

    Directory of Open Access Journals (Sweden)

    Altunay Ilgar Aliyeva

    2016-01-01

    Full Text Available Providing assistance to the least developed countries has remained one of the top priorities for leading international actors in the XXI century, and the Republic of Turkey is no exception in this regard. The Justice and Development Party's ascension to power in 2002 led to a drastic revision of the Turkish foreign policy and adoption of a novel approach to the least developed countries accounting for the complex interdependence between security and development. This approach was tested in Afghanistan where Turkey contributed to both post-conflict reconstruction of the country and to the activities of the International Security Assistance Force (ISAF. Since 2015 Turkey has been actively engaged in the new NATO 'Resolute Support' mission, while continuing its economic support to Afghanistan on bilateral and multilateral basis. This paper aims to unveil the particularities of the Turkey's Afghan strategy, which has yet escaped the Russian scholars' attention, with the help of the Turkish primary sources and academic works. It studies the specificity of bilateral relations and their determinants, including historic ties and religious and cultural proximity. It provides an in-depth analysis of the activities of both Turkish Cooperation and Development Agency (TIKA and the Turkish Provincial Reconstruction Team (PRT in Afghanistan and examines the challenges of Turkish troops' presence on the Afghan soil and the way how the Turkish elites and Turkey's NATO allies perceive it.

  1. Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies

    Science.gov (United States)

    2016-12-01

    have begun discussing strategies for securing entities in cyberspace—includ- ing the files and software belonging to corporations , government...through the best strategies for deterring cyber-incursions. The immigration analogy is particularly useful for exploring how would-be intruders learn...analysis, evaluation, and refinement of professional expertise in war, strategy , operations, national security, resource management, and responsible

  2. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  3. Improved security detection strategy in quantum secure direct communication protocol based on four-particle Green-Horne-Zeilinger state

    Energy Technology Data Exchange (ETDEWEB)

    Li, Jian; Nie, Jin-Rui; Li, Rui-Fan [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Jing, Bo [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Beijing Institute of Applied Meteorology, Beijing (China). Dept. of Computer Science

    2012-06-15

    To enhance the efficiency of eavesdropping detection in the quantum secure direct communication protocol, an improved quantum secure direct communication protocol based on a four-particle Green-Horne-Zeilinger (GHZ) state is presented. In the protocol, the four-particle GHZ state is used to detect eavesdroppers, and quantum dense coding is used to encode the message. In the security analysis, the method of entropy theory is introduced, and two detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference that has been introduced. If the eavesdropper wants to obtain all the information, the detection rate of the quantum secure direct communication using an Einstein-Podolsky-Rosen (EPR) pair block will be 50% and the detection rate of the presented protocol will be 87%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol proposed is more secure than the others. (orig.)

  4. Security Management Strategies for Protecting Your Library's Network.

    Science.gov (United States)

    Ives, David J.

    1996-01-01

    Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…

  5. The research of computer network security and protection strategy

    Science.gov (United States)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  6. The International Atomic Energy Agency Nuclear Security Education Strategies

    International Nuclear Information System (INIS)

    BRAUNEGGER-GUELICH, A.; RUKHLO, V.; GREGORIC, M.; COLGAN, P.

    2011-01-01

    The threat of nuclear terrorism has not diminished. In response to the concerns of States, an international nuclear security framework has emerged through the establishment of a number of legally binding and non-binding international instruments which obligates or commits States to carry out a number of actions to protect against nuclear terrorism. In this context, the need for human resource development programmes in nuclear security was underscored at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors' Meetings. In the pursuit of this need, the IAEA provides a comprehensive nuclear security training programme to States on a regular basis, and has developed a concept that seeks to effectively pass ownership of nuclear security knowledge and skills to States through the establishment of a Nuclear Security Support Centre. In addition, the IAEA has developed a technical guidance titled IAEA Nuclear Security Series No. 12 - Educational Programme in Nuclear Security that consists of a model of a Master of Science (M.Sc.) and assists educational institutions to provide nuclear security education. The article sets out IAEA efforts in the area of nuclear security training and education, including the assistance to States for establishing a Nuclear Security Support Centre. It underlines the objective and content of the IAEA Nuclear Security Series No. 12, discusses different concepts on how to establish nuclear security at universities and, emphasizes on the IAEA efforts to assist educational and research institutions, and other stake holders to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. (author)

  7. 75 FR 18819 - Second DRAFT NIST Interagency Report (NISTIR) 7628, Smart Grid Cyber Security Strategy and...

    Science.gov (United States)

    2010-04-13

    ... a cyber attack. 2. It is essential that those parts or equipment of the Smart Grid that optimize the...-0143-01] Second DRAFT NIST Interagency Report (NISTIR) 7628, Smart Grid Cyber Security Strategy and... (NIST) seeks comments on the second draft of NISTIR 7628, Smart Grid Cyber Security Strategy and...

  8. Qualitative Characterization of the Facebook Information Security Strategies

    Directory of Open Access Journals (Sweden)

    LOPES, S. F.

    2015-12-01

    Full Text Available Hyperconnectivity due to online social networks exposed security issues on data stored in these systems. This article presents an analysis on how online social networks designers have been communicating information security aspects through these systems’ interfaces. This analysis was made using the Semiotic Inspection Method on Facebook since it is largely used in Brazil and all over the world. Results showed that there is major concern with security information properties. Nevertheless it was possible to identify interface problems that could compromise use and understanding of such security properties

  9. Security leader insights for information protection lessons and strategies from leading security professionals

    CERN Document Server

    Fahy, Bob

    2014-01-01

    How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Information Protection, a collection of timeless leadership best practices featuring insights from some of the nation's most successful security practitioners, you can. This book can be used as a quick and effective resource to bring your security staff up to speed on security's role in information protection. I

  10. Sustainable Phosphorus Measures: Strategies and Technologies for Achieving Phosphorus Security

    Directory of Open Access Journals (Sweden)

    Stuart White

    2013-01-01

    Full Text Available Phosphorus underpins the world’s food systems by ensuring soil fertility, maximising crop yields, supporting farmer livelihoods and ultimately food security. Yet increasing concerns around long-term availability and accessibility of the world’s main source of phosphorus—phosphate rock, means there is a need to investigate sustainable measures to buffer the world’s food systems against the long and short-term impacts of global phosphorus scarcity. While the timeline of phosphorus scarcity is contested, there is consensus that more efficient use and recycling of phosphorus is required. While the agricultural sector will be crucial in achieving this, sustainable phosphorus measures in sectors upstream and downstream of agriculture from mine to fork will also need to be addressed. This paper presents a comprehensive classification of all potential phosphorus supply- and demand-side measures to meet long-term phosphorus needs for food production. Examples range from increasing efficiency in the agricultural and mining sector, to technologies for recovering phosphorus from urine and food waste. Such measures are often undertaken in isolation from one another rather than linked in an integrated strategy. This integrated approach will enable scientists and policy-makers to take a systematic approach when identifying potential sustainable phosphorus measures. If a systematic approach is not taken, there is a risk of inappropriate investment in research and implementation of technologies and that will not ultimately ensure sufficient access to phosphorus to produce food in the future. The paper concludes by introducing a framework to assess and compare sustainable phosphorus measures and to determine the least cost options in a given context.

  11. ASPECTS OF POLICIES AND STRATEGIES FOR CYBER SECURITY IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Ilina ARMENCHEVA

    2015-10-01

    Full Text Available Freedom and prosperity of mankind greatly depend on an innovative, safe and reliable Internet that, of course, will keep evolving. Cyber space must be protected from incidents, misuse and abuse. Handling the increasing number of threats to cyber security is a challenge that national security and the trend in the international environment face. This makes taking fast and adequate measures at national, European and international level a must. Changing national security strategies and adopting new cyber security strategies are a part of these measures.

  12. At the Crossroads: Counterproliferation and National Security Strategy

    National Research Council Canada - National Science Library

    2004-01-01

    .... national security and an enormous challenge for the entire international community. In the hands of rogue states, failing states, or substate terrorist groups, these weapons threaten not only U.S...

  13. Inherent Efficiency, Security Markets, and the Pricing of Investments Strategies

    NARCIS (Netherlands)

    Zou, L.; Kin, L.

    2000-01-01

    This paper applies the dichotomous theory of choice by Zou (2000a) tothe analysis of investmentstrategies and security markets. Issues concerning individualoptimality, (approximate) arbitrage,capital market equilibrium, and Pareto efficiency are studied undervarious market conditions. Among the main

  14. Polish Defense Policy in the Context of National Security Strategy

    National Research Council Canada - National Science Library

    Bieniek, Piotr S

    2006-01-01

    ... goals to eliminate current threats and risks such as terrorism. As far as Poland is concerned, its priority is to be an active leader in improving common security policy within the boundaries of the European Union (EU...

  15. Solar Secure Schools: Strategies and Guidelines; October 2004--April 2005

    Energy Technology Data Exchange (ETDEWEB)

    Braun, G. W.; Varadi, P. F.

    2006-01-01

    This report explores the technical and economic aspects of installing solar power (photovoltaic aka PV) systems on schools to improve the schools' energy security and provide power during disasters.

  16. Private Military and Security Companies - Counterinsurgency and Nation Building Strategy

    Science.gov (United States)

    2013-04-25

    cans, and bought war bonds is long gone. One advantage that the private sector brings to public wars is capacity. Companies like Kellogg and Brown...1 Anne-Marie Buzatu, and Benjamin S . Buckland, “Private Military & Security Companies : Future Challenges in...From  -­‐  To)   September 2012 - April 2013 4.  TITLE  AND  SUBTITLE   Private Military and Security Companies - Counterinsurgency and

  17. Formal And Informal Macro-Regional Transport Clusters As A Primary Step In The Design And Implementation Of Cluster-Based Strategies

    Directory of Open Access Journals (Sweden)

    Nežerenko Olga

    2015-09-01

    Full Text Available The aim of the study is the identification of a formal macro-regional transport and logistics cluster and its development trends on a macro-regional level in 2007-2011 by means of the hierarchical cluster analysis. The central approach of the study is based on two concepts: 1 the concept of formal and informal macro-regions, and 2 the concept of clustering which is based on the similarities shared by the countries of a macro-region and tightly related to the concept of macro-region. The authors seek to answer the question whether the formation of a formal transport cluster could provide the BSR a stable competitive position in the global transportation and logistics market.

  18. Document and author promotion strategies in the secure wiki model

    DEFF Research Database (Denmark)

    Lindberg, Kasper; Jensen, Christian D.

    2012-01-01

    Wiki systems form a subclass of the more general Open Collaborative Authoring Systems, where content is created by a user community. The ability of anyone to edit the content is, at the same time, their strength and their weakness. Anyone can write documents that improve the value of the wiki-system......, but this also means that anyone can introduce errors into documents, either by accident or on purpose. A security model for wiki-style authoring systems, called the Secure Wiki Model, has previously been proposed to address this problem. This model is designed to prevent corruption of good quality documents......, by limiting updates, to such documents, to users who have demonstrated their ability to produce documents of similar or better quality. While this security model prevents all user from editing all documents, it does respect the wiki philosophy by allowing any author who has produced documents of a certain...

  19. Strategies to Minimize the Effects of Information Security Threats on Business Performance

    Science.gov (United States)

    Okoye, Stella Ifeyinwa

    2017-01-01

    Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…

  20. An Assessment of the United States National Security Strategy for Combating Terrorism

    National Research Council Canada - National Science Library

    Chambliss, John

    2004-01-01

    .... While terrorism may be simply viewed as a crime against humanity the United States must pursue a comprehensive policy and strategy to deal with such acts anywhere and anytime because they threaten its national security...

  1. National Security Strategy: A Flawed Guide to the Future, Political Science

    National Research Council Canada - National Science Library

    Leahy, Michael

    2003-01-01

    The Goldwater-Nichols Defense Department Reorganization Act of 1986 requires the executive branch to periodically provide written documentation of the United States National Security Strategy (NSS). The George W...

  2. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    ... with state and local stakeholders. Federal state and local reviewers regard the current state and urban homeland security strategies as generally inadequate and indicative of limited strategic planning processes...

  3. The National Security Strategy of the United Kingdom: Security in an Interdependent World

    Science.gov (United States)

    2008-03-01

    security architecture has yet to adapt satisfactorily to the new landscape. The UN Security Council has failed to adapt to the rise of new powers. Across...including cinemas , theatres, pubs, nightclubs, restaurants, hotels and commercial centres, hospitals, schools and places of worship); work with architects...and export control regimes, and improving the international monitoring architecture . Countering the threat of nuclear weapons and other weapons of

  4. Food security status and coping strategies of rural households with ...

    African Journals Online (AJOL)

    Background: Food insecurity is a growing public health concern in Nigeria especially where all efforts towards achieving the Millennium Development Goal (MDG 1) of eradicating extreme hunger and poverty by 2015 is yet to be realized. This cross sectional study was designed to assess food security status of rural ...

  5. 360 PORT MDA - A Strategy to Improve Port Security

    Science.gov (United States)

    2006-09-01

    Participating Agencies (After: Executive Briefing..........................27 Table 6. Designated Joint Operations Center Participants (From: SAFE...Investigations CGIP Coast Guard Intelligence Program CHOC Charleston Harbor Operations Center CIO Command Intelligence Officer CMT Combating Maritime... EXECUTIVE SUMMARY Ports are critical to our economy and national security. Key hubs in the international trade network, U.S. ports accounted for more than

  6. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  7. A Strategy for American Power: Energy, Climate and National Security

    Science.gov (United States)

    2008-06-01

    For example, Greg Mankiw , Harvard economist and former chair of President Bush’s Council of Economic Advisors, has proposed phasing in a $1 per...International Energy Barrier By Amy Myers Jaffe 77 Chapter V: Overcoming the Economic Barriers to Climate Change and Energy Security By Jason Furman (lead...Hamilton Project. He previously served in the Clinton administration and at the Council of Economic Advisers, the National Economic Council, and the World

  8. Security strategy of powered-off SRAM for resisting physical attack to data remanence

    International Nuclear Information System (INIS)

    Yu Kai; Zou Xuecheng; Yu Guoyi; Wang Weixu

    2009-01-01

    This paper presents a security strategy for resisting a physical attack utilizing data remanence in powered-off static random access memory (SRAM). Based on the mechanism of physical attack to data remanence, the strategy intends to erase data remanence in memory cells once the power supply is removed, which disturbs attackers trying to steal the right information. Novel on-chip secure circuits including secure power supply and erase transistor are integrated into conventional SRAM to realize erase operation. Implemented in 0.25 μm Huahong-NEC CMOS technology, an SRAM exploiting the proposed security strategy shows the erase operation is accomplished within 0.2 μs and data remanence is successfully eliminated. Compared with conventional SRAM, the retentive time of data remanence is reduced by 82% while the operation power consumption only increases by 7%.

  9. Energy Security Strategies: An Analysis of Tanzania and Mozambique

    Science.gov (United States)

    2016-06-01

    outsourcing of monitoring and enforcement of the accountability mechanism to the Extractive Industries Transparency Initiative (EITI) and the International ...strategy, and international relationships. Analysis of the case studies indicates that the combination of political elite cohesion, economic reforms that...favor the domestic energy market, and structuring the influence of international actors in policy development enables the development of the domestic

  10. A security framework for nationwide health information exchange based on telehealth strategy.

    Science.gov (United States)

    Zaidan, B B; Haiqi, Ahmed; Zaidan, A A; Abdulnabi, Mohamed; Kiah, M L Mat; Muzamel, Hussaen

    2015-05-01

    This study focuses on the situation of health information exchange (HIE) in the context of a nationwide network. It aims to create a security framework that can be implemented to ensure the safe transmission of health information across the boundaries of care providers in Malaysia and other countries. First, a critique of the major elements of nationwide health information networks is presented from the perspective of security, along with such topics as the importance of HIE, issues, and main approaches. Second, a systematic evaluation is conducted on the security solutions that can be utilized in the proposed nationwide network. Finally, a secure framework for health information transmission is proposed within a central cloud-based model, which is compatible with the Malaysian telehealth strategy. The outcome of this analysis indicates that a complete security framework for a global structure of HIE is yet to be defined and implemented. Our proposed framework represents such an endeavor and suggests specific techniques to achieve this goal.

  11. Parser Macros for Scala

    OpenAIRE

    Duhem, Martin; Burmako, Eugene

    2015-01-01

    Parser macros are a new kind of macros that allow developers to create new language constructs and to define their own syntax for using them. In this report, we present why parser macros are useful and the kind of problems that they help to solve. We will also see how they are implemented and gain insight about how they take advantage from scala.meta, the new metaprogramming toolkit for Scala. Finally, we will discuss what are the current limitations of parser macros and what is left for futu...

  12. Why Macro Practice Matters

    Science.gov (United States)

    Reisch, Michael

    2016-01-01

    This article asserts that macro practice is increasingly important in today's rapidly changing and complex practice environment. It briefly explores the history of macro practice in U.S. social work, summarizes its major contributions to the profession and to U.S. society, and provides some suggestions for how social work programs can expand…

  13. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes. These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.

  14. Children's perceptions of emotion regulation strategy effectiveness: links with attachment security.

    Science.gov (United States)

    Waters, Sara F; Thompson, Ross A

    2016-08-01

    Six- and nine-year-old children (N = 97) heard illustrated stories evoking anger in a story character and provided evaluations of the effectiveness of eight anger regulation strategies. Half the stories involved the child's mother as social partner and the other half involved a peer. Attachment security was assessed via the Security Scale. Children reported greater effectiveness for seeking support from adults and peers in the peer context than the mother context, but perceived venting as more effective with mothers. Children with higher security scores were more likely to endorse problem solving and less likely to endorse aggression in both social contexts than those with lower security scores. Early evidence for gender differences was found in that boys endorsed the effectiveness of distraction while girls endorsed venting their emotion.

  15. New nuclear power in the UK: A strategy for energy security?

    International Nuclear Information System (INIS)

    Watson, Jim; Scott, Alister

    2009-01-01

    The aim of this paper is to explore the extent to which the construction of new nuclear power plants in the UK can safeguard or enhance energy security. The paper starts with a discussion of energy security, and breaks it down into four main categories of threat. These include threats due to fossil fuel scarcity and external disruptions, problems due to a lack of investment in infrastructure, threats due to technology or infrastructure failure, and risks due to domestic activism or terrorism. The paper then discusses one of the most common strategies put forward to improve security-the promotion of diversity within energy systems. Following this, the paper assesses the potential for new nuclear investment to ameliorate security threats in each of the four categories introduced earlier in the paper. The paper concludes that whilst nuclear investment can help to mitigate some threats to UK energy security, the government's case for supporting this investment ignores some equally important security issues. As a result, the energy security case for nuclear power has not yet been made.

  16. New nuclear power in the UK. A strategy for energy security?

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Jim; Scott, Alister [Sussex Energy Group, SPRU, The Freeman Centre, University of Sussex, Brighton, East Sussex BN1 9QE (United Kingdom)

    2009-12-15

    The aim of this paper is to explore the extent to which the construction of new nuclear power plants in the UK can safeguard or enhance energy security. The paper starts with a discussion of energy security, and breaks it down into four main categories of threat. These include threats due to fossil fuel scarcity and external disruptions, problems due to a lack of investment in infrastructure, threats due to technology or infrastructure failure, and risks due to domestic activism or terrorism. The paper then discusses one of the most common strategies put forward to improve security - the promotion of diversity within energy systems. Following this, the paper assesses the potential for new nuclear investment to ameliorate security threats in each of the four categories introduced earlier in the paper. The paper concludes that whilst nuclear investment can help to mitigate some threats to UK energy security, the government's case for supporting this investment ignores some equally important security issues. As a result, the energy security case for nuclear power has not yet been made. (author)

  17. New nuclear power in the UK: A strategy for energy security?

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Jim, E-mail: w.j.watson@sussex.ac.u [Sussex Energy Group, SPRU, Freeman Centre, University of Sussex, Brighton, East Sussex BN1 9QE (United Kingdom); Scott, Alister [Sussex Energy Group, SPRU, Freeman Centre, University of Sussex, Brighton, East Sussex BN1 9QE (United Kingdom)

    2009-12-15

    The aim of this paper is to explore the extent to which the construction of new nuclear power plants in the UK can safeguard or enhance energy security. The paper starts with a discussion of energy security, and breaks it down into four main categories of threat. These include threats due to fossil fuel scarcity and external disruptions, problems due to a lack of investment in infrastructure, threats due to technology or infrastructure failure, and risks due to domestic activism or terrorism. The paper then discusses one of the most common strategies put forward to improve security-the promotion of diversity within energy systems. Following this, the paper assesses the potential for new nuclear investment to ameliorate security threats in each of the four categories introduced earlier in the paper. The paper concludes that whilst nuclear investment can help to mitigate some threats to UK energy security, the government's case for supporting this investment ignores some equally important security issues. As a result, the energy security case for nuclear power has not yet been made.

  18. Security Strategies of Both Players in Asymmetric Information Zero-Sum Stochastic Games with an Informed Controller

    KAUST Repository

    Li, Lichun; Langbort, Cedric; Shamma, Jeff S.

    2017-01-01

    that the security strategy only depends on the belief and the current stage. We provide LP formulations whose size is only linear in the size of the uninformed player's action set to compute both history based and belief based security strategies. For the uninformed

  19. Diversification of oil import sources and energy security. A key strategy or an elusive objective?

    International Nuclear Information System (INIS)

    Vivoda, Vlado

    2009-01-01

    This paper explores the relationship between the diversification of sources of imported oil and energy security of oil-importing countries. It examines the importance of diversification policy for oil importers, explains why oil importers implement oil diversification policy, and contextualizes the oil import diversification strategy in the overall energy security policy of oil importers. The paper analyzes the factors and the contexts that affect the level of importance assigned to oil import diversification policy in oil-importing countries, and the limitations that may affect the successful implication of oil import diversification policy. The examples are drawn from the world's top three oil importers, the United States, Japan, and China. The policymakers in these and other oil-importing countries place much importance on energy security. The diversification of oil import sources is used as one of the strategies to enhance energy security in oil-importing countries. This paper is important for policymakers in oil-importing countries as it provides them with a qualitative conceptual framework with which to evaluate the need to diversify their countries' sources of imported oil, and with which to identify the likely limitations to the successful implementation of oil import diversification policy. (author)

  20. US National Security Strategy and preemption; Le concept de preemption dans la strategie de securite nationale des Etats-Unis

    Energy Technology Data Exchange (ETDEWEB)

    Kristensen, H.M. [Federation of American Scientists, Washington, D.C. (United States)

    2006-07-15

    According to a US National Security Strategy analysis conducted in 2006, preemption has evolved from concept into doctrine. The concept plan for Global Strike (CONPLAN 8022-02) will be maintained by the Joint Functional Component Command for Space and Global Strike (JFCC-SGS), which is planned to be fully operational from the autumn of 2006. The aim of CONPLAN 8022 is to be able to destroy by nuclear weapons those targets that cannot be destroyed by other means. Should deterrence fail, weapons must be ready to be put to use, be they nuclear or conventional. (author)

  1. ECONOMIC SAFETY PROBLEM IN MODERN MACRO AND MICRO CONCEPTS

    Directory of Open Access Journals (Sweden)

    I. I. Rekun

    2014-01-01

    Full Text Available Purpose. Security is an important component of economic security and the guaranteeing of appropriate national interests in the state. All these things are closely related to the economic efficiency of operations of economic entities, with economic independence, stability and security of a society. In addition, economic security is a part of national security, its foundation and material basis. The problem of economic security in modern conditions at the micro and macro levels requires determining the main directions of its formation. Methodology. To achieve this goal, basic directions of a security mechanism of the economic system, in particular on the macro level were grounded. Findings. Economic security is such state of the state economy operation in which the order of equilibrium occurred in certain organizational and legal norms on the basis of social life. These regulations are created be the state, principles of coexistence, which are transmitted from generation to generation. The current state of economic security guaranteeing at the macro and micro levels was analyzed. The system of indicators that can be used in the assessment of the security system was determined. Originality. Propositions concerning necessary changes in the policy of economic security in a state were formulated. The system of indicators which can be used in the assessment of the security system was offered. Practical value. Using of the proposed system of economic security indicators will expand the list of important factors affecting on its status and allow us determining the main directions of its formation.

  2. Call for a new national security strategy: governing the future instead of deterring it

    Directory of Open Access Journals (Sweden)

    Alexei I. Podberezkin

    2017-01-01

    Full Text Available The article attempts to present a new vision for the strategic development of the Russian Federation. The authors note that the search for strategy should be made on the meta-level analysis in order to take into account either the military and political context of national security or the future interests of Russia. This allows one to reduce uncertainty in the strategic planning process. The author notes that the current military-political strategy of Russia is based on a fairly old idea of deterrence. This strategy is reactive in nature and involves responding to external challenges and threats in the international political environment. Meanwhile, the global political landscape is undergoing a significant transformation, in which a key aspect of national security will be a wide range of connectivity options to further political development of the state and society. Another disadvantage of deterrence strategy is that the threats are not differentiated from national interests and political goals. The author offers his version of the conceptualization of the terminology and the essential differences of different types of threats and assess the consequences of misunderstanding such differences. As for the strategy of deterrence, the authors suggest an alternative strategy of “control”, which aims at the formation of a systemic perspective directions of development of the society. A key element of this strategy is the forging and maintenance of the national human capital, which provides connectivity, adaptability and innovationability of various branches of the governance and dealing with external challenges. “Control” means an intensification strategy of the state policy in the field of science, culture, the promotion of spiritual development and production of advanced innovation.

  3. Call for a new national security strategy: governing the future instead of deterring it

    Directory of Open Access Journals (Sweden)

    Alexei I. Podberezkin

    2017-01-01

    Full Text Available The article attempts to present a new vision for the strategic development of the Russian Federation. The authors note that the search for strategy should be made on the meta-level analysis in order to take into account either the military and political context of national security or the future interests of Russia. This allows one to reduce uncertainty in the strategic planning process. The author notes that the current military-political strategy of Russia is based on a fairly old idea of deterrence. This strategy is reactive in nature and involves responding to external challenges and threats in the international political environment. Meanwhile, the global political landscape is undergoing a significant transformation, in which a key aspect of national security will be a wide range of connectivity options to further political development of the state and society. Another disadvantage of deterrence strategy is that the threats are not differentiated from national interests and political goals. The author offers his version of the conceptualization of the terminology and the essential differences of different types of threats and assess the consequences of misunderstanding such differences. As for the strategy of deterrence, the authors suggest an alternative strategy of “control”, which aims at the formation of a systemic perspective directions of development of the society. A key element of this strategy is the forging and maintenance of the national human capital, which provides connectivity, adaptability and innovationability of various branches  of the governance and dealing with external challenges. “Control” means an intensification strategy of the state policy in the field of science, culture, the promotion of spiritual development and production of advanced innovation.

  4. Grand Strategy for the United States in the 21st Century? (A Look at the National Security Strategy Document of 2002 and Beyond)

    National Research Council Canada - National Science Library

    Tinsley, Peter G

    2005-01-01

    This paper examines the National Security Strategy (NSS) document of September 2002 and determines whether it provides a grand strategic framework that can be sustained for the rest of the Bush presidency and beyond...

  5. Clausewitz and the Theory of Military Strategy in Europe - Reflections Upon a Paradigm of Military Strategy Within the European Common Security and Defense Policy (ESDP)

    National Research Council Canada - National Science Library

    Hartmann, Uwe

    2001-01-01

    ... as a core element of the Common Security and Defense Policy of the EU, Based on the interpretation of Clausewitz's theory of war and strategy in Britain, France, and Germany, main commonalities...

  6. Construction Strategies of Social Security System for Wan-jiang Urban Belt’s Migrant Workers

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Theoretical debate and practice exploration on social security of migrant workers were introduced.The political direction and security layer on social security for migrant workers in Wan-jiang urban belt were analyzed:the first layer is to implement wage payment guarantee and employment injury insurance;the second layer is to emphasize serious disease insurance and endowment insurance;the third layer is unemployed insurance and social assistance.The primary strategy of building a social security system for migrant workers in Wan-jiang urban belt was put up:wage payment guarantee system that is united in certain regions should be promoted;employment injury insurance system that is undertaken by enterprises should be built;a social health care system for serious diseases should be set up;multi-layers endowment insurance system for migrant workers should be created;vocational training and training in how to start a business should be built as well as the unemployment insurance system;social assistant system based on the basic cost of living allowances should be set up.

  7. Strategies to Address Identified Education Gaps in the Preparation of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report will discuss strategies available to address identified gaps and weaknesses in education efforts aimed at the preparation of a skilled and properly trained national security workforce.The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This is contributing to an inability to fill vacant positions at NNSA resulting from high personnel turnover from the large number of retirements. Further, many of the retirees are practically irreplaceable because they are Cold War scientists that have experience and expertise with nuclear weapons.

  8. Secure energy supply in 2025: Indonesia's need for an energy policy strategy

    International Nuclear Information System (INIS)

    Mujiyanto, Sugeng; Tiess, Günter

    2013-01-01

    Indonesia as an emerging country with one of the fastest growing economies requires sufficient supply with energy for national development. Domestic energy production cannot satisfy the domestic demand, and the deficiency necessitates growing imports. The present energy mix consists of 96% from non-renewable sources, i.e. fossil fuels, less than 4% from renewables. Government Regulation 5/2006 aims at increasing the proportion of renewable sources to 17%. Two scenarios for the energy situation in 2025 have been elaborated and are discussed. An overall energy policy strategy and regulatory framework covering non-renewable and renewable resources are crucial for securing energy demand. - Highlights: • Indonesia aims at 17% renewable energy in energy mix 2025. • Population growth exceeds increase of energy production. • Investment incentives for new technologies, exploration and efficient production are necessary. • Clear and comprehensive energy policy strategy and regulatory framework are crucial

  9. National security risks? Uncertainty, austerity and other logics of risk in the UK government’s National Security Strategy

    NARCIS (Netherlands)

    Hammerstad, A.; Boas, I.J.C.

    2015-01-01

    Risk scholars within Security Studies have argued that the concept of security has gone through a fundamental transformation away from a threat-based conceptualisation of defence, urgency
    and exceptionality to one of preparedness, precautions and prevention of future risks, some of which are

  10. Fish farming as an innovative strategy for promoting food security in drought risk regions of Zimbabwe

    Directory of Open Access Journals (Sweden)

    Elvin Shava

    2017-11-01

    Full Text Available This article examines the implementation of fish farming as an innovative and economic strategy for promoting food security and dietary diversities among vulnerable households in drought risk areas of Zimbabwe. The declining climatic conditions and lack of economic opportunities in Mwenezi district of Zimbabwe attracted the attention of three nongovernmental organisations (NGOs to implement fish farming as an innovative mechanism to stimulate food security and generate employment in the district. The article used a qualitative research approach that includes semi-structured interviews and secondary data. The purposive sampling technique was adopted to interview participants in Mwenezi district who were involved in fish farming to assess and explore the experiences and benefits they derive from such development projects. Results for the article revealed that fish farming was well embraced by local communities as it led to improvements in food security, household income and employment regeneration. The local government including traditional leadership (Chiefs and Headmen’s supported the NGO activities as they benefited local communities. The article concludes that although fish farming was instrumental in regenerating employment, some participants still fail to participate because of laziness and desire to maintain dependency syndrome. The article recommends the NGOs to launch awareness campaigns in rural communities and increase networking with the donor community which is fundamental in attracting sustainable funding. The government can also promote fish farming in vulnerable rural communities by providing funding and capacity building programmes.

  11. Macro Dark Matter

    CERN Document Server

    Jacobs, David M; Lynn, Bryan W.

    2015-01-01

    Dark matter is a vital component of the current best model of our universe, $\\Lambda$CDM. There are leading candidates for what the dark matter could be (e.g. weakly-interacting massive particles, or axions), but no compelling observational or experimental evidence exists to support these particular candidates, nor any beyond-the-Standard-Model physics that might produce such candidates. This suggests that other dark matter candidates, including ones that might arise in the Standard Model, should receive increased attention. Here we consider a general class of dark matter candidates with characteristic masses and interaction cross-sections characterized in units of grams and cm$^2$, respectively -- we therefore dub these macroscopic objects as Macros. Such dark matter candidates could potentially be assembled out of Standard Model particles (quarks and leptons) in the early universe. A combination of earth-based, astrophysical, and cosmological observations constrain a portion of the Macro parameter space; ho...

  12. Deficit irrigation and sustainable water-resource strategies in agriculture for China's food security.

    Science.gov (United States)

    Du, Taisheng; Kang, Shaozhong; Zhang, Jianhua; Davies, William J

    2015-04-01

    More than 70% of fresh water is used in agriculture in many parts of the world, but competition for domestic and industrial water use is intense. For future global food security, water use in agriculture must become sustainable. Agricultural water-use efficiency and water productivity can be improved at different points from the stomatal to the regional scale. A promising approach is the use of deficit irrigation, which can both save water and induce plant physiological regulations such as stomatal opening and reproductive and vegetative growth. At the scales of the irrigation district, the catchment, and the region, there can be many other components to a sustainable water-resources strategy. There is much interest in whether crop water use can be regulated as a function of understanding of physiological responses. If this is the case, then agricultural water resources can be reallocated to the benefit of the broader community. We summarize the extent of use and impact of deficit irrigation within China. A sustainable strategy for allocation of agricultural water resources for food security is proposed. Our intention is to build an integrative system to control crop water use during different cropping stages and actively regulate the plant's growth, productivity, and development based on physiological responses. This is done with a view to improving the allocation of limited agricultural water resources. © The Author 2015. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  13. Deficit irrigation and sustainable water-resource strategies in agriculture for China’s food security

    Science.gov (United States)

    Du, Taisheng; Kang, Shaozhong; Zhang, Jianhua; Davies, William J.

    2015-01-01

    More than 70% of fresh water is used in agriculture in many parts of the world, but competition for domestic and industrial water use is intense. For future global food security, water use in agriculture must become sustainable. Agricultural water-use efficiency and water productivity can be improved at different points from the stomatal to the regional scale. A promising approach is the use of deficit irrigation, which can both save water and induce plant physiological regulations such as stomatal opening and reproductive and vegetative growth. At the scales of the irrigation district, the catchment, and the region, there can be many other components to a sustainable water-resources strategy. There is much interest in whether crop water use can be regulated as a function of understanding of physiological responses. If this is the case, then agricultural water resources can be reallocated to the benefit of the broader community. We summarize the extent of use and impact of deficit irrigation within China. A sustainable strategy for allocation of agricultural water resources for food security is proposed. Our intention is to build an integrative system to control crop water use during different cropping stages and actively regulate the plant’s growth, productivity, and development based on physiological responses. This is done with a view to improving the allocation of limited agricultural water resources. PMID:25873664

  14. Security Strategies of Both Players in Asymmetric Information Zero-Sum Stochastic Games with an Informed Controller

    KAUST Repository

    Li, Lichun

    2017-11-07

    This paper considers a zero-sum two-player asymmetric information stochastic game where only one player knows the system state, and the transition law is controlled by the informed player only. For the informed player, it has been shown that the security strategy only depends on the belief and the current stage. We provide LP formulations whose size is only linear in the size of the uninformed player\\'s action set to compute both history based and belief based security strategies. For the uninformed player, we focus on the regret, the difference between 0 and the future payoff guaranteed by the uninformed player in every possible state. Regret is a real vector of the same size as the belief, and depends only on the action of the informed player and the strategy of the uninformed player. This paper shows that the uninformed player has a security strategy that only depends on the regret and the current stage. LP formulations are then given to compute the history based security strategy, the regret at every stage, and the regret based security strategy. The size of the LP formulations are again linear in the size of the uninformed player action set. Finally, an intrusion detection problem is studied to demonstrate the main results in this paper.

  15. Strategies for Human Capacity Development in Nuclear Safety and Security in the NNRA

    International Nuclear Information System (INIS)

    Akpanowo, M.; Iwuala, E.

    2016-01-01

    Full text: The Nigerian Nuclear Regulatory Authority (NNRA) is charged with the responsibility for nuclear safety and radiological protection regulation. With Nigeria as one of the nuclear power states, NNRA has since 2010 intensified efforts in developing capacity to license the first set of nuclear power plants in Nigeria. The NNRA has employed several strategies in developing building and strengthening the human capacity to fulfill its statutory functions. This paper describes available human capacity development programmes and the strategies for implementing them including, knowledge retention and management strategy. The strategy commences with the recruitment process, initial training and education and continuous training. As a technical support arm of the NNRA, the National Institute for Radiation Protection and Research offers postgraduate diploma and masters programmes in radiation protection, where many NNRA officers have been trained. The NNRA also leverages on its collaboration with different international organizations for the training of its manpower in the area of nuclear safety and security. NNRA Officers participate in various IAEA organized programmes including fellowship for postgraduate diploma and master programmes, training course, workshops, seminars, conferences, scientific visits and on-the-job-training (OJT). Collaborations with other international organizations are also presented. (author

  16. Probing strategy-project alignment: The case of the South African Social Security Agency

    Directory of Open Access Journals (Sweden)

    Gerrit Van Der Waldt

    2016-12-01

    Full Text Available Public institutions, such as the South African Social Security Agency (SASSA increasingly function in multi-project environments to translate strategies successfully into service-delivery initiatives. However, this ‘projectification’ often causes projects to be designed and executed haphazardly. This can lead to budget and schedule overruns, and the general wastage of an organisation’s resources. Project failures often occur where organisations do not ensure that specific projects are aligned with their core strategies. The purpose of this article is to combine the theories and principles of organisation, management, strategic management, and project management in an effort to pinpoint core determinants that can help establish the extent to which an organisation manages the alignment of its strategic projects. In the present study, the author applied the principles of interdisciplinarity, systems thinking, and organisational integration. The combined core determinants that were uncovered were then used in an empirical investigation of SASSA. The purpose of this investigation is to identify particular challenges the organisation faces in aligning their strategies and projects successfully. Thereafter, a number of recommendations follow to address these challenges.

  17. Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy

    Directory of Open Access Journals (Sweden)

    Audrey Guinchard

    2011-01-01

    Full Text Available Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked in the debate on cyber security. A UKreport on the cost of cyber crime illustrates this approach. Its authors chose to exclude from their analysis the costs in anticipation of cyber crime, such as insurance costs and the costs of purchasing anti-virus software on the basis that "these are likely to be factored into normal day-to-day expenditures for the Government, businesses, and individuals. This article contends if these costs had been quantified and integrated into the cost of cyber crime, then the analysis would have revealed that what matters is not so much cyber crime, but the fertile terrain of vulnerabilities that unleash a range of possibilities to whomever wishes to exploit them. By downplaying the vulnerabilities, the threats represented by cyber war, cyber terrorism, and cyber crime are conversely inflated. Therefore, reassessing risk as a strategy for security in cyberspace must include acknowledgment of understated vulnerabilities, as well as a better distributed knowledge about the nature and character of the overhyped threats of cyber crime, cyber terrorism, and cyber war.

  18. Green paper: towards a European strategy for the security of energy supply

    International Nuclear Information System (INIS)

    2001-04-01

    The Green Paper ''Towards a European strategy for the security of energy supply in Europe'', published in 2002, gives a clear priority to energy efficiency and renewable. Although it is not a legislative document, it is accepted by the main actors as a reference for all energy related actions. Energie-Cites welcomes the Green Paper. This document gives a clear review of the energy context in Europe and raises fundamental questions, in particular, the place given to energy demand management, presented as the priority policy to ensure security of supply and compliance with the European Union international commitments. However, they precise three important points. It is indispensable that potential energy savings be quantified so as to emphasize the importance of a resource that has always been underestimated. By the same token, the ''demand management'' option presented in the Green Paper would gain in credibility if several alternative scenarios were proposed, the impact and the conditions for the success of such a policy being then more clearly apparent. A policy with a stronger focus on demand management and renewable energy requires one to redirect attention towards a different set of players. (A.L.B.)

  19. Green paper - towards a European strategy for the security of energy supply, technical document

    International Nuclear Information System (INIS)

    2005-01-01

    The Green Paper sets forth a series of questions regarding the security of energy in Europe. It addresses the issue of increased consumption and dependence on oil, and sketches out possible strategies for broadening the energy supply and slowing global warming. It draws an alarming picture of the EU energy situation. If no action is taken, it predicts that the EU energy dependency will climb from 50% in 2000 to 70% in 2030. The particular situation for the main imported fossil fuels is described. This technical paper is particularly devoted to the context, the energy sources, the supply disruption, the energy demand, the fuel balance, the energy technology and the transport of fuel in the EU (transit). (A.L.B.)

  20. The green paper 'towards a European strategy for the security of energy supply'

    International Nuclear Information System (INIS)

    Laponche, B.; Tillerson, K.

    2001-01-01

    The Green Paper, 'Towards a European Strategy for the Security of Energy Supply' was adopted by the European Commission on the 20. of November, 2000 (COM(2000)769 final). At this occasion, the Commission launched a public debate on this strategic document. On the 21. of June 2001, a Public Hearing on Security of energy supply in Europe, on the basis of the Green Paper, was organised by the Committee on Industry, External Trade, Research and Energy of the European Parliament. Bernard Laponche was among the six experts participating to the Hearing and presented the following paper, prepared with Kenya Tillerson. This presentation is organised in three chapters: I - Comments on the Green Paper; II - Energy efficiency potentials; III - Conclusions and Recommendations. Chapter I shows that under the heading of the security of supply, the Green paper elaborates and proposes a global energy strategy taking into account environmental and internal market issues and constraints. This leads to recommendations for a common energy policy for Europe based, as first priority, on a demand policy, i.e. energy efficiency on the demand side. If the necessity of such a policy is clearly stated, the Green paper remains weak on the quantitative objectives, due to the lack of contrasted energy forecast scenarios, as well as on the means of a vigorous energy efficiency policy at European Level. The issue of energy efficiency potentials at European Union level is examined in Chapter II, in the light of the poor information which can be extracted from the energy scenarios presented by the European Commission in various publications. A comparison of energy consumption indicators in France and the European Union leads to a rough estimate of a potential for energy demand efficiency by 2020 of the order of 280 Mtoe on final energy consumption, for the European Union. Chapter III underlines the merits of the Green Paper which are a clear-sighted analysis and a well defined main recommendation

  1. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  2. A National Security Strategy for a New Century: A Blueprint for Indiscriminate and Ineffectual Meddling in the Political Affairs of Other Nations

    National Research Council Canada - National Science Library

    1997-01-01

    The Clinton Administration's May 1997 monograph A National Security Strategy for a New Century was clearly the product of a committee A good strategy should be broad and inclusive and should reflect...

  3. Indigenous food security revival strategies at the village level: The gender factor implications

    Directory of Open Access Journals (Sweden)

    Wilfred Lunga

    2016-01-01

    Full Text Available This article is based on an evaluation concerning the practice of the Zunde raMambo concept (commonly referred to as Zunde in four of Zimbabwe’s 52 districts; (Mangwe, Lupane, Guruve and Hwedza. Zunde is a social security system providing protection against food shortages to vulnerable families and is coordinated by chiefs. The Zunde concept identifies with Ndebele and Shona rural communities in Zimbabwe. Thus, this evaluation sought to determine the relevance and fulfilment of the Zunde project objectives, namely: efficiency, effectiveness, impact and sustainability. The revived Zunde practice extends a long way in reducing food insecurity in vulnerable communities. Although the concept may be as old as the Zimbabwean culture, it had been abandoned as communities became urbanised. The Chief’s Council of Zimbabwe, in collaboration with the Nutrition Unit of the Ministry of Health and Child Welfare have rekindled it. However, to revive this indigenous knowledge practice, there is need to assess the nature of existing social and economic structures, leadership, gender roles and the availability of resources such as land, inputs and implements. This article, which is based on both qualitative and quantitative data, collected between September 2013 and March 2014, goes on to reflect on policy issues surrounding disaster risk reduction (DRR and survival strategies used by vulnerable communities in rural areas of Zimbabwe. It recommends that the gender factor approach offers the best means possible to understand peoples’ needs and challenges as well as how these can be satisfied and resolved respectively.

  4. The strategy for the development of information society in Serbia by 2020: Information security and critical infrastructure

    Directory of Open Access Journals (Sweden)

    Danijela D. Protić

    2012-10-01

    Full Text Available The development of technology has changed the world economy and induced new political trends. The European Union (EU and many non-EU member states apply the strategies of information society development that raise the level of information security (IS. The Serbian Government (Government has adopted the Strategy for Information Society in Serbia by 2020 (Strategy, and pointed to the challenges for the development of a modern Serbian information society. This paper presents an overview of the open-ended questions about IS, critical infrastructures and protection of critical infrastructures. Based on publicly available data, some critical national infrastructures are listed. As a possible solution to the problem of IS, the Public Key Infrastructure (PKI-based Information security integrated information system (ISIIS is presented. The ISIIS provides modularity and interoperability of critical infrastructures both in Serbia and neighboring countries.

  5. Macro-economic environmental models

    International Nuclear Information System (INIS)

    Wier, M.

    1993-01-01

    In the present report, an introduction to macro-economic environmental models is given. The role of the models as a tool for policy analysis is discussed. Future applications, as well as the limitations given by the data, are brought into focus. The economic-ecological system is described. A set of guidelines for implementation of the system in a traditional economic macro-model is proposed. The characteristics of empirical national and international environmental macro-economic models so far are highlighted. Special attention is paid to main economic causalities and their consequences for the environmental policy recommendations sat by the models. (au) (41 refs.)

  6. A generalized macro-assembler

    International Nuclear Information System (INIS)

    Kaul, Mohan Lai

    1970-01-01

    The objective of this research is to study existing macro assemblers, and to create a generalized macro assembler, MAG-I, which is a system independent of a source language, and provides the following possibilities: development of any existing language, translation from a language to another, and creation of a new language. The user can choose his own notations to define macros. The system is implemented on an IBM 360/91 computer. Programs are written in symbolic language and the input/output software is written in Fortran [fr

  7. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  8. Green paper. Towards a European strategy for the security of energy supply

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This Green Paper is the response to an observable fact: Europe growing future energy dependence. Its aim is to initiate a debate on the security of energy supply, an issue that is still very much alive. Three main points emerge from the Green Paper: the European Union will become increasingly dependent on external energy sources; enlargement will not change the situation; based on current forecasts, dependence will reach 70 % in 2030; the European Union has very limited scope to influence energy supply conditions (it is essentially on the demand side that the EU can intervene, mainly by promoting energy saving in buildings and the transport sector); at present, the European Union is not in a position to respond to the challenge of climate change and to meet its commitments, notably under the Kyoto Protocol. In these circumstances, the Commission would like the debate on the future strategy to be structured around the following principal questions: 1. Can the European Union accept an increase in its dependence on external energy sources without compromising its security of supply and European competitiveness? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on the others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Are tax and State aid policies in the energy sector an obstacle to competitiveness in the European Union or not? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investments be guaranteed? 5. Should more reserves be stockpiled, as already done for oils, and should other energy sources be included, such as gas or coal? Does the risk of physical disruption to energy supplies justify more onerous measures for

  9. Green paper. Towards a European strategy for the security of energy supply

    International Nuclear Information System (INIS)

    2001-01-01

    This Green Paper is the response to an observable fact: Europe growing future energy dependence. Its aim is to initiate a debate on the security of energy supply, an issue that is still very much alive. Three main points emerge from the Green Paper: the European Union will become increasingly dependent on external energy sources; enlargement will not change the situation; based on current forecasts, dependence will reach 70 % in 2030; the European Union has very limited scope to influence energy supply conditions (it is essentially on the demand side that the EU can intervene, mainly by promoting energy saving in buildings and the transport sector); at present, the European Union is not in a position to respond to the challenge of climate change and to meet its commitments, notably under the Kyoto Protocol. In these circumstances, the Commission would like the debate on the future strategy to be structured around the following principal questions: 1. Can the European Union accept an increase in its dependence on external energy sources without compromising its security of supply and European competitiveness? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on the others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Are tax and State aid policies in the energy sector an obstacle to competitiveness in the European Union or not? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investments be guaranteed? 5. Should more reserves be stockpiled, as already done for oils, and should other energy sources be included, such as gas or coal? Does the risk of physical disruption to energy supplies justify more onerous measures for

  10. Ancient Clam Gardens Increased Shellfish Production: Adaptive Strategies from the Past Can Inform Food Security Today

    Science.gov (United States)

    Groesbeck, Amy S.; Rowell, Kirsten; Lepofsky, Dana; Salomon, Anne K.

    2014-01-01

    Maintaining food production while sustaining productive ecosystems is among the central challenges of our time, yet, it has been for millennia. Ancient clam gardens, intertidal rock-walled terraces constructed by humans during the late Holocene, are thought to have improved the growing conditions for clams. We tested this hypothesis by comparing the beach slope, intertidal height, and biomass and density of bivalves at replicate clam garden and non-walled clam beaches in British Columbia, Canada. We also quantified the variation in growth and survival rates of littleneck clams (Leukoma staminea) we experimentally transplanted across these two beach types. We found that clam gardens had significantly shallower slopes than non-walled beaches and greater densities of L. staminea and Saxidomus giganteus, particularly at smaller size classes. Overall, clam gardens contained 4 times as many butter clams and over twice as many littleneck clams relative to non-walled beaches. As predicted, this relationship varied as a function of intertidal height, whereby clam density and biomass tended to be greater in clam gardens compared to non-walled beaches at relatively higher intertidal heights. Transplanted juvenile L. staminea grew 1.7 times faster and smaller size classes were more likely to survive in clam gardens than non-walled beaches, specifically at the top and bottom of beaches. Consequently, we provide strong evidence that ancient clam gardens likely increased clam productivity by altering the slope of soft-sediment beaches, expanding optimal intertidal clam habitat, thereby enhancing growing conditions for clams. These results reveal how ancient shellfish aquaculture practices may have supported food security strategies in the past and provide insight into tools for the conservation, management, and governance of intertidal seascapes today. PMID:24618748

  11. Strategies to enable the adoption of animal biotechnology to sustainably improve global food safety and security.

    Science.gov (United States)

    Tizard, Mark; Hallerman, Eric; Fahrenkrug, Scott; Newell-McGloughlin, Martina; Gibson, John; de Loos, Frans; Wagner, Stefan; Laible, Götz; Han, Jae Yong; D'Occhio, Michael; Kelly, Lisa; Lowenthal, John; Gobius, Kari; Silva, Primal; Cooper, Caitlin; Doran, Tim

    2016-10-01

    The ability to generate transgenic animals has existed for over 30 years, and from those early days many predicted that the technology would have beneficial applications in agriculture. Numerous transgenic agricultural animals now exist, however to date only one product from a transgenic animal has been approved for the food chain, due in part to cumbersome regulations. Recently, new techniques such as precision breeding have emerged, which enables the introduction of desired traits without the use of transgenes. The rapidly growing human population, environmental degradation, and concerns related to zoonotic and pandemic diseases have increased pressure on the animal agriculture sector to provide a safe, secure and sustainable food supply. There is a clear need to adopt transgenic technologies as well as new methods such as gene editing and precision breeding to meet these challenges and the rising demand for animal products. To achieve this goal, cooperation, education, and communication between multiple stakeholders-including scientists, industry, farmers, governments, trade organizations, NGOs and the public-is necessary. This report is the culmination of concepts first discussed at an OECD sponsored conference and aims to identify the main barriers to the adoption of animal biotechnology, tactics for navigating those barriers, strategies to improve public perception and trust, as well as industry engagement, and actions for governments and trade organizations including the OECD to harmonize regulations and trade agreements. Specifically, the report focuses on animal biotechnologies that are intended to improve breeding and genetics and currently are not routinely used in commercial animal agriculture. We put forward recommendations on how scientists, regulators, and trade organizations can work together to ensure that the potential benefits of animal biotechnology can be realized to meet the future needs of agriculture to feed the world.

  12. Writing Excel Macros with VBA

    CERN Document Server

    Roman, Steven

    2008-01-01

    To achieve the maximum control and flexibility from Microsoft® Excel often requires careful custom programming using the VBA (Visual Basic for Applications) language. Writing Excel Macros with VBA, 2nd Edition offers a solid introduction to writing VBA macros and programs, and will show you how to get more power at the programming level: focusing on programming languages, the Visual Basic Editor, handling code, and the Excel object model.

  13. an analysis of yam storage strategy to promote food security in asa

    African Journals Online (AJOL)

    Osondu

    2012-10-17

    Oct 17, 2012 ... with information regarding improved storage strategies as well as exposed to training on their use. .... be need to improve or develop new storage strategy. It is ... i. determine the various methods of yam storage strategy.

  14. Infrastructure to support trading strategies against the occurrence of extraordinary events: Secure area of the equipment storage

    International Nuclear Information System (INIS)

    Blas Gordo, A. de; Asensio Vega, J.; Fernandez Morales, E. J.; Font Hadinger, I.

    2013-01-01

    Compliance with the requirements specified in the Technical Instructions ITC and ITC-1-2, issued by the Nuclear Safety Council (CSN), is conducting exhaustive analyzes on coping in Nuclear Power Plants emergencies due to the occurrence extraordinary events. As part of the necessary infrastructure, a secure area for parking and storage of projects teams involved in the development of various operational strategies. The design of it ensures compliance with all regulatory and practical requirements, ensuring minimization strategies and time functionality in the application of the same.

  15. ZEUS - standardized macros for the TPA computer

    International Nuclear Information System (INIS)

    Winde, M.

    1976-01-01

    An existing cross-assembler with macro-option was modified to allow the usage of the ZEUS macros. The ZEUS macros are understood by the assembler without prior definition by the user. ZEUS macros allow the programmer, who is obliged to code his TPA (PDP-8) programs on the assembler level to formulate his program logic as in a higher level language. ZEUS macros offer all basic elements necessary for structured programming. (author)

  16. Engagement and Implications for Future National Security Strategies: Can the Services Adapt

    National Research Council Canada - National Science Library

    Hodge, Michael

    2000-01-01

    ...: mission profiles beyond the design of US armed forces, debate over the role of US armed forces within an "engagement" construct, debate over the future nature of US Security Policy and doctrinal...

  17. Air Force Strategy: Sovereign Options for Securing Global Stability and Prosperity

    National Research Council Canada - National Science Library

    2008-01-01

    ... competition for resources and influence. This strategic context demands that we retain our position of international political and military leadership because security and economic health closely intertwine with international political...

  18. The Interagency Breakdown: Why We Need Legislative Reform to Coordinate Execution of the National Security Strategy

    National Research Council Canada - National Science Library

    Borkowski, David C

    2008-01-01

    To meet the national security demands of the 21st century, the U.S. Government's interagency structure and process require legislative reform equivalent to an interagency Goldwater-Nichols Act. The U.S...

  19. Reassessing U.S. National Security Strategy: The Kurdistan Worker's Party (PKK)

    National Research Council Canada - National Science Library

    Clark, Perry

    2008-01-01

    The Kurdistan Worker's Party (PKK), a terrorist-insurgent group with ties to lucrative transnational criminal organizations throughout Europe, continues to threaten Turkey-Iraq regional stability by attacking Turkish Security Forces...

  20. National Plan to Achieve Maritime Domain Awareness for the National Strategy for Maritime Security

    National Research Council Canada - National Science Library

    2005-01-01

    Maritime Domain Awareness (MDA) is the effective understanding of anything associated with the global maritime domain that could impact the security, safety, economy, or environment of the United States...

  1. THE FRAMEWORK STRATEGY RELATED TO SECURITY IN SOUTH-EASTERN EUROPE

    Directory of Open Access Journals (Sweden)

    Valentin-Bogdan DĂNILĂ

    2012-06-01

    Full Text Available When discussing the current strategic environment, there is the "when" of the Cold War and the first half of the '90s, and the "now" of today. The changing demography and migration patterns, ethnic and religious tensions, environmental degradation, instability coming from states that are likely to decline or have already fallen, and growing proliferation of weapons are just some of the problems that have exacerbated the differences between security "then" and "now", such as the transnational terrorist attacks after September 11, 2001. The concept of security was much disputed, as seen from a study of the United Nations in 1986, developed by a group of experts on the concept of security, resulting in the existence of a limited conceptual similarity between them Mankind has always been concerned with building or rebuilding peace and security During the Cold War, Central and Eastern European countries were not talking about a national security concept in the Western sense of the word, but about a military doctrine of the Warsaw Pact and, in some cases, as was that of Romania, about a national military doctrine. After the fall of the Iron Curtain, those countries have gradually chosen to use the concept of national security, a term that takes into account all types of threats to national interests, and also the whole range of ways to counter them, the military not having the leading role any longer.

  2. A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing.

    Science.gov (United States)

    Ko, Hoon; Měsíček, Libor; Choi, Jongsun; Hwang, Seogchan

    2018-01-01

    Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.

  3. A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing

    Directory of Open Access Journals (Sweden)

    Hoon Ko

    2018-01-01

    Full Text Available Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients’ biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.

  4. Teaching Note--Incorporating Social Innovation Content into Macro Social Work Education

    Science.gov (United States)

    Pitt-Catsouphes, Marcie; Cosner Berzin, Stephanie

    2015-01-01

    The practice of social innovation offers promising approaches for addressing social issues. Although many social innovation strategies are congruent with macro social work theory and practice, some of the insights and tactics that have emerged in the social innovation field have the potential to strengthen current macro practice. Based on our…

  5. Provisioning Strategies for Transparent Optical Networks Considering Transmission Quality, Security, and Energy Efficiency

    Energy Technology Data Exchange (ETDEWEB)

    Jirattigalachote, Amornrat

    2012-07-01

    The continuous growth of traffic demand driven by the brisk increase in number of Internet users and emerging online services creates new challenges for communication networks. The latest advances in Wavelength Division Multiplexing (WDM) technology make it possible to build Transparent Optical Networks (TONs) which are expected to be able to satisfy this rapidly growing capacity demand. The work in this thesis addresses three important aspects. In particular, this thesis focuses on routing and wavelength assignment (RWA) strategies specifically devised to target: (i) the lightpath transmission quality, (ii) the network security (i.e., in terms of vulnerability to physical-layer attacks), and (iii) the reduction of the network energy consumption. Our contributions are summarized below. A number of Impairment Constraint Based Routing (ICBR) algorithms have been proposed in the literature to consider physical-layer impairments during the connection provisioning phase. Their objective is to prevent the selection of optical connections (referred to as lightpaths) with poor signal quality. These ICBR approaches always assign each connection request the least impaired lightpath and support only a single threshold of transmission quality, used for all connection requests. However, next generation networks are expected to support a variety of services with disparate requirements for transmission quality. To address this issue, in this thesis we propose an ICBR algorithm supporting differentiation of services at the Bit Error Rate (BER) level, referred to as ICBR-Diff. Our approach takes into account the effect of physical-layer impairments during the connection provisioning phase where various BER thresholds are considered for accepting/blocking connection requests, depending on the signal quality requirements of the connection requests. We tested the proposed ICBR-Diff approach in different network scenarios, including also a fiber heterogeneity. It is shown that it can

  6. 101 Ready-To-Use Excel Macros

    CERN Document Server

    Alexander, Michael

    2012-01-01

    Save time and be more productive with this helpful guide to Excel macros! While most books about Excel macros offer only minor examples, usually aimed at illustrating a particular topic, this invaluable resource provides you with the tools needed to efficiently and effectively program Excel macros immediately. Step-by-step instructions show you how to create VBA macros and explain how to customize your applications to look and work exactly as you want them to. By the end of the book, you will understand how each featured macro works, be able to reuse the macros included in the book and online,

  7. Security Games with Probabilistic Constraints on the Agent’s Strategy

    NARCIS (Netherlands)

    Laan, C.M.; Barros, A.I.; Boucherie, R.J.; Monsuur, H.

    2017-01-01

    This paper considers a special case of security games dealing with the protection of a large area divided in multiple cells for a given planning period. An intruder decides on which cell to attack and an agent selects a patrol route visiting multiple cells from a finite set of patrol routes such

  8. A 21st Century Science, Technology, and Innovation Strategy for Americas National Security

    Science.gov (United States)

    2016-05-01

    economic value, and allow entrepreneurs and industry to share facilities, equipment, and production capacity? In some cases, efforts similar to the Army...means to build community relations, maintain employee morale , and impact broad STEM education and national security STEM workforce efforts...acquisition and intellectual property create opportunities for U.S. entrepreneurs and companies while furthering the mission of the enterprise. Non

  9. Domestic water and sanitation as water security: monitoring, concepts and strategy

    Science.gov (United States)

    Bradley, David J.; Bartram, Jamie K.

    2013-01-01

    Domestic water and sanitation provide examples of a situation where long-term, target-driven efforts have been launched with the objective of reducing the proportion of people who are water-insecure, most recently through the millennium development goals (MDGs) framework. Impacts of these efforts have been monitored by an increasingly evidence-based system, and plans for the next period of international policy, which are likely to aim at universal coverage with basic water and sanitation, are being currently developed. As distinct from many other domains to which the concept of water security is applied, domestic or personal water security requires a perspective that incorporates the reciprocal notions of provision and risk, as the current status of domestic water and sanitation security is dominated by deficiency This paper reviews the interaction of science and technology with policies, practice and monitoring, and explores how far domestic water can helpfully fit into the proposed concept of water security, how that is best defined, and how far the human right to water affects the situation. It is considered that they fit well together in terms both of practical planning of targets and indicators and as a conceptual framework to help development. The focus needs to be broad, to extend beyond households, to emphasize maintenance as well as construction and to increase equity of access. International and subnational monitoring need to interact, and monitoring results need to be meaningful to service providers as well as users. PMID:24080628

  10. Macro-environmental policy: Principles and design

    International Nuclear Information System (INIS)

    Huppes, G.

    1993-01-01

    The central theme of this book is how macro-environmental policy can be developed, which does not prescribe or suggest specific technologies and products bu realizes the environmental quality desired by changing the general context. The publication is composed of four main parts. The framework for analysis and the normative principles for policy design and evaluation, the first two parts, form the analytic core. The framework for analysis gives a classification of instruments in terms of permutations of a limited number of defining elements. The normative principles guide choices in instrument design and, as the flexible response strategy, guide their application in specific policies. Detailing two main new instruments (the standard method for life cycle analysis and the substance deposit, and applying the instrument strategy as developed to the cases make up the next two parts

  11. Macro-elementwise preconditioning methods

    Czech Academy of Sciences Publication Activity Database

    Axelsson, Owe

    2012-01-01

    Roč. 82, č. 10 (2012), s. 1952-1963 ISSN 0378-4754 Institutional research plan: CEZ:AV0Z30860518 Keywords : heterogeniety * elementwise preconditioning * block matrix partitioning * macro-elements Subject RIV: BA - General Mathematics Impact factor: 0.836, year: 2012 http://www.sciencedirect.com/science/journal/03784754

  12. Making Twenty-First-Century Strategy. An Introduction to Modern National Security Processes and Problems

    Science.gov (United States)

    2006-11-01

    of the same Greek root word connotes “great importance” or the “highest level.” In the resulting confusion, which continues to this day even among...battlefield strategy may puzzle some readers. We chose to use battlefield strategy to emphasize the connection between decisions made in the marble -lined

  13. Determining proper strategies for health, safety, security and environmental (HSSE) management system.

    Science.gov (United States)

    Zaeimdar, Mojgan; Nasiri, Parvin; Taghdisi, Mohammadhoseyn; Abbaspour, Majid; Arjmandi, Reza; Kalatipor, Omid

    2013-01-01

    Today, managing an organization is concerned with many problems. Adopting proper strategies can promote an organization's survival. This study aimed at developing an appropriate HSSE Strategy for regional operation associated companies of Iran National Gas Company (INGS) using SWOT analysis. The analysis of the strengths, weaknesses, opportunities, and threats of HSSE was carried out and according to the results suitable strategies were recommended. In this regard, senior and junior managers, supervisors, and experts active in regional operation associated companies of Iran National Gas Company participated in SWOT analysis from HSSE angle. Then, they selected the most applicable SWOT factors pertaining to the organization. In the next step, these factors were weighted and scored. Based on the results four categories of strategies were developed including SO, WO, ST, and WT. Further examination showed that SO Strategies were the most applicable for the organization.

  14. Energy Security and Economics of Indian Biofuel Strategy in a Global Context

    OpenAIRE

    Gunatilake, Herath; Roland-Holst, David; Sugiyarto, Guntur; Baka, Jenn

    2011-01-01

    The emergence of biofuel as a renewable energy source offers opportunities for climate change mitigation and greater energy security for many countries. At the same time, biofuel represents the possibility of substitution between energy and food. For developing countries like India, which imports over 75% of its crude oil, fossil fuels pose two risks - global warming pollution and negative economic impacts of oil price hikes. This paper examines India's options for managing energy price risk ...

  15. A National Security Strategy for Sweden: Balancing Risks and Opportunities in the 21st Century

    Science.gov (United States)

    2010-04-01

    physics and chemistry. The Intergovernmental Panel on Climate Change (IPCC) links a higher concentration of greenhouse gases to an increase in atmospheric...Command and Staff College. International Security Studies: AY10 Coursebook . Montgomery, 2009. Air Command and Staff College. War Studies Course: AY10... Coursebook . Montgomery, 2009. Assadourian, Eric (Project Director at the World Watch Institute). Vital Signs 2007-2008; The Trends that are Shaping Our

  16. Incorporating Charging/Discharging Strategy of Electric Vehicles into Security-Constrained Optimal Power Flow to Support High Renewable Penetration

    Directory of Open Access Journals (Sweden)

    Kyungsung An

    2017-05-01

    Full Text Available This research aims to improve the operational efficiency and security of electric power systems at high renewable penetration by exploiting the envisioned controllability or flexibility of electric vehicles (EVs; EVs interact with the grid through grid-to-vehicle (G2V and vehicle-to-grid (V2G services to ensure reliable and cost-effective grid operation. This research provides a computational framework for this decision-making process. Charging and discharging strategies of EV aggregators are incorporated into a security-constrained optimal power flow (SCOPF problem such that overall energy cost is minimized and operation within acceptable reliability criteria is ensured. Particularly, this SCOPF problem has been formulated for Jeju Island in South Korea, in order to lower carbon emissions toward a zero-carbon island by, for example, integrating large-scale renewable energy and EVs. On top of conventional constraints on the generators and line flows, a unique constraint on the system inertia constant, interpreted as the minimum synchronous generation, is considered to ensure grid security at high renewable penetration. The available energy constraint of the participating EV associated with the state-of-charge (SOC of the battery and market price-responsive behavior of the EV aggregators are also explored. Case studies for the Jeju electric power system in 2030 under various operational scenarios demonstrate the effectiveness of the proposed method and improved operational flexibility via controllable EVs.

  17. MALAYSIA'S POST-9/11 SECURITY STRATEGY: WINNING "HEARTS AND MINDS" OR LEGITIMISING THE POLITICAL STATUS QUO?

    Directory of Open Access Journals (Sweden)

    Andrew Humphreys

    2010-01-01

    Full Text Available Since the Emergency, the Malaysian government has maintained a security policy which somewhat paradoxically combines the use ofcoercive, repressive legislation with a "hearts and minds" ideology.Following 9/11, I argue that the government has adapted this "heartsand minds" approach to the so-called War on Terror. The BarisanNasional governments of Mahathir Mohamad and Abdullah Badawi bothformulated ideological strategies designed to undermine the ideological strength of al-Qaeda and establish Malaysia as a leader of the Muslim world. Mahathir and Abdullah hinged their ideological approach on a state-constructed form of Islam and sought to portray Malaysia as a tolerant and moderate Muslim country. However, it will be shown that the use of ideology in Malaysia is often calibrated to ensure regime security rather than national security. The Malaysian government has used its ideology to promote elite interests and limit the discursive space for alternative and opposing viewpoints. Significantly, ideology has been used to justify crackdowns against genuine political opponents and to legitimise the political status quo.

  18. Socio-Hydrological Observatory for Water Security (SHOWS): Examples of Adaptation Strategies With Next Challenges from Brazilian Risk Areas

    Science.gov (United States)

    Souza, F. A. A. D.; Mendiondo, E. M.; Taffarello, D.; Guzmán-Arias, D.; Fava, M. C.; Abreu, F.; Freitas, C. C.; de Macedo, M. B.; Estrada, C. R.; do Lago, C. A.

    2017-12-01

    In Brazil, more than 40,000 hot-spot areas, with vulnerable human settlements with ca. 120 million inhabitants and responsible of 60% of Brazilian Gross Net Product, are threatened by hydrological-driven disaster risks. In these areas, local resilient actions and adaptation strategies do integrate the current Brazilian Act and Regulation of Laws of urban waters, climate change and civil protection. However, these initiatives are still under slow progress, especially to cope with floods, landslides, droughts, progressive biodiversity losses and energy burnouts. Here we address these hot-spots through the concept of Socio-Hydrological Observatory for Water Security (SHOWS), with a mix of adaptation strategies, open-source, big data analysis and societal feedbacks. On the one hand, SHOWS merges strategies like the dynamic framework of water security (Srinivasan et al, 2017), drought risk mapping (Rossato et al, 2017) and water securitization under varying water demand and climate change until year 2100 (Mohor & Mendiondo, 2017; Guzmán-Arias et al, 2017). SHOWS acknowledges different perspectives of water insecurity, several spatiotemporal scales and regime shifts in socio-hydrologic systems. On the one hand, SHOWS links field monitoring during water insecurity hazards (Taffarello et al, 2016), ecosystem-based adaptation networks, and decision-making and big data sources to disaster management (Horita et al, 2017). By using selected examples from two Brazilian running interdisciplinary research aliances, i.e. CAPES-ProAlertas CEMADEN-CEPED/USP and the CNPq/FAPESP National Institute of Science & Technology on Climate Change-II Water Security, we also face the limits, the pros and cons of SHOWS' assumptions. Through real-cases paradoxes, (i.e. 2013/2014 drought), water dashboards and coevolution trends (i.e. impacts on river basin committees from scenarios until 2050, 2100 in NE & SE Brazil), SHOWS helps on guiding decisionmaking for next societal steps of water

  19. an analysis of yam storage strategy to promote food security in asa

    African Journals Online (AJOL)

    Osondu

    2012-10-17

    Oct 17, 2012 ... plant materials (27.3%) were the common storage strategy used which are not capable of ensuring good storage for ... faced in marketing yam produce. .... characteristics. Frequency. Percentage. Gender. Male. Female. 80. 30.

  20. National Security Strategy and the Munitions' Paradox: Self-Sufficiency or Maximum Efficiency

    National Research Council Canada - National Science Library

    McChesney, Michael

    1998-01-01

    ... that the United States military strategy may not be credible to likely regional aggressors. Conversely, DoD acquisition leadership believes industry consolidation should continue and the munitions base should be expanded to include US allies...

  1. Army Transformation: Its Long-Term Ability to Support the National Security Strategy

    National Research Council Canada - National Science Library

    Limberg, Daniel

    2006-01-01

    ..., interconnected and risky than ever before". The Cold War containment strategy is no longer effective in an environment of rogue nations, strong nationalistic sentiments, international criminal and terrorist organizations, and the proliferation...

  2. Regional disaster risk management strategies for food security: Probing Southern African Development Community channels for influencing national policy

    Directory of Open Access Journals (Sweden)

    Happy M. Tirivangasi

    2018-05-01

    Full Text Available Natural disasters and food insecurity are directly interconnected. Climate change related hazards such as floods, hurricanes, tsunamis, droughts and other risks can weaken food security and severely impact agricultural activities. Consequently, this has an impact on market access, trade, food supply, reduced income, increased food prices, decreased farm income and employment. Natural disasters create poverty, which in turn increases the prevalence of food insecurity and malnutrition. It is clear that disasters put food security at risk. The poorest people in the community are affected by food insecurity and disasters; hence, there is a need to be prepared as well as be in a position to manage disasters. Without serious efforts to address them, the risks of disasters will become an increasingly serious obstacle to sustainable development and the achievement of sustainable development goals, particularly goal number 2 ‘end hunger, achieve food security and improved nutrition and promote sustainable agriculture’. In recent years, countries in southern Africa have experienced an increase in the frequency, magnitude and impact of climate change–related hazards such as droughts, veld fire, depleting water resources and flood events. This research aims to reveal Southern African Development Community disaster risk management strategies for food security to see how they an influence and shape policy at the national level in southern Africa. Sustainable Livelihood approach was adopted as the main theoretical framework for the study. The qualitative Analysis is based largely on data from databases such as national reports, regional reports and empirical findings on the disaster management–sustainable development nexus.

  3. Building Future Security: Strategies for Restructuring the Defense Technology and Industrial Base.

    Science.gov (United States)

    1992-06-01

    Affairs Staffs Group General Motors Corporation Detroit, Michigan Director JOHN H. GIBBONS The Technology Assessment Board approves the release...Chairman & CEO Technology, Strategies & Alliances Donald W Putnam Corporate Director of Contracts General Dynamics Corp. Jack Ruina Professor of...parts. This strategy allowed Mazda to bring a new product to market quickly and make a profit despite low volume sales. (Peter F. Drucker, "The Big Three

  4. Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy

    OpenAIRE

    Audrey Guinchard

    2011-01-01

    Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked in the debate on cyber security. A UKreport on the cost of cyber crime illustrates this approach. Its authors chose to exclude from their analysis the costs in anticipation of cyber crime, such as insurance costs and the costs of purchasing ant...

  5. Russian gas export strategy and security of supply concerns in Europe

    International Nuclear Information System (INIS)

    Stern, J.P.

    1992-01-01

    Despite great publicity given to security of supply problems associated with Russian gas exports to Europe, these problems seem to be manageable. While the risk of short term technical breakdown exists, we are more likely to see a significant increase in Russian gas exports to Europe, than a significant fall. Increases could be achieved in the short term by moving more gas through the existing infrastructure. The restructuring of sales and transit relationships between Russia and other former Soviet republics (especially the Ukraine) as well as former CMEA member states in Central/Eastern Europe will be very important if export relationships are to be maintained and expanded. 7 refs., 1 tab

  6. Green paper: towards a European strategy for the security of energy supply; Livre Vert: vers une strategie europeenne de securite d'approvisionnement energetique

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-04-01

    The Green Paper ''Towards a European strategy for the security of energy supply in Europe'', published in 2002, gives a clear priority to energy efficiency and renewable. Although it is not a legislative document, it is accepted by the main actors as a reference for all energy related actions. Energie-Cites welcomes the Green Paper. This document gives a clear review of the energy context in Europe and raises fundamental questions, in particular, the place given to energy demand management, presented as the priority policy to ensure security of supply and compliance with the European Union international commitments. However, they precise three important points. It is indispensable that potential energy savings be quantified so as to emphasize the importance of a resource that has always been underestimated. By the same token, the ''demand management'' option presented in the Green Paper would gain in credibility if several alternative scenarios were proposed, the impact and the conditions for the success of such a policy being then more clearly apparent. A policy with a stronger focus on demand management and renewable energy requires one to redirect attention towards a different set of players. (A.L.B.)

  7. The MARKAL-MACRO model and the climate change

    International Nuclear Information System (INIS)

    Kypreos, S.

    1996-07-01

    MARKAL-MACRO and its extensions is a model appropriate to study partial and general equilibrium in the energy markets and the implications of the carbon dioxide mitigation policy. The main advantage of MM is the explicit treatment of energy demand, supply and conversion technologies, including emission control and conservation options, within a general equilibrium framework. The famous gap between top-down and bottom-up models is resolved and the economic implications of environmental and supply policy constraints can be captured either in an aggregated (Macro) or in a sectorial (Micro) level. The multi-regional trade version of the model allows to study questions related to efficient and equitable allocation of cost and benefits associated with the climate change issue. Finally, the stochastic version of the model allows to assess policies related to uncertain and even catastrophic effects and define appropriate hedging strategies. The report is divided in three parts: - the first part gives an overview of the new model structure. It describes its macro economic part and explains its calibration, - the second part refers to the model applications for Switzerland when analyzing the economic implications of curbing CO 2 emissions or policies related to the introduction of a carbon tax, including a hedging strategy, - the last part is organized in form of Appendices and gives a mathematical description and some potential extensions of the model. It describes also a sensitivity analysis done with MARKAL-MACRO in 1992. (author) figs., tabs., refs

  8. Evaluating U.S. and Chinese Cyber Security Strategies Within a Cultural Framework

    Science.gov (United States)

    2016-04-01

    analysis of Chinese culture in warfare studies. They find that Chinese convention “respects inaction”28 and the teachings of Sun Tzu , thus favoring the...15 Bibliography ...AY16 16 Bibliography Ehsan Ahrari. “Transformation of America’s Military and Asymmetric War.” Comparative Strategy 29, no. 3 (2010): 223-244

  9. Agricultural diversification as an important strategy for achieving food security in Africa.

    Science.gov (United States)

    Waha, Katharina; van Wijk, Mark T; Fritz, Steffen; See, Linda; Thornton, Philip K; Wichern, Jannike; Herrero, Mario

    2018-03-31

    Farmers in Africa have long adapted to climatic and other risks by diversifying their farming activities. Using a multi-scale approach, we explore the relationship between farming diversity and food security and the diversification potential of African agriculture and its limits on the household and continental scale. On the household scale, we use agricultural surveys from more than 28,000 households located in 18 African countries. In a next step, we use the relationship between rainfall, rainfall variability, and farming diversity to determine the available diversification options for farmers on the continental scale. On the household scale, we show that households with greater farming diversity are more successful in meeting their consumption needs, but only up to a certain level of diversity per ha cropland and more often if food can be purchased from off-farm income or income from farm sales. More diverse farming systems can contribute to household food security; however, the relationship is influenced by other factors, for example, the market orientation of a household, livestock ownership, nonagricultural employment opportunities, and available land resources. On the continental scale, the greatest opportunities for diversification of food crops, cash crops, and livestock are located in areas with 500-1,000 mm annual rainfall and 17%-22% rainfall variability. Forty-three percent of the African cropland lacks these opportunities at present which may hamper the ability of agricultural systems to respond to climate change. While sustainable intensification practices that increase yields have received most attention to date, our study suggests that a shift in the research and policy paradigm toward agricultural diversification options may be necessary. © 2018 The Authors Global Change Biology Published by John Wiley & Sons Ltd.

  10. International Food Assistance: A U.S. Governmentwide Strategy Could Accelerate Progress Toward Global Food Security

    Science.gov (United States)

    2009-10-29

    Presidential Initiative to End Hunger in Africa ( IEHA )—which represented the U.S. strategy to help fulfill the MDG goal of halving hunger by 2015...was constrained in funding and limited in scope. In 2005, USAID, the primary agency that implemented IEHA , committed to providing an estimated $200...Development Assistance (DA) and other accounts. IEHA was intended to build an African-led partnership to cut hunger and poverty by investing in efforts

  11. Strategy of National Cultural Security and Modern Russia «Soft Force»

    Directory of Open Access Journals (Sweden)

    G J Filimonov

    2010-09-01

    Full Text Available Today one of the key factors needed for preservation of the state sovereignty, territorial integrity of the country, consolidation of a society, creation of conditions for the successful decision of internal problems and accordingly occurrence of possibility for conducting by the state of active foreign policy necessity of formation of own strategy of maintenance of national cultural safety and potentials so-called «soft force» appears.

  12. Analysis of household food security concerns and coping strategies of small farmers in northwestern highlands of pakistan

    International Nuclear Information System (INIS)

    Amir, R.M.; Shahbaz, B.; Ali, T.; Zafar, M.I.

    2013-01-01

    Food insecurity is turning out to be one of the worst crises of world in future. Developing countries are especially considered vulnerable to be hit most severely by this impending danger. Resource scarce regions of Pakistan are also included in the list of marginalized areas where population is not able to manage its food by herself. The present study was designed to analyze the state of household food security concerns and identify managing strategies for dealing with shortage of food patterns in Northern Pakistan. The research was based upon a survey of randomly selected two districts. Both qualitative and quantitative research methods were used for data collection. The results indicated that prices of food items were very high. It also delineated that lack of irrigational water; limited market access, and high cost of fertilizers were leading production related constraints. As a resort to these constraints and due to low output from the food crops there was found a shift from subsistence to cash seeking cropping patterns of the growers. This increase in income was perceived as a mean to ensure household food security. Furthermore, at household level the respondents expressed to reduce their expenses on the agricultural inputs in future. (author)

  13. Preliminary Strategic Environmental Assessment of the Great Western Development Strategy: Safeguarding Ecological Security for a New Western China

    Science.gov (United States)

    Li, Wei; Liu, Yan-Ju; Yang, Zhifeng

    2012-02-01

    The Great Western Development Strategy (GWDS) is a long term national campaign aimed at boosting development of the western area of China and narrowing the economic gap between the western and the eastern parts of China. The Strategic Environmental Assessment (SEA) procedure was employed to assess the environmental challenges brought about by the western development plans. These plans include five key developmental domains (KDDs): water resource exploitation and use, land utilization, energy generation, tourism development, and ecological restoration and conservation. A combination of methods involving matrix assessment, incorporation of expert judgment and trend analysis was employed to analyze and predict the environmental impacts upon eight selected environmental indicators: water resource availability, soil erosion, soil salinization, forest destruction, land desertification, biological diversity, water quality and air quality. Based on the overall results of the assessment, countermeasures for environmental challenges that emerged were raised as key recommendations to ensure ecological security during the implementation of the GWDS. This paper is intended to introduce a consensus-based process for evaluating the complex, long term pressures on the ecological security of large areas, such as western China, that focuses on the use of combined methods applied at the strategic level.

  14. Soil erosion, climate change and global food security: challenges and strategies.

    Science.gov (United States)

    Rhodes, Christopher J

    2014-01-01

    An overview is presented of the determined degree of global land degradation (principally occurring through soil erosion), with some consideration of its possible impact on global food security. Most determinations of the extent of land degradation (e.g. GLASOD) have been made on the basis of "expert judgement" and perceptions, as opposed to direct measurements of this multifactorial phenomenon. More recently, remote sensing measurements have been made which indicate that while some regions of the Earth are "browning" others are "greening". The latter effect is thought to be due to fertilisation of the growth of biomass by increasing levels of atmospheric CO2, and indeed the total amount of global biomass was observed to increase by 3.8% during the years 1981-2003. Nonetheless, 24% of the Earth's surface had occasioned some degree of degradation in the same time period. It appears that while long-term trends in NDVI (normalised difference vegetation index) derivatives are only broad indicators of land degradation, taken as a proxy, the NDVI/NPP (net primary productivity) trend is able to yield a benchmark that is globally consistent and to illuminate regions in which biologically significant changes are occurring. Thus, attention may be directed to where investigation and action at the ground level is required, i.e. to potential "hot spots" of land degradation and/or erosion. The severity of land degradation through soil erosion, and an according catastrophic threat to the survival of humanity may in part have been overstated, although the rising human population will impose inexorable demands for what the soil can provide. However the present system of industrialised agriculture would not be possible without plentiful provisions of cheap crude oil and natural gas to supply fuels, pesticides, herbicides and fertilisers. It is only on the basis of these inputs that it has been possible for the human population to rise above 7 billion. Hence, if the cheap oil and gas

  15. Spectroelectrochemistry as a Strategy for Improving Selectivity of Sensors for Security and Defense Applications

    Energy Technology Data Exchange (ETDEWEB)

    Heineman, William R.; Seliskar, Carl J.; Morris, Laura K.; Bryan, Samuel A.

    2012-12-19

    Spectroelectrochemistry provides improved selectivity for sensors by electrochemically modulating the optical signal associated with the analyte. The sensor consists of an optically transparent electrode (OTE) coated with a film that preconcentrates the target analyte. The OTE functions as an optical waveguide for attenuated total reflectance (ATR) spectroscopy, which detects the analyte by absorption. Alternatively, the OTE can serve as the excitation light for fluorescence detection, which is generally more sensitive than absorption. The analyte partitions into the film, undergoes an electrochemical redox reaction at the OTE surface, and absorbs or emits light in its oxidized or reduced state. The change in the optical response associated with electrochemical oxidation or reduction at the OTE is used to quantify the analyte. Absorption sensors for metal ion complexes such as [Fe(CN)6]4- and [Ru(bpy)3]2+ and fluorescence sensors for [Ru(bpy)3]2+ and the polycyclic aromatic hydrocarbon 1-hydroxypyrene have been developed. The sensor concept has been extended to binding assays for a protein using avidin–biotin and 17β-estradiol–anti-estradiol antibodies. The sensor has been demonstrated to measure metal complexes in complex samples such as nuclear waste and natural water. This sensor has qualities needed for security and defense applications that require a high level of selectivity and good detection limits for target analytes in complex samples. Quickly monitoring and designating intent of a nuclear program by measuring the Ru/Tc fission product ratio is such an application.

  16. Global environmental security: Research and policy strategies for the 1990s

    International Nuclear Information System (INIS)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions

  17. Formulating Human Resources Development Strategies for Nuclear R and D, Safety and Security

    International Nuclear Information System (INIS)

    Min, B. J.; Kim, M. K.; Son, M. Y.

    2010-05-01

    Enforced by the recent launch of the 4th National Power Expansion Plan and the 1st Basic Plan for National Energy Policy with an ambitious goal of achieving 'Low CO2 Emission and Green Growth', a rapid expansion of nuclear technology development has been reemphasized. In addition, the nation, being a potential exporter of nuclear power plants and nuclear technologies strives to explore their exports markets. In response, it is inevitable to set the priority in human resource development (HRD) as nuclear technology development both requires and fosters HRD which in turn, enables to meet the successful implementation of nuclear power expansion. A continuous, consistent and well-managed programme of HRD is crucial to assure continuity over time in the needed capacities, skills and knowledge, and to establish and maintain a cadre of manpower variously trained in different nuclear-related skills and educated in nuclear relevant fields. The objective of the study is to conduct comprehensive quantitative analyses to estimate future human resources requirements, particularly in the field of nuclear R and D, safety and security in order to establish an appropriate long-term nuclear HRD plan

  18. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua

    1992-09-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  19. Global environmental security: Research and policy strategies for the 1990s

    Energy Technology Data Exchange (ETDEWEB)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  20. Macro-Micro Interlocked Simulator

    International Nuclear Information System (INIS)

    Sato, Tetsuya

    2005-01-01

    Simulation Science is now standing on a turning point. After the appearance of the Earth Simulator, HEC is struggling with several severe difficulties due to the physical limit of LSI technologies and the so-called latency problem. In this paper I would like to propose one clever way to overcome these difficulties from the simulation algorithm viewpoint. Nature and artificial products are usually organized with several nearly autonomously working internal systems (organizations, or layers). The Earth Simulator has gifted us with a really useful scientific tool that can deal with the entire evolution of one internal system with a sufficient soundness. In order to make a leap jump of Simulation Science, therefore, it is desired to design an innovative simulator that enables us to deal with simultaneously and as consistently as possible a real system that evolves cooperatively with several internal autonomous systems. Three years experience of the Earth Simulator Project has stimulated to come up with one innovative simulation algorithm to get rid of the technological barrier standing in front of us, which I would like to call 'Macro-Micro Interlocked Algorithm', or 'Macro-Micro Multiplying Algorithm', and present a couple of such examples to validate the proposed algorithm. The first example is an aurora-arc formation as a result of the mutual interaction between the macroscopic magnetosphere-ionosphere system and the microscopic field-aligned electron and ion system. The second example is the local heavy rain fall resulting from the interaction between the global climate evolution and the microscopic raindrop growth process. Based on this innovative feasible algorithm, I came up with a Macro-Micro Multiplying Simulator

  1. Energy efficiency, security of supply and the environment in South Africa: Moving beyond the strategy documents

    International Nuclear Information System (INIS)

    Sebitosi, A.B.

    2008-01-01

    Energy efficiency is one of the most potent and cost effective ways of meeting the demands of sustainable development. It has in fact been referred to as the best energy resource. Way back in 2005 the South African Department of Minerals and Energy (DME) published its Energy Efficiency Strategy in support of some of the objectives enlisted in the 1998 White Paper on Energy Policy. The Strategy set a national target for energy efficiency improvement of 12% by 2015 against the baseline year 2000. The document further predicted that, with a business as usual model of energy usage, at the projected rate of national economic development, there would be a need to invest in new power generating capacity by around 2007. Despite the policy foresight and seemingly enthusiastic efforts, though, the dawn of 2008 saw the country gripped in an electric power crisis, with a capacity shortfall of over 10%. This paper looks at what could have gone wrong, examines energy efficiency policies and measures in other countries and how these lessons could be adopted to the South African context

  2. Energy efficiency, security of supply and the environment in South Africa: Moving beyond the strategy documents

    Energy Technology Data Exchange (ETDEWEB)

    Sebitosi, A.B. [Department of Electrical Engineering, University of Cape Town, Rondebosch 7701 (South Africa)

    2008-11-15

    Energy efficiency is one of the most potent and cost effective ways of meeting the demands of sustainable development. It has in fact been referred to as the best energy resource. Way back in 2005 the South African Department of Minerals and Energy (DME) published its Energy Efficiency Strategy in support of some of the objectives enlisted in the 1998 White Paper on Energy Policy. The Strategy set a national target for energy efficiency improvement of 12% by 2015 against the baseline year 2000. The document further predicted that, with a business as usual model of energy usage, at the projected rate of national economic development, there would be a need to invest in new power generating capacity by around 2007. Despite the policy foresight and seemingly enthusiastic efforts, though, the dawn of 2008 saw the country gripped in an electric power crisis, with a capacity shortfall of over 10%. This paper looks at what could have gone wrong, examines energy efficiency policies and measures in other countries and how these lessons could be adopted to the South African context. (author)

  3. Commentary and contributions to green paper (alphabetical sort. Towards a European strategy for the security supply)

    International Nuclear Information System (INIS)

    2005-01-01

    This document provides the answers formulated by the nuclear industry operators to the thirteen following questions: 1. Can the European Union accept an increase in its dependence on external energy sources without undermining its security of supply and European competitiveness? If this were the case, for which sources of energy would it be appropriate to contemplate a framework policy for imports? In this case, is it appropriate to favour an economic approach, in terms of energy cost, or a geopolitical approach in terms of the risk of disruption? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Do tax and State aid policies in the energy sector impair competitiveness in the European Union or not? Given the failure of attempts to harmonize indirect taxation, should the whole issue of energy taxation not be re-examined in view, in particular, of the energy and environmental targets? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investment be guaranteed? 5. Should more reserves be stockpiled and should other energy sources be included, such as gas or coal? Should the Community take on a greater role in stock management and, if so, what should the objectives and modalities be? Does the risk of physical disruption to energy supply justify more onerous measures for access to resources? 6. How can we ensure the development and better operation of energy transport networks in the European Union and neighbouring countries that enable the internal market to function properly and guarantee security of supply? 7. The development of some renewable energy sources calls for

  4. Commentary and contributions to green paper (alphabetical sort. Towards a European strategy for the security supply)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This document provides the answers formulated by the nuclear industry operators to the thirteen following questions: 1. Can the European Union accept an increase in its dependence on external energy sources without undermining its security of supply and European competitiveness? If this were the case, for which sources of energy would it be appropriate to contemplate a framework policy for imports? In this case, is it appropriate to favour an economic approach, in terms of energy cost, or a geopolitical approach in terms of the risk of disruption? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Do tax and State aid policies in the energy sector impair competitiveness in the European Union or not? Given the failure of attempts to harmonize indirect taxation, should the whole issue of energy taxation not be re-examined in view, in particular, of the energy and environmental targets? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investment be guaranteed? 5. Should more reserves be stockpiled and should other energy sources be included, such as gas or coal? Should the Community take on a greater role in stock management and, if so, what should the objectives and modalities be? Does the risk of physical disruption to energy supply justify more onerous measures for access to resources? 6. How can we ensure the development and better operation of energy transport networks in the European Union and neighbouring countries that enable the internal market to function properly and guarantee security of supply? 7. The development of some renewable energy sources calls for

  5. Macro-Fiber Composite Based Transduction

    Science.gov (United States)

    2016-03-01

    substrate Material properties of single crystal macro fiber composite actuators for active twist rotor blades Park, Jae-Sang (Seoul National...Passive Smart Structures and Integrated Systems 2007 Material properties of single crystal macro fiber composite actuators for active twist rotor ...19b. TELEPHONE NUMBER (Include area code) 10-03-20 16 Final Report 01 Jan 2013 - 31 Dec 2015 Macro-Fiber Composite Based Transduction N000-14-13-1-0212

  6. High macro rubber band ligature

    Directory of Open Access Journals (Sweden)

    José A. Reis Neto

    2013-07-01

    Full Text Available Purpose: The goal of a rubber band ligature is to promote fibrosis of the submucosa with subsequent fixation of the anal epithelium to the underlying sphincter. Following this principle, a new technique of ligature was developed based on two aspects: 1. macro banding: to have a better fibrosis and fixation by banding a bigger volume of mucosa and 2. higher ligature: to have this fixation at the origin of the hemorrhoidal cushion displacement. Methods: 1634 patients with internal hemorrhoidal disease grade II or III were treated by the technique called high macro rubber band. There was no distinction as to age, gender or race. To perform this technique a new hemorrhoidal device was specially designed with a larger diameter and a bigger capacity for mucosal volume aspiration. It is recommended to utilize a longer and wider anoscope to obtain a better view of the anal canal, which will facilitate the injection of submucosa higher in the anal canal and the insertion of the rubber band device. The hemorrhoidal cushion must be banded higher in the anal canal (4 cm above the pectinate line. It is preferable to treat all the hemorrhoids in one single session (maximum of three areas banded. Results: The analysis was retrospective without any comparison with conventional banding. The period of evaluation extended from one to twelve years. The analysis of the results showed perianal edema in 1.6% of the patients, immediate tenesmus in 0.8%, intense pain (need for parenteral analgesia in 1.6%, urinary retention in 0.1% of the patients and a symptomatic recurrence rate of 4.2%. All patients with symptomatic recurrence were treated with a new session of macro rubber banding. None of the patients developed anal or rectal sepsis. Small post-ligature bleeding was observed only in 0.8% of the patients. Conclusions: The high macro rubber banding technique represents an alternative method for the treatment of hemorrhoidal disease grades II or III, with good

  7. Safe, secure, and clean disposal of final nuclear wastes using 'PyroGreen' strategies

    International Nuclear Information System (INIS)

    Jung, HyoSook; Choi, Sungyeol; Hwang, Il Soon

    2011-01-01

    Spent nuclear fuels (SNFs) present global challenges that must be overcome to pave way for safe, secure, peaceful and clean nuclear energy. As one of innovative solutions, we have proposed an innovative partitioning, transmutation, and disposal approach named as 'PyroGreen' that is designed to eliminate the need for high-level waste repositories. A flowsheet of pyrochemical partitioning process with technically achievable values of decontamination factors on long-living radionuclides has been established to enable all the final wastes to be disposed of as low and intermediate level wastes. The long-term performance of a geological repository was assessed by SAFE-ROCK code for the final wastes from the PyroGreen processing of entire 26,000 MTHM of SNFs arising from lifetime operation of 24 pressurized water reactors. The assessment results agree well with an earlier study in the fact that most harmful radionuclides dominating groundwater migration risk are shown to be long-living fission products including C-14, Cl-36, Se-79, I-129, and Cs-135, whereas most actinides including U, Pu, Np, Am, and Cm are shown to remain near the repository. It is shown that the final wastes can meet the radiological dose limit of current Korean regulation on the low and intermediate level waste repository. Long-living actinide concentration in wastes is comparable with those in wastes in Waste Isolation Pilot Plant that has proved adequately low risk of human intrusion. Overall decontamination factors required for PyroGreen are finally determined as 20,000 for uranium and all transuranic elements whereas much lower values in the range of 10-50 are required for important fission products including Se, Tc, I, Sr, and Cs in order to eliminate the need for any high-level waste repository. It has been shown that experimentally demonstrated recovery rate data for key process steps positively support the feasibility of PyroGreen. SAFE-ROCK code was used to evaluate the long-term performance

  8. Spreadsheet macros for coloring sequence alignments.

    Science.gov (United States)

    Haygood, M G

    1993-12-01

    This article describes a set of Microsoft Excel macros designed to color amino acid and nucleotide sequence alignments for review and preparation of visual aids. The colored alignments can then be modified to emphasize features of interest. Procedures for importing and coloring sequences are described. The macro file adds a new menu to the menu bar containing sequence-related commands to enable users unfamiliar with Excel to use the macros more readily. The macros were designed for use with Macintosh computers but will also run with the DOS version of Excel.

  9. Improving the Security of the U.S. Aeronautical Domain: Adopting an Intelligence-Led, Risk-Based Strategy and Partnership

    Science.gov (United States)

    2010-12-01

    a fingerprint -based criminal history records check (CHRC) for individuals seeking unescorted access to secure areas of an airport (§ 1542.209...What needs to be reduced? • What needs to be created? 111 With this information answered, a strategy canvas was then created to convey the

  10. A multi-regional MARKAL-MACRO model to study an international market of CO{sub 2} emission permits. A detailed analysis of a burden sharing strategy among the Netherlands, Sweden and Switzerland

    Energy Technology Data Exchange (ETDEWEB)

    Bahn, O.; Barreto, L.; Bueeler, B.; Kypreos, S. [Paul Scherrer Inst. (PSI), Villigen (Switzerland)

    1997-11-01

    The development of a multi-regional MARKAL-MACRO (mMM) model and associated solution techniques have been actively continued during the first year (July 1996 - June 1997) of the IEA/ETSAP/Annex VI. This has been a joint research effort between: - the Systems Analysis Section of the Paul Scherrer Institute (PSI), - the Inst. for Operations Research (IFOR) of the Swiss Federal Inst. of Technology at Zurich, - the Logistics Lab. (Logilab) of the Univ. of Geneva, and - the different ETSAP partners that provide the regional MARKAL-MACRO (MM) models. This report intends to give an update on the development of mMM and associated solution techniques, highlighting the progress made since July 1996. It details also first JI study performed with mMM. The mMM model enables one to study an international co-operation to curb jointly carbon dioxide (CO{sub 2}) emissions through a market of emission permits, and to evaluate the economic implications of co-ordinating abatement policies on the participating regions. Along with emission permits, the regions may exchange other goods. So far, only an aggregate good in monetary unit has been considered. The mMM model integrates regional MM models into a meta-modelling framework. This integration can be done following two equivalent alternatives: mMM can be formulated either with market equilibrium conditions, or with an aggregated utility function and a global excess constraint. In both alternatives, regional MM models have to be extended by coherent budget and/or trade relationships. A first coding of a mMM model with three countries had been done in GAMS. Work has been done to generalise this coding to consider more traded goods and more countries. To solve mMM, two alternative mathematical methods can be used. The first one considers mMM formulated with market equilibrium conditions, and solves it as a variational inequality problem using a cutting plane algorithm. The second one considers mMM formulated with an aggregated utility

  11. A multi-regional MARKAL-MACRO model to study an international market of CO2 emission permits. A detailed analysis of a burden sharing strategy among the Netherlands, Sweden and Switzerland

    International Nuclear Information System (INIS)

    Bahn, O.; Barreto, L.; Bueeler, B.; Kypreos, S.

    1997-11-01

    The development of a multi-regional MARKAL-MACRO (mMM) model and associated solution techniques have been actively continued during the first year (July 1996 - June 1997) of the IEA/ETSAP/Annex VI. This has been a joint research effort between: - the Systems Analysis Section of the Paul Scherrer Institute (PSI), - the Inst. for Operations Research (IFOR) of the Swiss Federal Inst. of Technology at Zurich, - the Logistics Lab. (Logilab) of the Univ. of Geneva, and - the different ETSAP partners that provide the regional MARKAL-MACRO (MM) models. This report intends to give an update on the development of mMM and associated solution techniques, highlighting the progress made since July 1996. It details also first JI study performed with mMM. The mMM model enables one to study an international co-operation to curb jointly carbon dioxide (CO 2 ) emissions through a market of emission permits, and to evaluate the economic implications of co-ordinating abatement policies on the participating regions. Along with emission permits, the regions may exchange other goods. So far, only an aggregate good in monetary unit has been considered. The mMM model integrates regional MM models into a meta-modelling framework. This integration can be done following two equivalent alternatives: mMM can be formulated either with market equilibrium conditions, or with an aggregated utility function and a global excess constraint. In both alternatives, regional MM models have to be extended by coherent budget and/or trade relationships. A first coding of a mMM model with three countries had been done in GAMS. Work has been done to generalise this coding to consider more traded goods and more countries. To solve mMM, two alternative mathematical methods can be used. The first one considers mMM formulated with market equilibrium conditions, and solves it as a variational inequality problem using a cutting plane algorithm. The second one considers mMM formulated with an aggregated utility

  12. Model-based Impact Assessment of an Integrated Water Management Strategy on Ecosystem Services relevant to Food Security in Namibia

    Science.gov (United States)

    Luetkemeier, R.; Liehr, S.

    2012-04-01

    North-central Namibia is characterized by seasonal alterations of drought and heavy rainfall, mostly saline groundwater resources and a lack of perennial rivers. Water scarcity poses a great challenge for freshwater supply, harvest and food security against the background of high population growth and climate change. CuveWaters project aims at poverty reduction and livelihood improvement on a long term basis by introducing a multi-resource-mix as part of an integrated water resources management (IWRM) approach. Herein, creating water buffers by rainwater harvesting (RWH) and subsurface water storage as well as reuse of treated wastewater facilitates micro-scale gardening activities. This link constitutes a major component of a sustainable adaptation strategy by contributing to the conservation and improvement of basic food and freshwater resources in order to reduce drought vulnerability. This paper presents main findings of an impact assessment carried out on the effect of integrated water resources management on ecosystem services (ESS) relevant to food security within the framework of CuveWaters project. North-central Namibia is perceived as a social-ecological system characterized by a strong mutual dependence between natural environment and anthropogenic system. This fundamental reliance on natural resources highlights the key role of ESS in semi-arid environments to sustain human livelihoods. Among other services, food provision was chosen for quantification as one of the most fundamental ESS in north-central Namibia. Different nutritional values were utilized as indicators to adopt a demand-supply approach (Ecosystem Service Profile) to illustrate the ability of the ecosystem to meet people's nutritional requirements. Calculations have been conducted using both Bayesian networks to incorporate uncertainty introduced by the variability of monthly precipitation and the application of plant specific water production functions. Results show that improving the

  13. Port Security Strategy 2012

    Science.gov (United States)

    2007-06-15

    the Australia Embassy in Indonesia, on 5 August 2003 at the Marriott Hotel in Indonesia, and on 19 April 1995 in Oklahoma City in the United States...devised to provide the routine, close-in surveillance to the activities on the Red lines – Outbound merchant vessel Yellow Line- Inbound merchant...were calculated from the generated data. A logistic linear regression model was fit to the data to help to interpret the meaning of the model output

  14. National Security Strategy

    Science.gov (United States)

    2015-02-01

    students globally every year. We continue to attract immigrants from every corner of the world who renew our country with their energy and...of our manufacturing revolution will create the next generation of high technology manufacturing jobs. Immigration reform that combines smart and...Mexico to enhance our collective economic competitiveness while advancing prosperity in our hemisphere. With Chile , Peru, Mexico, and Canada, we

  15. Macro scale models for freight railroad terminals.

    Science.gov (United States)

    2016-03-02

    The project has developed a yard capacity model for macro-level analysis. The study considers the detailed sequence and scheduling in classification yards and their impacts on yard capacities simulate typical freight railroad terminals, and statistic...

  16. Center for Homeland Defense and Security Homeland Security Affairs Journal

    OpenAIRE

    2015-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  17. Cyber Security Analysis of Turkey

    OpenAIRE

    Senturk, Hakan; Çil, Zaim; Sağıroğlu, Şeref

    2016-01-01

    Considering the criticality of the cyber security threat in the 21st century, it is presumed that the nations are busy with series of activities in order to protect their security in the cyber space domain. In this paper, in light of the recent developments in the cyber security field, Turkey’s cyber security analysis is performed using a macro analysis model. We researched for the measures taken in Turkey with respect to those in the other countries, reviewed the posture, the activities and ...

  18. Study on Cyber-security Strategy and National Cyberspace Sovereignty%论网络安全战略与国家网络主权

    Institute of Scientific and Technical Information of China (English)

    邹鹏; 朱诗兵; 邹红霞

    2017-01-01

    While national interests increasingly extending with the development of cyberspace, cyberspace sovereignty and its guarantee have drawn wide attention from international communities and major countries have developed space-security strategy to safeguard their national cyberspace sovereignty.This paper analyzes the relationship between the cyberspace sovereignty and cyber-security as well as summarizes the characteristics of existing cyber-security strategies in the world.In view of protecting our national cyberspace sovereignty, it points out the issues we should pay more attention to in the formulation and implementation of cyber-security strategy which include taking national security as the starting point, taking cyberspace sovereignty as the fundament, perfecting relevant law and regulation systems, improving relevant systems, mechanisms and the support systems, accelerating the development of core technologies in cyber-security and strengthening the cyber-security training.%随着网络空间承载的国家利益日益广泛,网络主权及其保障问题引起了国际社会的高度重视,世界主要国家纷纷通过制定网络安全战略来维护本国网络主权.分析了世界各国对网络主权保护的态度及网络主权与网络安全的关系,综述了世界各国现有网络安全战略的特点.从保护我国国家网络主权的实际需求出发,指出了我国在网络安全战略的制定和实施中应当重点关注的问题,即以总体国家安全观为根本出发点、以网络主权为基本依据、健全相关法律法规体系、健全体制机制和保障力量体系、加快推进网络安全核心技术发展以及加强网络安全人才培养.

  19. US Strategy for Cyberspace

    National Research Council Canada - National Science Library

    Veazie, Arnold

    2003-01-01

    .... This strategic research paper analyzes the President's National Strategy to Secure Cyberspace to determine whether it effectively provides solutions for securing cyberspace. It concludes by proposing an alternative strategy for securing cyberspace.

  20. Micro-processus et macro-structures

    Directory of Open Access Journals (Sweden)

    Aaron Victor Cicourel

    2008-10-01

    Full Text Available Des approches sociologiques traditionnelles ont défini des macro-structures sociales comme un niveau particulier de la réalité sociale, à distinguer des micro-épisodes de l’action sociale. Cela les a conduits à concevoir ces macro-structures et à mener des recherches sur elles de manière plus ou moins indépendante des pratiques observables de la vie quotidienne. Cicourel soutient que les faits (macro-sociaux ne sont pas simplement donnés, mais émergent de pratiques routinières de la vie de tous les jours. Le macro, au sens de descriptions résumées, hors contexte, normalisées et typifiées, est un produit typique des procédures interactives et organisationnelles qui transforment les micro-événements en structures macro-sociales. Ainsi une précondition pour l’intégration des phénomènes micro- et macro-sociaux dans notre théorie et dans notre méthodologie renvoie à l’identification des processus contribuant à la création de macro-structures par des inférences routinières, des interprétations et des procédure de résumé. Le texte montre aussi que les différences entre approches micro-sociologiques apparaissent parallèles à celles existant entre approches micro et macro. On se centrant sur de petits fragments d’interactions conversationnelles, certains travaux micro-sociologiques tendent à ignorer ce qui informe ces interactions conversationnelles pour les participants eux-mêmes. Les comptes rendus décontextualisés produits par de telles méthodes ressemblent à la décontextualisation résultant des procédures macro-sociologiques d’agrégation. Contre cela, Cicourel défend la constitution de bases de données comparatives n’incluant pas seulement le contexte des interactions de face à face, mais étudiant aussi les phénomènes sociaux de manière systématique à travers différents contextes.Micro-processes and macro-structures. Notes on articulation between different levels of analysis

  1. From Islands to Networks: A Blueprint for a Comprehensive US Security Strategy in the Asia-Pacific Region

    National Research Council Canada - National Science Library

    Zastrow, Roderick

    2002-01-01

    ... US Asia-Pacific strategy of Assured Partnership would safely manage this dilemma by incorporating a multi-tiered, inclusive, institutional approach, The strategy will decrease the likelihood of a US...

  2. 一种分布式互联网彩票安全策略%A distributed security strategy for internet lottery

    Institute of Scientific and Technical Information of China (English)

    梅颖

    2017-01-01

    This paper proposes a distributed security strategy for internet lottery;it builds a distributed public ledger based on the blockchain technology to record all lottery transactions and provides the specific details of the strategy and the prototype architecture,analyzes the security characteristics of the strategy about anonymity,non-repudiation,tamper-resistant,transparency,which proves that the strategy can effectively solve the problems caused by the traditional centralization technology,that make operation is opaque,easy to be artificially controlled,lottery transactions in the entire process cannot be perceived by the user,so as to provide an effective solution for the construction of a secure internet lottery system.%提出了一种分布式互联网彩票安全策略,该策略基于区块链技术建立一个分布式公共账本,记录所有的彩票交易记录.详细阐述了该策略的具体细节和原型体系结构,并通过对该策略的匿名性、抗抵赖性、防篡改、透明性等安全特性进行分析,证明该策略能有效解决传统的基于中心化技术所导致运营不透明、容易被人为控制、彩票交易的整个流程中也不能被用户察觉等问题,为构建安全的互联网彩票系统提供有效的解决方案.

  3. Linking Resilience and Transformation as Micro- and Macro Adaptation

    Science.gov (United States)

    Friedman, E.; Breitzer, R.; Solecki, W. D.

    2017-12-01

    The concept of resiliency within climate adaptation planning and practice is widespread, but in some ways it has begun to suffer from its own success. While resiliency provides a valuable frame for understanding the conditions and opportunities for localized responses to increasing climate risks, the concept's ubiquitous use leads to it being applied to often conflicting policy agendas, which can mask or limit the capacity to connect efforts focused on near term risk to longer term and emergent climate threats in communities. These challenges are particularly evident in the context of extreme events and in the post extreme event policy windows. To overcome these issues and take advantage of the post-event policy window, the NOAA RISA Climate Change Risk in the Urban Northeast (CCRUN) project has been developing two specific, "boutique", policy tools. These include the PELT (Post-event learning toolkit) and MART (Macro-adaptation Resilience toolkit) toolkits. Embedded in these toolkits are two approaches to small scale strategies often associated with near term action (i.e., micro-adaptation) and large scale strategies associated with broad longer term needs (i.e., macro-adaptation). In this paper, these two approaches - micro and macro adaptation - are theoretically defined and presented in practice through the beta-testing of the PELT and MART toolkits. Most importantly, we illustrate how the theoretical links between resiliency and transformation can be operationalized through the use of these approaches, and how these approaches can be implemented in everyday risk management practice. We present our work through selected case studies in the Northeast US region, specifically in Jamaica Bay, New York, and Eastwick neighborhood in Philadelphia.

  4. Macro-prudentiality and financial stability

    Directory of Open Access Journals (Sweden)

    Cristian Ionescu

    2012-12-01

    Full Text Available Taking into consideration the fact that financial crises, as a manifestation form of the financial instability, are becoming more and more frequent, complex and severe, it is important to discuss about the macroeconomic prudentiality, in order to protect and save the economy of a country or of a region by the inherent fragility of a very developed financial system. Therefore, the paper aims to analyze the following aspects: the macro-prudential regulation (in order to a better understanding of the financial instability process, the development of the macro-prudential vision and instruments (but emphasizing the existing limits and economic policies (in order to implement an operational macro-prudential regulation.

  5. Injection moulding for macro and micro products

    DEFF Research Database (Denmark)

    Islam, Mohammad Aminul

    used for macro products but with the ages it is going deep into the micro areas having machine and process improvements. Extensive research work on injection moulding is going on all over the world. New ideas are flowing into the machines, materials and processes. The technology has made significant......The purpose of the literature survey is to investigate the injection moulding technology in the macro and micro areas from the basic to the state-of-the-art recent technology. Injection moulding is a versatile production process for the manufacturing of plastic parts and the process is extensively...

  6. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  7. Climate Change and Water Security in South Africa; Assessing Conflict and Coping Strategies in KwaZulu-Natal

    Science.gov (United States)

    Hosea, P. O.

    2017-12-01

    The focus on the security implication of climate change was intensified after the 2007 United Nations Security Council debate on climate change as a threat multiplier. In the light of this, Africa is identified as the continent highly vulnerable to climate change impacts due to its high dependence on climate sensitive economy, high poverty prevalence rate, weak institutional coping capacity as well as poor social infrastructure. In the past decades, the peculiarity of South Africa vis-à-vis climate change vulnerability, especially water scarcity, has become an issue of political and economic concern. The country is water stressed due to its arid and semi-arid conditions. In light of this, the Council for Scientific and Industrial Research (CSIR) (2010) assert that while global temperature increased by 0.80C over the last century, the surface temperature around the Southern Africa region increased by 2.00C over the same period. This connotes that climate change and its impact is inevitable for the region. This will further exacerbate the already stress water resources within South Africa. Owing to Cilliers (2009) and the Council on Foreign Relations (2016) argument that most conflict in Africa are largely driven by resource competition which are masqueraded as issues based on politics, religion or ethnicity, this study investigates the propensity of conflict dynamics in relation to climate change and water security. Using eco-violence theory as a theoretical framework and on the premises of human security, the study assess the security implications triggered by the impact of climate change on water security of rural communities in uMkhanyakude District Municipality, KwaZulu-Natal, South Africa. It focused on the extent to which this might trigger conflict as a coping mechanism among rural dwellers to water insecurity in order to inform policy options. Data for the were sourced using a mixed method paradigm where 385 survey questionnaire were distributed using

  8. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  9. Micro-Macro Paradoxes of Entrepreneurship

    DEFF Research Database (Denmark)

    Søgaard, Villy

    2008-01-01

    Artiklen tager afsæt i det såkaldte micro-macro paradox fra Aids-Efficiency litteraturen og argumenterer for, at en tilsvarende problemstilling bør inddrages i vurderingen af f.eks. de beskæftigelsesmæssige konsekvenser af entrepreneuriel virksomhed. Den påviser også i en gennemgang af litteratur...

  10. Macro News, Riskfree Rates, and the Intermediary

    NARCIS (Netherlands)

    Menkveld, Albert J.; Sarkar, Asani; Wel, van der Michel

    2007-01-01

    Signed customer order flow correlates with permanent price changes in equity and nonequity markets. We exploit macro news events in the 30Y treasury futures market to identify causality from customer flow to riskfree rates. We remove the positive feedback trading part and establish that, in the 15

  11. Description and performances of MACRO TRD

    International Nuclear Information System (INIS)

    Bellotti, R.; Barbarito, E.; Cafagna, F.; Castellano, M.; De Cataldo, G.; De Marzo, C.; Favuzzi, C.; Fusco, P.; Giglietto, N.; Mazziotta, M.N.; Perchiazzi, M.; Raino', A.; Sacchetti, A.; Spinelli, P.

    1995-01-01

    We discuss the applications of a transition radiation detector (TRD) to measure the residual energy of cosmic rays muons in underground laboratories and present the first MACRO TRD module. Results from prototypes operated in a test beam at CERN PS are also given. (orig.)

  12. An efficient macro-cell placement algorithm

    NARCIS (Netherlands)

    Aarts, E.H.L.; Bont, de F.M.J.; Korst, J.H.M.; Rongen, J.M.J.

    1991-01-01

    A new approximation algorithm is presented for the efficient handling of large macro-cell placement problems. The algorithm combines simulated annealing with new features based on a hierarchical approach and a divide-and-conquer technique. Numerical results show that these features can lead to a

  13. A SAS IML Macro for Loglinear Smoothing

    Science.gov (United States)

    Moses, Tim; von Davier, Alina

    2011-01-01

    Polynomial loglinear models for one-, two-, and higher-way contingency tables have important applications to measurement and assessment. They are essentially regarded as a smoothing technique, which is commonly referred to as loglinear smoothing. A SAS IML (SAS Institute, 2002a) macro was created to implement loglinear smoothing according to…

  14. Gender as a Macro Economic Variable

    NARCIS (Netherlands)

    I.P. van Staveren (Irene)

    2014-01-01

    markdownabstract__Abstract__ This chapter will analyse how gender can be used in a meaningful way in macroeconomic analysis. The challenge is that gender cannot be measured easily at the macro level. This is either because current gender variables are one-dimensional and miss out much gender

  15. Gender as a Macro Economic Variable

    NARCIS (Netherlands)

    I.P. van Staveren (Irene)

    2013-01-01

    markdownabstract__Abstract__ This chapter will analyse how gender can be used in a meaningful way in macroeconomic analysis. The challenge is that gender cannot be measured easily at the macro level. This is either because current gender variables are one-dimensional and miss out much gender

  16. Teaching Macro Principles "after" the Financial Crisis

    Science.gov (United States)

    Blinder, Alan

    2010-01-01

    Recent events should force everyone who teaches macroeconomics (or finance, for that matter) to reconsider their curriculums. In this short article, the author shares his thoughts about what should and should not be changed in the way economists teach macro principles to beginning students. Two tradeoffs are paramount and must be faced by every…

  17. Joint Macro and Femto Field Performance and Interference Measurements

    DEFF Research Database (Denmark)

    Jørgensen, Niels T.K.; Isotalo, Tero; Pedersen, Klaus

    2012-01-01

    In this paper macro performance in a co-channel macro and femto setup is studied. Measurements are performed in a live Universal Mobile Telecommunication System (UMTS) network. It is concluded that femto interference does not affect macro downlink (DL) performance as long as the macro Received Si...... radius smaller than 5 meter – with realistic power settings. This makes co-channel femto deployment less promising in dense macro environments with good macro RSCP coverage.......In this paper macro performance in a co-channel macro and femto setup is studied. Measurements are performed in a live Universal Mobile Telecommunication System (UMTS) network. It is concluded that femto interference does not affect macro downlink (DL) performance as long as the macro Received...... Signal Code Power (RSCP) is stronger than femto RSCP. We also conclude that a macro escape carrier is a robust DL interference management solution. In uplink (UL) direction it is shown that a single femto UE close to macro cell potentially can cause a noise rise of 6 dB in the surrounding macro cell...

  18. U.S. Army War College Guide to National Security Issues. Third Edition, Volume 1. Theory of War and Strategy

    Science.gov (United States)

    2008-06-01

    consideration of the unknowns and the role of chance, and recognizes the strategic environment consists of both physical and humanistic systems.19 It...or total goals. It really makes no difference if the goal is something existential like continuing to exist as a nation or something less vital...are less well adapted to confront the new threat structure emerging in an age of sacred terror and new kinds of existential concerns. The security

  19. The U.S. Army War College Guide to National Security Issues. Volume 1: Theory of War and Strategy

    Science.gov (United States)

    2010-07-01

    of both physical and humanistic systems.19 It is one thinking lens that has great application in the strategic appraisal process. Richard E. Neustadt...total goals. It really makes 85 no difference if the goal is something existential like continuing to exist as a nation or something less vital like...kinds of existential concerns. The security problem has become more complex and multidimensional. In his seminal People, States and War, first published

  20. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  1. Macro-economic Impact Study for Bio-based Malaysia

    NARCIS (Netherlands)

    Meijl, van H.; Smeets, E.M.W.; Dijk, van M.; Powell, J.P.; Tabeau, A.A.

    2012-01-01

    This Macro-economic Impact Study (MES) provides quantitative insights into the macro-economic effects of introducing green, palmbased alternatives for electricity, fuels, chemicals and materials industries in Malaysia between now and 2030.

  2. MACRO-PUBLIC RELATIONS: CRISIS COMMUNICATION IN THE AGE OF INTERNET

    Directory of Open Access Journals (Sweden)

    Zhongxuan Lin

    2013-12-01

    Full Text Available In order to study the crisis communication in the age of Internet, the study takes the battle between two Internet companies, Tencent and Qihoo, as a case study, but focuses more on their huge public audiences, which may be defined as a “macro-public” crowd. The study employs multiple research methods including survey, focus groups interviews and content analysis to explore their “macro-public relations” which may be driven by the spiral of silence and crowd psychology. This dynamic underground power is the reason that two companies employed similar public relations strategies in crisis communication but the results of the crisis were different. The study attempts to contribute to the knowledge base by defining and highlighting the power and function of “macro-public relations” for crisis communication in the age of Internet.

  3. Healthy public policy in poor countries: tackling macro-economic policies.

    Science.gov (United States)

    Mohindra, K S

    2007-06-01

    Large segments of the population in poor countries continue to suffer from a high level of unmet health needs, requiring macro-level, broad-based interventions. Healthy public policy, a key health promotion strategy, aims to put health on the agenda of policy makers across sectors and levels of government. Macro-economic policy in developing countries has thus far not adequately captured the attention of health promotion researchers. This paper argues that healthy public policy should not only be an objective in rich countries, but also in poor countries. This paper takes up this issue by reviewing the main macro-economic aid programs offered by international financial institutions as a response to economic crises and unmanageable debt burdens. Although health promotion researchers were largely absent during a key debate on structural adjustment programs and health during the 1980s and 1990s, the international macro-economic policy tool currently in play offers a new opportunity to participate in assessing these policies, ensuring new forms of macro-economic policy interventions do not simply reproduce patterns of (neoliberal) economics-dominated development policy.

  4. Macro economic profitability of hourly measurements and binary communications

    International Nuclear Information System (INIS)

    Andersen, Christian; Lund, Arne-Christian

    2005-11-01

    There are several actors that are subject to hourly measurements and dynamic pricing. The effects are registered in several analyses. A typical division would be effects connected to power producers, power deliverers, network companies and end users. In a macro economic analysis the goal would be to identify alterations in total benefits and costs. The transition from studying isolated effects for single actors to a macro economic perspective produces several principal problems. When the analysis is based on the effects for various actors it would be important to identify transitions between various actors that in itself does not contribute to alterations in the macro economic profit. At the same time it will be important that effects to be valued are evaluated in a consistent an consequential way. In this context it may be beneficial to use a model for the actors adaptation to the power market where various effects may be used. This working paper describes utility and cost elements that is a basis for Norwegian and foreign analysis of hourly measurements and dynamic prices. The survey shows that it is a large agreement between different investigations with respect to principle effects to be emphasized. There is however, variation with respect to what effects actually are in operation and quantified. There may also be large deviances in the valuation of various utility and cost components. Some single effects are studied closer. An effort is made to compare certain figures from the literature. However, this comparison has been difficult because it is not always clear what conditions have lead to the figures in use. There are large variations between the various analysis estimates. There may be several reasons. The technical products to be priced may vary. It is also evident that the costs for changing measuring equipment may be dependent of the management strategy. The paper refers to newer theoretical literature about the effects of hourly measurements and dynamic

  5. Nuclear energy and the Green Paper of the European Commission 'An European strategy for sustainable, competitive and secure energy'

    International Nuclear Information System (INIS)

    Metes, Mircea

    2006-01-01

    At present the energy is for European Union officials an issue of top priority. In the beginning of 2006 the natural gas crisis between Russia and Ukraine remembered menacingly to the Europeans that energy supply of the continent depends decisively on importation from other geographic areas and that these importation raise risks of a great variety. In addition to the power problems, disastrous effects on the economy, human life and eco-systems appeared to have the climate changes produced by fossil fuel burning. Consequently, a common energetic policy of Europe should be targeted at three main objectives: sustainability, competitiveness and security of supply. Six directions of action were identified: 1. EU must finalize the construction of internal European gas and electricity market; 2. EU should ensure that its energy market guaranties the security of supply under a solidary policy of the member states; 3. It is necessary that a large debate to have place about different sources of energy including the problems of costs and impact on climatic change, security and supply competitiveness and sustainability; 4. EU should approach the climatic change issues in agreement with the objectives established at Lisbon conference aiming at placing EU in the forefront of technological and scientific progress; 5. A strategic plan concerning the energy technology; 6. A common foreign policy in the field of energy. It is worthy to stress that the present Green Paper of EU has a manifestly different position concerning the nuclear energy with respect to the prior Green Paper of November 2000. While, in 2000 the EU Commission viewed the nuclear energy as being 'in limbo', in the 2006 version the Commission declared the nuclear energy as the most important source of power in Europe without CO 2 emissions. It is stated that all the energy options should be kept open while the Europe states have the right to establish their own energy mix, which they consider optimal, and in which

  6. The application of nuclear and national security safeguard strategies to the insider threat in the private sector

    International Nuclear Information System (INIS)

    Campbell, G.K.

    1991-01-01

    This paper reports that the insider threat in commercial enterprises represents multi-billion dollar losses on an annual basis. While much of this experience is in low value, theft-related shrinkage, there are a growing number of organizations where the loss or compromise of critical assets or interruption of vital systems cannot be tolerated. In very real ways, the survival of the organization may turn on the hostile acts of knowledgeable insiders. The nuclear and National security information operations environments represents a baseline of experience from which the corporate world can draw for cost-effective, alternative approaches to this threat. However, it is equally clear that there are a variety of subtle and obvious constraints imposed by the private sector's mission, service delivery, lifestyle and cost-benefit requirements which dictate careful planning and user involvement in safeguards development and application. Where protection of our National security assets are grounded in a consequence-driven set of policies and standards, the private sector is often subject to the lack of a similar (but directly analogous) policy foundation

  7. The politics of African energy development: Ethiopia's hydro-agricultural state-building strategy and clashing paradigms of water security.

    Science.gov (United States)

    Verhoeven, Harry

    2013-11-13

    As key economic, ecological and demographic trends converge to reshape Africa and its relationship with the outside world, a new politics is emerging in the twenty-first century around the water-food-energy nexus, which is central to the continent's relevance in the global economy. On the one hand, Malthusian anxieties are proliferating; pessimists link population growth and growing water scarcity to state failure and 'water wars'. On the other hand, entrepreneurs, sovereign wealth funds and speculators consider Africa's potential in water resources, energy production and food output as one of the last great untapped opportunities for the global economy: Africa is on the brink of an agro-industrial transformation. This article examines how African actors are not merely responding to economic and environmental changes but also thinking politically about water, food and energy security. Many of them are seizing the new opportunities to redefine their national politics, their relationship with local communities and their ties with external players, regionally and globally. Ethiopia's project of hydro-agricultural state-building helps to identify the most important fault lines of this new politics at the national, local and international level. The politics of water security and energy development simultaneously puts African states and their populations on the defensive, as they grapple with huge challenges, but also provides them with unique opportunities to take advantage of a more favourable global configuration of forces.

  8. Recursive macro generator for the TAS-86 language. First part: the macro generator language. Second part: system internal logics

    International Nuclear Information System (INIS)

    Zraick, Samir

    1970-01-01

    A macro-generator is a translator which is able to interpret and translate a programme written in a macro-language. After a first part presenting the main notions and proposing a brief description of the TAS-86 language, the second part of this research thesis reports the development of the macro-generator language, and notably presents the additional functionalities provided by the macro generator. The development is illustrated by logical flowcharts and programming listings

  9. Influence of Secondary Cooling Mode on Solidification Structure and Macro-segregation Behavior for High-carbon Continuous Casting Bloom

    Science.gov (United States)

    Dou, Kun; Yang, Zhenguo; Liu, Qing; Huang, Yunhua; Dong, Hongbiao

    2017-07-01

    A cellular automaton-finite element coupling model for high-carbon continuously cast bloom of GCr15 steel is established to simulate the solidification structure and to investigate the influence of different secondary cooling modes on characteristic parameters such as equiaxed crystal ratio, grain size and secondary dendrite arm spacing, in which the effect of phase transformation and electromagnetic stirring is taken into consideration. On this basis, evolution of carbon macro-segregation for GCr15 steel bloom is researched correspondingly via industrial tests. Based on above analysis, the relationship among secondary cooling modes, characteristic parameters for solidification structure as well as carbon macro-segregation is illustrated to obtain optimum secondary cooling strategy and alleviate carbon macro-segregation degree for GCr15 steel bloom in continuous casting process. The evaluating method for element macro-segregation is applicable in various steel types.

  10. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  11. Macro factors in oil futures returns

    International Nuclear Information System (INIS)

    Le Pen, Yannick; Sevi, Benoit

    2012-01-01

    We investigate the macro factors that can explain the monthly oil futures return for the NYMEX WTI futures contract for the time period 1993:11 to 2010:03. We build a new database of 187 real and nominal macro-economic variables from developed and emerging countries and resort to the large factor approximate model to extract 9 factors from this dataset. We then regress crude oil return on several combinations of these factors. Our best model explains around 38% of the variability of oil futures return. More interestingly, the factor which has the largest influence on crude oil price is related to real variables from emerging countries. This result confirms the latest finding in the literature that the recent evolution in oil price is attributable to change in supply and demand conditions and not to the large increase in trading activity from speculators. (authors)

  12. Macro-institutional Complexity in Logistics

    DEFF Research Database (Denmark)

    Wessel, Frederic; Kinra, Aseem; Kotzab, Herbert

    2016-01-01

    structure and transactional costs, the concept of environmental complexity is applied to the logistics management perspective. Thereby, the impacts which a given framework on a macro-institutional level might have on the situation and leeway in decision-making at the firm (micro) or the supply chain (meso......In this paper, the interlink between the concept of macro-institutional complexity in logistics and the dynamics in the logistics practice of Eastern Europe will be examined. Referring to the importance of different authors having ascribed to the external environmental uncertainty on organizational......) levels will be analysed. Furthermore, a quantitative modelling approach will be presented and exemplified by using the case of logistics infrastructure in Eastern Europe....

  13. A muon trigger for the MACRO apparatus

    International Nuclear Information System (INIS)

    Barbarito, E.; Bellotti, R.; Calicchio, M.; Castellano, M.; DeCataldo, G.; DeMarzo, C.; Erriquez, O.; Favuzzi, C.; Giglietto, N.; Liuzzi, R.; Spinelli, P.

    1991-01-01

    A trigger circuit based on EPROM components, able to manage up to 30 lines from independent counters, is described. The circuit has been designed and used in the MACRO apparatus at the Gran Sasso Laboratory for triggering on fast particles. The circuit works with standard TTL positive logic and is assembled in a double standard CAMAC module. It has a high triggering capacity and a high flexibility. (orig.)

  14. Energy scope of handoff strategies in macro-femtocell environments

    KAUST Repository

    Leon, Jaime; Bader, Faouzi; Alouini, Mohamed-Slim

    2012-01-01

    Energy consumption in downlink mode is becoming an important topic as cellular communications grow into a large scale enterprise. The search for high rates keeping energy constraints low has put forward the idea that cells with smaller size may

  15. United States Cybersecurity Strategy, Policy, and Organization: Poorly Postured to Cope with a Post-9/11 Security Environment?

    Science.gov (United States)

    2012-12-14

    Specific Federal Agencies Department of Agriculture Agriculture, Food ( meat , poultry , egg products) Sector-Specific Agencies shall...Healthcare, and food (other than meat , poultry , egg products) Environmental Protection Agency Drinking water and Water treatment systems...EOP entities, develop a framework for research and development strategies that focus on game -changing technologies that have the potential to enhance

  16. Case Study: Strategy for the Establishment of the Centre for Nuclear Safety and Security in South Africa

    International Nuclear Information System (INIS)

    Nhleko, S.; Tyobeka, B.M.

    2016-01-01

    Full text: The establishment of a dedicated nuclear safety centre as part of nuclear industry infrastructure is a common practice among nuclear countries that is also recognized and recommended by the International Atomic Energy Agency (see, for instance, IAEA GSR Part 1). However, South Africa currently does not have such a centre. This paper presents a strategy that has been developed for the establishment of a nuclear safety centre that will support the nuclear knowledge management infrastructure of the National Nuclear Regulator of South Africa. After a brief introduction, the challenges faced by the Regulator are presented. Next, the minimum requirements for addressing the challenges are summarized by providing an outline of strategic objectives to be fulfilled. This is followed by the description of the strategy developed to fulfil the objectives, including key programmes that will be implemented. A qualitative evaluation of benefits that will result from the implementation of the strategy is also presented. Additional provisions which are required in the national legislation to facilitate successful implementation of the strategy are highlighted based on lessons learned from other regulators. Finally, lessons learned during the execution of this project are summarized in order to provide guidelines for similar projects. (author

  17. The strategies to develop renewable energy application in the frame to secure energy need and electricity demand in Indonesia

    International Nuclear Information System (INIS)

    Suharta, Herliyani; Hoetman, A. R.; Sayigh, A. m.

    2006-01-01

    The paper describe the evaluation of conventional energy usage and electricity condition in Indonesia. Also there is discussion on 14 facts that will affect the security in providing the electricity and other house hold energy demand. Those covers a picture of the growth of energy demand, oil subsidy, limited and remaining natural resources, crude petroleum export and import projection, forecast of un-risk natural gas production, gas and coal for electric generation, declining of coal deposit. An effort and considerations to increase the use of renewable energy (RE) are also described. It covers a power plant selection to mach the RE resources to partly fulfill the electricity development planning, its electricity price and also the use of RE resources to fulfill the energy need in household.(Author)

  18. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  19. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  20. Nano/macro porous bioactive glass scaffold

    Science.gov (United States)

    Wang, Shaojie

    Bioactive glass (BG) and ceramics have been widely studied and developed as implants to replace hard tissues of the musculo-skeletal system, such as bones and teeth. Recently, instead of using bulk materials, which usually do not degrade rapidly enough and may remain in the human body for a long time, the idea of bioscaffold for tissue regeneration has generated much interest. An ideal bioscaffold is a porous material that would not only provide a three-dimensional structure for the regeneration of natural tissue, but also degrade gradually and, eventually be replaced by the natural tissue completely. Among various material choices the nano-macro dual porous BG appears as the most promising candidate for bioscaffold applications. Here macropores facilitate tissue growth while nanopores control degradation and enhance cell response. The surface area, which controls the degradation of scaffold can also be tuned by changing the nanopore size. However, fabrication of such 3D structure with desirable nano and macro pores has remained challenging. In this dissertation, sol-gel process combined with spinodal decomposition or polymer sponge replication method has been developed to fabricate the nano-macro porous BG scaffolds. Macropores up to 100microm are created by freezing polymer induced spinodal structure through sol-gel transition, while larger macropores (>200um) of predetermined size are obtained by the polymer sponge replication technique. The size of nanopores, which are inherent to the sol-gel method of glass fabrication, has been tailored using several approaches: Before gel point, small nanopores are generated using acid catalyst that leads to weakly-branched polymer-like network. On the other hand, larger nanopores are created with the base-catalyzed gel with highly-branched cluster-like structure. After the gel point, the nanostructure can be further modified by manipulating the sintering temperature and/or the ammonia concentration used in the solvent

  1. Social networking-based simulations for nuclear security: Strategy assessment following nuclear cyber terror on South Korean nuclear power plants (NPPs)

    International Nuclear Information System (INIS)

    Woo, Tae Ho; Kwak, Sang Man

    2015-01-01

    Highlights: • The cyber terror modeling is made by the social networking algorithm. • This is applicable by the social networking service (SNS). • Security of nuclear industry could be controlled by the network theory. • Newly developed complex algorithm can be introduced. • Simplified graphics show the operator easily. - Abstract: Nuclear energy has been studied for the secure power productions, which is based on the simulation study following the incident of nuclear cyber terror attack on South Korean nuclear power plants (NPPs). The social networking is used for the terror incident modeling and its prevention strategies. The nuclear industry could be investigated in the aspect of minimizing the dangerous situations caused by possible terror attacks which are considered by the society oriented connectivity among the related people or groups. The social networking circle by system dynamics diagram (SNCSD) is constructed, where the configuration of a model social networking example by system dynamics (SD) is applied. From A to H regions, the values are obtained by the random numbers incorporated with the designed algorithms. The results show the comparative values of terror possibilities which are based on the proposed social networking algorithm. It is possible to prepare for potential terrorism in the nuclear industry

  2. Green paper - towards a European strategy for the security of energy supply, technical document; Livret vert sur la securite de l'approvisionnement en energie, document technique

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    The Green Paper sets forth a series of questions regarding the security of energy in Europe. It addresses the issue of increased consumption and dependence on oil, and sketches out possible strategies for broadening the energy supply and slowing global warming. It draws an alarming picture of the EU energy situation. If no action is taken, it predicts that the EU energy dependency will climb from 50% in 2000 to 70% in 2030. The particular situation for the main imported fossil fuels is described. This technical paper is particularly devoted to the context, the energy sources, the supply disruption, the energy demand, the fuel balance, the energy technology and the transport of fuel in the EU (transit). (A.L.B.)

  3. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  4. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  5. Review: Feed demand landscape and implications of food-not feed strategy for food security and climate change.

    Science.gov (United States)

    Makkar, H P S

    2017-12-04

    The food-feed competition is one of the complex challenges, and so are the ongoing climate change, land degradation and water shortage for realizing sustainable food production systems. By 2050 the global demand for animal products is projected to increase by 60% to 70%, and developing countries will have a lion's share in this increase. Currently, ~800 million tonnes of cereals (one-third of total cereal production) are used in animal feed and by 2050 it is projected to be over 1.1 billion tonnes. Most of the increase in feed demand will be in developing countries, which already face many food security challenges. Additional feed required for the projected increased demand of animal products, if met through food grains, will further exacerbate the food insecurity in these countries. Furthermore, globally, the production, processing and transport of feed account for 45% of the greenhouse gas emissions from the livestock sector. This paper presents approaches for addressing these challenges in quest for making livestock sector more sustainable. The use of novel human-inedible feed resources such as insect meals, leaf meals, protein isolates, single cell protein produced using waste streams, protein hydrolysates, spineless cactus, algae, co-products of the biofuel industry, food wastes among others, has enormous prospects. Efficient use of grasslands also offers possibilities for increasing carbon sequestration, land reclamation and livestock productivity. Opportunities also exist for decreasing feed wastages by simple and well proven practices such as use of appropriate troughs, increase in efficiency of harvesting crop residues and their conversion to complete feeds especially in the form of densified feed blocks or pellets, feeding as per the nutrient requirements, among others. Available evidence have been presented to substantiate arguments that: (a) for successful and sustained adoption of a feed technology, participation of the private sector and a sound

  6. Post-Closure Strategy for Use-Restricted Sites on the Nevada National Security Site, Nevada Test and Training Range, and Tonopah Test Range, Nevada

    International Nuclear Information System (INIS)

    Silvas, A. J.

    2014-01-01

    The purpose of this Post-Closure Strategy is to provide a consistent methodology for continual evaluation of post-closure requirements for use-restricted areas on the Nevada National Security Site (NNSS), Nevada Test and Training Range (NTTR), and Tonopah Test Range (TTR) to consolidate, modify, or streamline the program. In addition, this document stipulates the creation of a single consolidated Post-Closure Plan that will detail the current post-closure requirements for all active use restrictions (URs) and outlines its implementation and subsequent revision. This strategy will ensure effective management and control of the post-closure sites. There are currently over 200 URs located on the NNSS, NTTR, and TTR. Post-closure requirements were initially established in the Closure Report for each site. In some cases, changes to the post-closure requirements have been implemented through addenda, errata sheets, records of technical change, or letters. Post-closure requirements have been collected from these multiple sources and consolidated into several formats, such as summaries and databases. This structure increases the possibility of inconsistencies and uncertainty. As more URs are established and the post-closure program is expanded, the need for a comprehensive approach for managing the program will increase. Not only should the current requirements be obtainable from a single source that supersedes all previous requirements, but the strategy for modifying the requirements should be standardized. This will enable more effective management of the program into the future. This strategy document and the subsequent comprehensive plan are to be implemented under the assumption that the NNSS and outlying sites will be under the purview of the U.S. Department of Energy, National Nuclear Security Administration for the foreseeable future. This strategy was also developed assuming that regulatory control of the sites remains static. The comprehensive plan is not

  7. Constraints on genes shape long-term conservation of macro-synteny in metazoan genomes

    Directory of Open Access Journals (Sweden)

    Putnam Nicholas H

    2011-10-01

    Full Text Available Abstract Background Many metazoan genomes conserve chromosome-scale gene linkage relationships (“macro-synteny” from the common ancestor of multicellular animal life 1234, but the biological explanation for this conservation is still unknown. Double cut and join (DCJ is a simple, well-studied model of neutral genome evolution amenable to both simulation and mathematical analysis 5, but as we show here, it is not sufficent to explain long-term macro-synteny conservation. Results We examine a family of simple (one-parameter extensions of DCJ to identify models and choices of parameters consistent with the levels of macro- and micro-synteny conservation observed among animal genomes. Our software implements a flexible strategy for incorporating genomic context into the DCJ model to incorporate various types of genomic context (“DCJ-[C]”, and is available as open source software from http://github.com/putnamlab/dcj-c. Conclusions A simple model of genome evolution, in which DCJ moves are allowed only if they maintain chromosomal linkage among a set of constrained genes, can simultaneously account for the level of macro-synteny conservation and for correlated conservation among multiple pairs of species. Simulations under this model indicate that a constraint on approximately 7% of metazoan genes is sufficient to constrain genome rearrangement to an average rate of 25 inversions and 1.7 translocations per million years.

  8. A macro perspective for client-centred practice in curricula: Critique and teaching methods.

    Science.gov (United States)

    Fleming-Castaldy, Rita P

    2015-07-01

    Client-centred practice is often eclipsed by social, economic, and political inequities. Ignoring these realities obstructs clients' goal attainment. The author advocates for the integration of a macro perspective inclusive of participation barriers and supports in occupational therapy curricula and seeks to motivate educators to adopt teaching approaches that develop students' abilities to address the complexities of client-centred practice. This article integrates a critical analysis of the literature on client-centred practice with reflexivity on disability studies and autoethnography. Educational standards require students to learn about the social, economic, and political contexts that impact on client-centred practice and the need for advocacy to enable participation. Theoretical support of a macro perspective for client-centred practice is strongly evident in the literature. Information on methods for teaching students how to actualize these concepts in practice is scant. Thus, strategies to inform the integration of a macro perspective into curricula and concrete activities to develop students' competencies for empowered client-centred practice are required. Educators have an ethical responsibility to critique their pedagogy to determine whether they are adequately preparing students for client-centred practice. The focus must move from teaching a micro perspective of client-centred practice to a macro perspective that enables occupational justice and empowerment.

  9. The International Macro-Environment of an Organization

    OpenAIRE

    Ileana (Badulescu) Anastase; Cornel Grigorut

    2016-01-01

    The international macro-environment (supranational macro-environment) brings together allthe uncontrollable factors with a global impact, and it is related to the organization’s indirectrelationships on international markets. Romania’s globalization and the EU integration increasedthe importance of the macro-environment for all organizations, regardless of their degree ofinternationalization. In marketing, we must master the main agreements between countries and theregulations emanating from ...

  10. The IRSN's scientific strategy for the progress of nuclear safety, nuclear security and radiation protection

    International Nuclear Information System (INIS)

    2015-12-01

    This publication defines the new strategy of the IRSN to fulfil its role in nuclear safety, in the protection of mankind and of the environment against ionizing radiations, and in the protection of nuclear materials, installations and transports against malevolent acts. The IRSN is also involved in public information, and as an actor and a partner in the definition of other major public policies such as research and innovation, work health or environmental health. In a first part, the report highlights these missions, the current evolution of the international scientific, technological and economic context, and briefly evokes the major scientific challenges for the next decade. The second part highlights the abilities and capacities of the IRSN to support scientific approaches and works. The main orientations are then formulated and commented: to justify scientific orientation backgrounds and means to assign, to associate final recipients to research works, to implement initiatives to develop national, European and international cooperation in the field of nuclear and radiological risks, to develop academic partnerships and to participate to national research alliances, to develop collaboration with industries, nuclear operators and actors of the medical sector, to possess tools to perform numeric simulation, to guarantee the access for the Institute to research and experimentation infrastructures and data bases, to develop methodologies and tools for aid to decision, to perpetuate knowledge and know-how for a better renewal of risk assessment. The report then presents the main questions of interest regarding radiation protection and nuclear safety

  11. The MACRO detector at Gran Sasso

    International Nuclear Information System (INIS)

    Ambrosio, M.; Antolini, R.; Assiro, R.; Auriemma, G.; Bakari, D.; Baldini, A.; Barbarino, G.C.; Barbarito, E.; Barish, B.C.; Battistoni, G.; Becherini, Y.; Bellotti, R.; Bemporad, C.; Bernardini, P.; Bilokon, H.; Bisi, V.; Bloise, C.; Bottazzi, E.; Bower, C.; Brigida, M.; Bussino, S.; Cafagna, F.; Calicchio, M.; Campana, D.; Candela, A.; Carboni, M.; Cecchini, S.; Cei, F.; Ceres, A.; Chiarella, V.; Choudhary, B.C.; Coutu, S.; Cozzi, M.; Creti, P.; De Cataldo, G.; Esposti, L.D.L. Degli; Dekhissi, H.; Marzo, C. De; Mitri, I. De; Derkaoui, J.; Vincenzi, M. De; Credico, A. Di; Ferdinando, D. Di; Diotallevi, R.; Erriquez, O.; Favuzzi, C.; Forti, C.; Fusco, P.; Gebhard, M.; Giacomelli, G.; Giacomelli, R.; Giannini, G.; Giglietto, N.; Giorgini, M.; Giuliani, R.; Goretti, M.; Grassi, M.; Grau, H.; Gray, L.; Grillo, A.; Guarino, F.; Gustavino, C.; Habig, A.; Hanson, J.; Hanson, K.; Hawthorne, A.; Heinz, R.; Hong, J.T.; Iarocci, E.; Katsavounidis, E.; Katsavounidis, I.; Kearns, E.; Kim, H.; Kyriazopoulou, S.; Lamanna, E.; Lane, C.; Leone, A.; Levin, D.S.; Lipari, P.; Liu, G.; Liu, R.; Longley, N.P.; Longo, M.J.; Loparco, F.; Maaroufi, F.; Mancarella, G.; Mandrioli, G.; Manzoor, S.; Marrelli, V.; Margiotta, A.; Marini, A.; Martello, D.; Marzari-Chiesa, A.; Mazziotta, M.N.; Michael, D.G.; Mikheyev, S.; Miller, L.; Monacelli, P.; Mongelli, M.; Montaruli, T.; Monteno, M.; Mossbarger, L.; Mufson, S.; Musser, J.; Nicolo, D.; Nolty, R.; Okada, C.; Orsini, M.; Orth, C.; Osteria, G.; Ouchrif, M.; Palamara, O.; Parlati, S.; Patera, V.; Patrizii, L.; Pazzi, R.; Peck, C.W.; Pellizzoni, G.; Perchiazzi, M.; Perrone, L.; Petrakis, J.; Petrera, S.; Pignatano, N.; Pinto, C.; Pistilli, P.; Popa, V.; Raino, A.; Reynoldson, J.; Ronga, F.; Rrhioua, A.; Sacchetti, A.; Saggese, P.; Satriano, C.; Satta, L.; Scapparone, E.; Scholberg, K.; Sciubba, A.; Serra, P.; Sioli, M.; Sirri, G.; Sitta, M.; Sondergaard, S.; Spinelli, P.; Spinetti, M.; Spurio, M.; Stalio, S.; Steinberg, R.; Stone, J.L.; Sulak, L.R.; Surdo, A.; Tarle, G.; Togo, V.; Vakili, M.; Valieri, C.; Walter, C.W.; Webb, R.; Zaccheo, N.

    2002-01-01

    MACRO was an experiment that ran in the Laboratori Nazionali del Gran Sasso from 1988 to 2000. Its principal goal was to observe magnetic monopoles or set significantly lower experimental flux limits than had been previously available in the velocity range from about β=10 -4 to unity. In addition it made a variety of other observations. Examples are: setting flux limits on other so far unobserved particles such as nuclei and lightly ionizing particles, searching for WIMP annihilations in the Earth and the Sun and for neutrino bursts from stellar collapses in or near our Galaxy, and making measurements relevant to high energy muon and neutrino astronomy and of the flux of up-going muons as a function of nadir angle showing evidence for neutrino oscillations. The apparatus consisted of three principal types of detectors: liquid scintillator counters, limited streamer tubes, and nuclear track etch detectors. In addition, over part of its area it contained a transition radiation detector. The general design philosophy emphasized redundancy and complementarity. This paper describes the technical aspects of the complete MACRO detector, its operational performance, and the techniques used to calibrate it and verify its proper operation. It supplements a previously published paper which described the first portion of the detector that was built and operated

  12. The Influence of Micro and Macro Environment Components on Trade Companies in Romania

    OpenAIRE

    Elena Pîndiche; Roxana Ionita

    2013-01-01

    This paper deals with the impact of micro and macro environment components on trade companies in Romania. Trade companies organize and operate under specific environmental conditions impact or both. In the activity of any companies the environment plays a key role in defining its strategies in seizing and using opportunities of development, being practically the support in achieving the objectives of growth, profitability or just survival. Trade companies should have the best possible percept...

  13. The House of Security: Stakeholder Perceptions of Security Assessment and Importance

    OpenAIRE

    Ang, Wee Horng; Deng, Vicki; Lee, Yang; Madnick, Stuart; Mistree, Dinsha; Siegel, Michael; Strong, Diane

    2007-01-01

    In this paper we introduce a methodology for analyzing differences regarding security perceptions within and between stakeholders, and the elements which affect these perceptions. We have designed the €܈ouse of Security€ݬ a security assessment model that provides the basic framework for considering eight different constructs of security: Vulnerability, Accessibility, Confidentiality, Technology Resources for Security, Financial Resources for Security, Business Strategy for Security, Secur...

  14. A comparison between MARKAL-MACRO and MARKAL

    International Nuclear Information System (INIS)

    Schepers, E.

    1995-11-01

    Differences between CO 2 -reduction scenarios of the MARKAL-MACRO model and the MARKAL model are studied. Also attention is paid to the rebound effect, i.e. the effect on a price decrease leads to an increase of the energy demand, and energy savings will result in a redistribution of saved income over other goods and services. MARKAL is an energy supply model and MACRO is a macro-economic model. The combination of the two is an example of a hard-linked model between a top-down model (MACRO) and a bottom-up model (MARKAL). 15 figs., 5 tabs., 18 refs., 2 appendices

  15. Dynamic modeling and adaptive vibration suppression of a high-speed macro-micro manipulator

    Science.gov (United States)

    Yang, Yi-ling; Wei, Yan-ding; Lou, Jun-qiang; Fu, Lei; Fang, Sheng; Chen, Te-huan

    2018-05-01

    This paper presents a dynamic modeling and microscopic vibration suppression for a flexible macro-micro manipulator dedicated to high-speed operation. The manipulator system mainly consists of a macro motion stage and a flexible micromanipulator bonded with one macro-fiber-composite actuator. Based on Hamilton's principle and the Bouc-Wen hysteresis equation, the nonlinear dynamic model is obtained. Then, a hybrid control scheme is proposed to simultaneously suppress the elastic vibration during and after the motor motion. In particular, the hybrid control strategy is composed of a trajectory planning approach and an adaptive variable structure control. Moreover, two optimization indices regarding the comprehensive torques and synthesized vibrations are designed, and the optimal trajectories are acquired using a genetic algorithm. Furthermore, a nonlinear fuzzy regulator is used to adjust the switching gain in the variable structure control. Thus, a fuzzy variable structure control with nonlinear adaptive control law is achieved. A series of experiments are performed to verify the effectiveness and feasibility of the established system model and hybrid control strategy. The excited vibration during the motor motion and the residual vibration after the motor motion are decreased. Meanwhile, the settling time is shortened. Both the manipulation stability and operation efficiency of the manipulator are improved by the proposed hybrid strategy.

  16. Infrastructures Development Strategy in Energy Engineering Education and Research: a Bonus to Introduce a Safe and Secure Nuclear Power Program

    Energy Technology Data Exchange (ETDEWEB)

    Bouhelal, Oum Keltoum [National School of Mineral Industry, ENIM, BP 753, Agdal, 10000 Rabat (Morocco)

    2008-07-01

    and D programs is in process; several kinds of scientific exchanges are engaged to provide a scientific network aiming to master a multidimensional learning: a capacity building strategy is targeted to study the means to face the NPP's relevant challenges and improve the labour sector standards in order to make nuclear power a viable option. (author)

  17. Infrastructures Development Strategy in Energy Engineering Education and Research: a Bonus to Introduce a Safe and Secure Nuclear Power Program

    International Nuclear Information System (INIS)

    Bouhelal, Oum Keltoum

    2008-01-01

    programs is in process; several kinds of scientific exchanges are engaged to provide a scientific network aiming to master a multidimensional learning: a capacity building strategy is targeted to study the means to face the NPP's relevant challenges and improve the labour sector standards in order to make nuclear power a viable option. (author)

  18. Using intervention mapping for the development of a targeted secure web-based outreach strategy named SafeFriend, for Chlamydia trachomatis testing in young people at risk.

    Science.gov (United States)

    Theunissen, Kevin A T M; Hoebe, Christian J P A; Crutzen, Rik; Kara-Zaïtri, Chakib; de Vries, Nanne K; van Bergen, Jan E A M; van der Sande, Marianne A B; Dukers-Muijrers, Nicole H T M

    2013-10-22

    Many young people at high risk for Chlamydia trachomatis (Ct) are not reached by current sexual health care systems, such as general practitioners and public sexual health care centres (sexually transmitted infection clinics).Ct is the most frequently diagnosed bacterial sexually transmitted infection (STI) among sexually active people and in particular young heterosexuals. Innovative screening strategies are needed to interrupt the transmission of Ct among young people and connect the hidden cases to care. Intervention Mapping (IM), a systematic approach to develop theory- and evidence-based interventions, was used to develop a strategy to target Ct testing towards young people who are currently hidden to care in The Netherlands. Both clinical users (i.e. sexual health care nurses) and public users (i.e., young people at risk for Ct) were closely involved in the IM process. A needs assessment study was carried out using semi-structured interviews among users (N = 21), a literature search and by taking lessons learned from existing screening programmes. Theoretical methods and practical applications to reach high risk young people and influence testing were selected and translated into specific programme components. The IM approach resulted in the development of a secure and web-based outreach Ct screening strategy, named SafeFriend. It is developed to target groups of high-risk young people who are currently hidden to care. Key methods include web-based Respondent Driven Sampling, starting from young Ct positive sexual health care centre clients, to reach and motivate peers (i.e., sex partners and friends) to get tested for Ct. Testing and the motivation of peers were proposed as the desired behavioural outcomes and the Precaution Adoption Process Model was chosen as theoretical framework. End users, i.e., young people and sexual health care nurses were interviewed and included in the development process to increase the success of implementation. IM proved useful

  19. U.S. Geological Survey natural hazards science strategy: promoting the safety, security, and economic well-being of the Nation

    Science.gov (United States)

    Holmes, Robert R.; Jones, Lucile M.; Eidenshink, Jeffery C.; Godt, Jonathan W.; Kirby, Stephen H.; Love, Jeffrey J.; Neal, Christina A.; Plant, Nathaniel G.; Plunkett, Michael L.; Weaver, Craig S.; Wein, Anne; Perry, Suzanne C.

    2013-01-01

    The mission of the U.S. Geological Survey (USGS) in natural hazards is to develop and apply hazard science to help protect the safety, security, and economic well-being of the Nation. The costs and consequences of natural hazards can be enormous, and each year more people and infrastructure are at risk. USGS scientific research—founded on detailed observations and improved understanding of the responsible physical processes—can help to understand and reduce natural hazard risks and to make and effectively communicate reliable statements about hazard characteristics, such as frequency, magnitude, extent, onset, consequences, and where possible, the time of future events. To accomplish its broad hazard mission, the USGS maintains an expert workforce of scientists and technicians in the earth sciences, hydrology, biology, geography, social and behavioral sciences, and other fields, and engages cooperatively with numerous agencies, research institutions, and organizations in the public and private sectors, across the Nation and around the world. The scientific expertise required to accomplish the USGS mission in natural hazards includes a wide range of disciplines that this report refers to, in aggregate, as hazard science. In October 2010, the Natural Hazards Science Strategy Planning Team (H–SSPT) was charged with developing a long-term (10–year) Science Strategy for the USGS mission in natural hazards. This report fulfills that charge, with a document hereinafter referred to as the Strategy, to provide scientific observations, analyses, and research that are critical for the Nation to become more resilient to natural hazards. Science provides the information that decisionmakers need to determine whether risk management activities are worthwhile. Moreover, as the agency with the perspective of geologic time, the USGS is uniquely positioned to extend the collective experience of society to prepare for events outside current memory. The USGS has critical

  20. Measuring Impact of Uncertainty in a Stylized Macro-Economic Climate Model within a Dynamic Game Perspective

    NARCIS (Netherlands)

    Stienen, V.F.; Engwerda, Jacob

    2018-01-01

    In this paper we try to quantify/measure the main factors that influence the equilibrium outcome and pursued strategies in a simplistic model for the use of fossil versus green energy over time. The model is derived using the standard Solow macro-economic growth model in a two-country setting within

  1. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  2. Water security evaluation in Yellow River basin

    Science.gov (United States)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  3. Study on developing energy-macro model

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Young Duk [Korea Energy Economics Institute, Euiwang (Kenya)

    1999-12-01

    It analyzed the effect of international oil price on domestic economy and its path, time difference and degree of effect. First of all, it analyzed whether the long-term relationship between international oil price and price exists focusing on integral relationship, and estimated dynamic price fluctuation by using error correction model. Moreover, using structural VAR model, it analyzed what kind of shocking reactions are showed when the increase of international oil price affects on domestic macro economic variables. Commonly it is estimated that price is increasing in a long term not in a short term as the international oil price is increasing. When the international oil price increases, it is estimated that its effect in a short term is insignificant because of direct price control by the government and then its spreading effect on economy shows a long-term effect by deepening the price control. (author). 16 refs., 3 figs., 10 tabs.

  4. Macro influencers of electronic health records adoption.

    Science.gov (United States)

    Raghavan, Vijay V; Chinta, Ravi; Zhirkin, Nikita

    2015-01-01

    While adoption rates for electronic health records (EHRs) have improved, the reasons for significant geographical differences in EHR adoption within the USA have remained unclear. To understand the reasons for these variations across states, we have compiled from secondary sources a profile of different states within the USA, based on macroeconomic and macro health-environment factors. Regression analyses were performed using these indicator factors on EHR adoption. The results showed that internet usage and literacy are significantly associated with certain measures of EHR adoption. Income level was not significantly associated with EHR adoption. Per capita patient days (a proxy for healthcare need intensity within a state) is negatively correlated with EHR adoption rate. Health insurance coverage is positively correlated with EHR adoption rate. Older physicians (>60 years) tend to adopt EHR systems less than their younger counterparts. These findings have policy implications on formulating regionally focused incentive programs.

  5. Impact of Euro-Canadian agrarian practices: in search of sustainable import-substitution strategies to enhance food security in subarctic Ontario, Canada.

    Science.gov (United States)

    Spiegelaar, Nicole F; Tsuji, Leonard J S

    2013-01-01

    In Canada, food insecurity exists among Aboriginal (Inuit, Metis and First Nations) people living in remote northern communities, in part, because of their reliance on the industrialized, import-based food system. Local food production as a substitute to imports would be an adaptive response, but enhancement of food security via food localization requires reflection on previous failings of conventional agricultural strategies so that informed decisions can be made. In light of potential reintroduction of local food production in remote First Nations communities, we investigated the cultural, social and ecological effects of a 20th century, Euro-Canadian agrarian settlement on the food system of a subarctic First Nation; this will act as the first step in developing a more sustainable local food program and enhancing food security in this community. To investigate the socio-cultural impacts of the Euro-Canadian agrarian initiative on the food system of Fort Albany First Nation, purposive, semi-directive interviews were conducted with elders and other knowledgeable community members. Interview data were placed into themes using inductive analyses. To determine the biophysical impact of the agrarian initiative, soil samples were taken from one site within the cultivated area and from one site in an undisturbed forest area. Soil properties associated with agricultural use and productivity were assessed. To compare the means of a given soil property between the sites, one-tailed t-tests were employed. Vegetative analysis was conducted in both sites to assess disturbance. According to the interviewees, prior to the agrarian initiative, First Nation families harvested wild game and fish, and gathered berries as well as other forms of vegetation for sustenance. With the introduction of the residential school and agrarian initiative, traditional food practices were deemed inadequate, families were forced to work and live in the settlement (becoming less reliant on

  6. Augmentation of clozapine with amisulpride: an effective therapeutic strategy for violent treatment-resistant schizophrenia patients in a UK high-security hospital.

    Science.gov (United States)

    Hotham, James E; Simpson, Patrick J D; Brooman-White, Rosalie S; Basu, Amlan; Ross, Callum C; Humphreys, Sharon A; Larkin, Fintan; Gupta, Nitin; Das, Mrigendra

    2014-10-01

    Clozapine is used in the management of treatment-resistant schizophrenia and is effective in reducing aggression; however a subgroup of patients is poorly responsive. For violent patients in this group, there is limited literature on the use of strategies to augment clozapine with other agents. Here we present a case series of 6 schizophrenia patients, within a high-security hospital, who have a history of serious violence and who were treated with clozapine augmented with amisulpride. We reviewed case notes and health records for evidence of violence/aggression and positive factors such as engagement in activities, and Clinical Global Impression (CGI) scores were formulated. We also examined metabolic parameters before and after augmentation. All 6 of the patients showed clinical improvement in symptoms and a reduction in their risk of violence to others. Five patients had a reduction in number of violent/aggressive incidents, and all patients showed improvement in engagement in occupational, vocational, and/or psychological work. Metabolic parameters were largely unchanged except for 1 patient whose Body Mass Index (BMI) increased. Five patients reported side effects as unchanged or improved. These schizophrenia patients with a history of violence showed clinical improvement and reduced aggression and violence with amisulpride augmentation of clozapine. To our knowledge, this is the first report of an antiaggressive benefit of this combination in forensic psychiatric patients. Further studies are warranted to establish the efficacy and anti-aggressive effects of amisulpride augmentation of clozapine.

  7. The liberalization of the European electric and gas industries through the firms' M and A and investment strategies: propositions for a better energy security

    International Nuclear Information System (INIS)

    Benhassine, W.

    2009-04-01

    The electric and gas industries have been traditionally managed by public monopolies. The post World War II context was supportive to such an industrial organization. In fact, Europe was getting engaged in a long period of economic growth and was benefiting a favorable energetic context. At the end of the 90's, Europe decides to liberalize the national energy industries in order to create a unique European energy market. This liberalization has occurred in a context that as dramatically changed from the economic and energetic perspective. Indeed, the globalization phenomenon has strengthened the competitiveness of the emerging economies. The strong growth of the energy demand and the stagnation of the supply on the offer side have created tensions which have been increasingly frequent and important on the energy markets. Besides, facing greater budget restrictions and financial difficulties, the states have wished to get financially disengaged from these industries. Many factors show that the economic and energetic context will not get better in the next decades. Hence, in this new context, the liberalization of the energy industries should respond to two major stakes for the energy security of the European countries: the sustainability of the investments and the control of the energy demand. After having studied the merger and investment strategies of the energy firms, operating within a freshly liberalized sector, we make some propositions to draw up a new industrial organization which would allow a more efficient response to these two stakes. (author)

  8. Framework for a Risk-Informed Groundwater Compliance Strategy for Corrective Action Unit 98: Frenchman Flat, Nevada National Security Site, Nye County, Nevada, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Marutzky, Sam

    2010-09-01

    Note: This document was prepared before the NTS was renamed the Nevada National Security Site (August 23, 2010); thus, all references to the site herein remain NTS. Corrective Action Unit (CAU) 98, Frenchman Flat, at the Nevada Test Site (NTS) was the location of ten underground nuclear tests between 1965 and 1971. As a result, radionuclides were released in the subsurface in the vicinity of the test cavities. Corrective Action Unit 98 and other CAUs at the NTS and offsite locations are being investigated. The Frenchman Flat CAU is one of five Underground Test Area (UGTA) CAUs at the NTS that are being evaluated as potential sources of local or regional impact to groundwater resources. For UGTA sites, including Frenchman Flat, contamination in and around the test cavities will not be remediated because it is technologically infeasible due to the depth of the test cavities (150 to 2,000 feet [ft] below ground surface) and the volume of contaminated groundwater at widely dispersed locations on the NTS. Instead, the compliance strategy for these sites is to model contaminant flow and transport, estimate the maximum spatial extent and volume of contaminated groundwater (over a period of 1,000 years), maintain institutional controls, and restrict access to potentially contaminated groundwater at areas where contaminants could migrate beyond the NTS boundaries.

  9. Time and Space Complexity of Inside-Out Macro Grammars

    NARCIS (Netherlands)

    Asveld, P.R.J.

    1980-01-01

    Starting form Fischer's IO Standard Form Theorem we show that for each inside-out (or IO-) macro language $L$ there exists a $\\lambda$-free IO macro grammar with the following property: for each $x$ in $L$ there is a derivation of $x$ of length at most linear in the length of $x$. Then we construct

  10. Intake of macro- and micronutrients in Danish vegans

    DEFF Research Database (Denmark)

    Kristensen, Nadja B; Madsen, Mia L; H Hansen, Tue

    2015-01-01

    Since information about macro- and micronutrient intake among vegans is limited we aimed to determine and evaluate their dietary and supplementary intake. Seventy 18-61 years old Danish vegans completed a four-day weighed food record from which their daily intake of macro- and micronutrients was ...

  11. Estimating Dynamic Equilibrium Models using Macro and Financial Data

    DEFF Research Database (Denmark)

    Christensen, Bent Jesper; Posch, Olaf; van der Wel, Michel

    We show that including financial market data at daily frequency, along with macro series at standard lower frequency, facilitates statistical inference on structural parameters in dynamic equilibrium models. Our continuous-time formulation conveniently accounts for the difference in observation...... of the estimators and estimate the model using 20 years of U.S. macro and financial data....

  12. Macro-economic impact of loss of health; Macro-economische impact van gezondheidsverlies

    Energy Technology Data Exchange (ETDEWEB)

    Franchimon, F. [BAM Techniek, Capelle a/d IJssel (Netherlands); Ament, H.J.A. [Universiteit Maastricht, Maastricht (Netherlands); Knies, J.; Pernot, C.E.E. [Pernot Consulting, Heeze (Netherlands); Van Bronswijk, J.M.H. [Technische Universiteit Eindhoven TUE, Eindhoven (Netherlands)

    2010-11-15

    More healthy life years are achievable by dwelling improvements. This article computes the healthy life years that may be gained by increased ventilation rates. It concerns the diseases Asthma, COPD en lung cancer. Increased ventilation removes house dust mites and their allergens, as well as tobacco smoke, which are associated with these diseases. Costs and savings are computes and compared in order to test the macro-economical feasibility of increased ventilation in dwellings. [Dutch] Door verbetering van woningen zijn veel gezonde levensjaren te behalen. In dit artikel worden de gewonnen gezonde levensjaren uitgerekend door meer ventileren voor de ziekten astma, COPD en longkanker. Zowel huisstofmijtallergeen als tabaksrook zijn geassocieerd met astma, COPD en longkanker. De kosten en de opbrengsten van meer ventileren worden met elkaar vergeleken om de macro-economische haalbaarheid te toetsen.

  13. Teaching RFID Information Systems Security

    Science.gov (United States)

    Thompson, Dale R.; Di, Jia; Daugherty, Michael K.

    2014-01-01

    The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…

  14. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  15. The Era of Mobile Internet Mobile Phone Information Security Strategy of Shallow Research%移动互联网时代手机信息安全策略

    Institute of Scientific and Technical Information of China (English)

    黄赛

    2015-01-01

    Articles focus on mobile Internet hand on behalf of the smartphone security issues, from the communication network selection strategy, the mobile terminal selection strategy, the use of mobile phones security policy, social information security environment to create four latitude on smartphone security strategy for full range analysis, introduce, strive for ordinary readers fully understand the safety problem of the intelligent mobile phone and application in the reality of life and learning, so that everyone's smartphone safer and more at ease.%文章聚焦于移动互联网手代智能手机安全问题,从通信网络选择策略、手机终端选择策略、手机使用安全策略、社会信息安全环境营造四个纬度对智能手机安全策略进行全方位的分析、介绍,力求让普通读者全面了解掌握智能手机安全问题,并应用于现实生活学习中,从而使大家的智能手机更安全、使用更放心。

  16. New approaches in European governance? Perspectives of stakeholders in the Danube macro-region

    Directory of Open Access Journals (Sweden)

    Franziska Sielker

    2016-01-01

    Full Text Available Macro-regional cooperation in the EU are networks that use the horizontal and vertical dimension of the multilevel governance system to influence both strategic decision-making as well as implementation activities. Drawing on an analysis of expert interviews in the Danube Region the paper scrutinizes stakeholders’ shared views towards expectations, challenges and added values, and thereby seeks to explain why a trend towards macro-regions arises and for what reasons stakeholders are getting involved. The analysis of the drivers for stakeholders’ commitment in the EU Danube Region Strategy shows that new governance arrangements need to be adjustable to different contexts, allow for negotiation and new network creation whilst simultaneously offering the political ability to act. The evidence presented suggests that multilevel governance in the EU is becoming increasingly complex, embracing more and different types of cooperation, with soft characteristics as crucial elements.

  17. Diagnosing integrated food security strategies

    NARCIS (Netherlands)

    Candel, Jeroen J.L.

    2018-01-01

    The global food price crises of 2007-8 and 2010 and subsequent policy debates have led to increased recognition that the drivers of food insecurity and associated policies transcend the boundaries of traditional governmental sectors and jurisdictions. Building on this insight, many governments of

  18. Nuclear power plants; security strategy

    International Nuclear Information System (INIS)

    Sidorenko, V.A.

    1989-01-01

    Safety standards and approaches to NPPs safety resulting from multilayer experience are presented. It is stressed that sufficiency and efficiency of reactor safety measures should be payed constant attention. Real evolution of accidents reqires unlimited development of new safety means. It is evident that in nuclear power there should exist high s afety culture . NPPs safety should be guaranteed by joint measures of both specialists ans public

  19. Macro-economic impact of large-scale deployment of biomass resources for energy and materials on a national level—A combined approach for the Netherlands

    International Nuclear Information System (INIS)

    Hoefnagels, Ric; Banse, Martin; Dornburg, Veronika; Faaij, André

    2013-01-01

    Biomass is considered one of the most important options in the transition to a sustainable energy system with reduced greenhouse gas (GHG) emissions and increased security of enegry supply. In order to facilitate this transition with targeted policies and implementation strategies, it is of vital importance to understand the economic benefits, uncertainties and risks of this transition. This article presents a quantification of the economic impacts on value added, employment shares and the trade balance as well as required biomass and avoided primary energy and greenhouse gases related to large scale biomass deployment on a country level (the Netherlands) for different future scenarios to 2030. This is done by using the macro-economic computable general equilibrium (CGE) model LEITAP, capable of quantifying direct and indirect effects of a bio-based economy combined with a spread sheet tool to address underlying technological details. Although the combined approach has limitations, the results of the projections show that substitution of fossil energy carriers by biomass, could have positive economic effects, as well as reducing GHG emissions and fossil energy requirement. Key factors to achieve these targets are enhanced technological development and the import of sustainable biomass resources to the Netherlands. - Highlights: • We analyse large scale production of bioenergy and biochemicals in the Netherlands. • The scenarios include up to 30% substitution of fossil fuels by biomass in 2030. • Resulting in strong greenhouse gas savings and positive macro-economic effects. • Large amounts of imported biomass are required to meet the domestic demand. • This requires high rates of technological change and strict sustainability criteria

  20. SAS-macros for estimation and prediction in an model of the electricity consumption

    DEFF Research Database (Denmark)

    1998-01-01

    SAS-macros for estimation and prediction in an model of the electricity consumption'' is a large collection of SAS-macros for handling a model of the electricity consumption in the Eastern Denmark. The macros are installed at Elkraft, Ballerup.......SAS-macros for estimation and prediction in an model of the electricity consumption'' is a large collection of SAS-macros for handling a model of the electricity consumption in the Eastern Denmark. The macros are installed at Elkraft, Ballerup....

  1. Miniature Piezoelectric Macro-Mass Balance

    Science.gov (United States)

    Sherrit, Stewart; Trebi-Ollennu, Ashitey; Bonitz, Robert G.; Bar-Cohen, Yoseph

    2010-01-01

    Mass balances usually use a strain gauge that requires an impedance measurement and is susceptible to noise and thermal drift. A piezoelectric balance can be used to measure mass directly by monitoring the voltage developed across the piezoelectric balance, which is linear with weight or it can be used in resonance to produce a frequency change proportional to the mass change (see figure). The piezoelectric actuator/balance is swept in frequency through its fundamental resonance. If a small mass is added to the balance, the resonance frequency shifts down in proportion to the mass. By monitoring the frequency shift, the mass can be determined. This design allows for two independent measurements of mass. Additionally, more than one sample can be verified because this invention allows for each sample to be transported away from the measuring device upon completion of the measurement, if required. A piezoelectric actuator, or many piezoelectric actuators, was placed between the collection plate of the sampling system and the support structure. As the sample mass is added to the plate, the piezoelectrics are stressed, causing them to produce a voltage that is proportional to the mass and acceleration. In addition, a change in mass delta m produces a change in the resonance frequency with delta f proportional to delta m. In a microgravity environment, the spacecraft could be accelerated to produce a force on the piezoelectric actuator that would produce a voltage proportional to the mass and acceleration. Alternatively, the acceleration could be used to force the mass on the plate, and the inertial effects of the mass on the plate would produce a shift in the resonance frequency with the change in frequency related to the mass change. Three prototypes of the mass balance mechanism were developed. These macro-mass balances each consist of a solid base and an APA 60 Cedrat flextensional piezoelectric actuator supporting a measuring plate. A similar structure with 3 APA

  2. Successful Characterization Strategies for the Active High Risk Y-12 National Security Complex 9201-5 (Alpha-5) Facility, Oak Ridge, TN - 12164

    Energy Technology Data Exchange (ETDEWEB)

    Birchfield, Joseph W. III [Link Technologies (United States); Albrecht, Linda [Alliant Corporation (United States)

    2012-07-01

    Building 9201-5 (Alpha 5) was completed in May 1944 and served as a production facility for National Nuclear Security Administration (NNSA) Y-12 Weapons Plant. During the Manhattan Project, it functioned as a uranium enrichment facility. The facility was renovated and altered over the years, converting the calutrons to support other missions. Alpha 5 consists of 4 floors and a basement measuring approximately 600,000 square feet. The facility contains various pieces of equipment remaining from legacy operations. A significant amount (approximately 200,000 kgs) of mercury (Hg) has been spilled in the facility over the operational history of the building. To further complicate matters, beryllium (Be) contamination in 9201-5 is found throughout approximately sixty percent of the facility. Concentrations varying from very low (< 0.2 micrograms (μg)/100 cm{sup 2}) to areas where concentrations are relatively high, approximately 600 μg/100 cm{sup 2}, in regulated beryllium areas. The primary site related contaminants (SRCs) for the waste in this facility are enriched uranium, depleted uranium, beryllium and mercury. This facility represents the highest environmental risk for DOE-ORO EM and NNSA at Y-12 and must be quickly addressed to minimize impacts to future Y-12 missions, as well as human health and the environment. As part of the American Recovery and Reinvestment Act (ARRA), approximately 700,000 cubic feet of legacy material was removed in 2010 and 2011. In addition, characterization of the 9201-5 facility was scheduled in the winter and spring of 2011. This activity was initiated in January 2011 and was completed in July 2011. Heavy schedule pressure was further complicated by the fact that this building has active utility, security and process systems. Given these complex variables, a unique, out of the box characterization strategy was forged in an effort to bound radiological and chemical contaminants, as well as providing the appropriate level of quality to

  3. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  4. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  5. Massive computation methodology for reactor operation (MACRO)

    International Nuclear Information System (INIS)

    Gustavsson, Cecilia; Pomp, Stephan; Sjoestrand, Henrik; Wallin, Gustav; Oesterlund, Michael; Koning, Arjan; Rochman, Dimitri; Bejmer, Klaes-Hakan; Henriksson, Hans

    2010-01-01

    Today, nuclear data libraries do not handle uncertainties from nuclear data in a consistent manner and the reactor codes do not request uncertainties in nuclear data input. Thus, the output from these codes have unknown uncertainties. The plan is to use a method proposed by Koning and Rochman to investigate the propagation of nuclear data uncertainties into reactor physics codes and macroscopic parameters. A project (acronym MACRO) has started at Uppsala University in collaboration with A. Koning and with financial support from Vattenfall AB and the Swedish Research Council within the GENIUS (Generation IV research in universities of Sweden) project. In the proposed method the uncertainties in nuclear model parameters will be derived from theoretical considerations and comparisons of nuclear model results with experimental cross-section data. Given the probability distribution in the model parameters a large set of random, complete ENDF-formatted nuclear data libraries will be created using the TALYS code. The generated nuclear data libraries will then be used in neutron transport codes to obtain macroscopic reactor parameters. For this, models of reactor systems with proper geometry and elements will be used. This will be done for all data libraries and the variation of the final results will be regarded as a systematic uncertainty in the investigated reactor parameter. The understanding of these systematic uncertainties is especially important for the design and intercomparison of new reactor concepts, i.e., Generation IV, and optimization applications for current generation reactors is envisaged. (authors)

  6. Opportunistic Relay Selection with Cooperative Macro Diversity

    Directory of Open Access Journals (Sweden)

    Yu Chia-Hao

    2010-01-01

    Full Text Available We apply a fully opportunistic relay selection scheme to study cooperative diversity in a semianalytical manner. In our framework, idle Mobile Stations (MSs are capable of being used as Relay Stations (RSs and no relaying is required if the direct path is strong. Our relay selection scheme is fully selection based: either the direct path or one of the relaying paths is selected. Macro diversity, which is often ignored in analytical works, is taken into account together with micro diversity by using a complete channel model that includes both shadow fading and fast fading effects. The stochastic geometry of the network is taken into account by having a random number of randomly located MSs. The outage probability analysis of the selection differs from the case where only fast fading is considered. Under our framework, distribution of the received power is formulated using different Channel State Information (CSI assumptions to simulate both optimistic and practical environments. The results show that the relay selection gain can be significant given a suitable amount of candidate RSs. Also, while relay selection according to incomplete CSI is diversity suboptimal compared to relay selection based on full CSI, the loss in average throughput is not too significant. This is a consequence of the dominance of geometry over fast fading.

  7. Massive computation methodology for reactor operation (MACRO)

    Energy Technology Data Exchange (ETDEWEB)

    Gustavsson, Cecilia; Pomp, Stephan; Sjoestrand, Henrik; Wallin, Gustav; Oesterlund, Michael [Division of applied nuclear physics, Department of physics and astronomy, Uppsala University, Laegerhyddsvaegen 1, 751 20 Uppsala (Sweden); Koning, Arjan; Rochman, Dimitri [Nuclear Research and consultancy Group (NRG) Westerduinweg 3, Petten (Netherlands); Bejmer, Klaes-Hakan [Vattenfall Nuclear Fuel AB, Jaemtlandsgatan 99, Vaellingby (Sweden); Henriksson, Hans [Vattenfall Research and Development AB, Jaemtlandsgatan 99, Vaellingby (Sweden)

    2010-07-01

    Today, nuclear data libraries do not handle uncertainties from nuclear data in a consistent manner and the reactor codes do not request uncertainties in nuclear data input. Thus, the output from these codes have unknown uncertainties. The plan is to use a method proposed by Koning and Rochman to investigate the propagation of nuclear data uncertainties into reactor physics codes and macroscopic parameters. A project (acronym MACRO) has started at Uppsala University in collaboration with A. Koning and with financial support from Vattenfall AB and the Swedish Research Council within the GENIUS (Generation IV research in universities of Sweden) project. In the proposed method the uncertainties in nuclear model parameters will be derived from theoretical considerations and comparisons of nuclear model results with experimental cross-section data. Given the probability distribution in the model parameters a large set of random, complete ENDF-formatted nuclear data libraries will be created using the TALYS code. The generated nuclear data libraries will then be used in neutron transport codes to obtain macroscopic reactor parameters. For this, models of reactor systems with proper geometry and elements will be used. This will be done for all data libraries and the variation of the final results will be regarded as a systematic uncertainty in the investigated reactor parameter. The understanding of these systematic uncertainties is especially important for the design and intercomparison of new reactor concepts, i.e., Generation IV, and optimization applications for current generation reactors is envisaged. (authors)

  8. The International Macro-Environment of an Organization

    Directory of Open Access Journals (Sweden)

    Ileana (Badulescu Anastase

    2016-01-01

    Full Text Available The international macro-environment (supranational macro-environment brings together allthe uncontrollable factors with a global impact, and it is related to the organization’s indirectrelationships on international markets. Romania’s globalization and the EU integration increasedthe importance of the macro-environment for all organizations, regardless of their degree ofinternationalization. In marketing, we must master the main agreements between countries and theregulations emanating from general international bodies, reflecting on their business, on differentforeign markets. Knowledge of the international environment is possible only through an analysisof its components (Anastase, I., 2012, p.41.

  9. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  10. 基于Android系统的手机信息安全分析及策略改进%The Information Security Analysis and Strategy Improvement of AndroidMobile Phone

    Institute of Scientific and Technical Information of China (English)

    贾能

    2016-01-01

    随着移动互联网的发展,Android智能手机在市场上占据着很大的份额。文章首先分析了Android现有的安全机制沙箱模型和数字证书,然后提出Android系统存在的安全问题,最后从系统开发者和用户2个角度设计安全策略来对现有的安全策略进行改进。%With the development of mobile Internet, mobile phones using Androidsystem occupy a large share in the market. First of all, this paper analyzes sandbox model and digital certiifcate which are the existing security mechanisms of Androidsystem. Secondly, security problems in the Androidsystem have been put forward. Finally, security strategies are designed from two angles of system developers and users to improve the existing security strategy.

  11. 电力二次系统主动安全防御策略及实现%An Active Security Defense Strategy and Its Implementation for the Power Secondary System

    Institute of Scientific and Technical Information of China (English)

    冯兆红; 贾铁军

    2015-01-01

    在分析数据安全和业务安全保护侧重点的基础上,结合电力二次系统结构对系统按数密和业密级别高低进行安全分区。针对电力二次系统的业务实际及其运行过程中存在的不安全因素,对内外网之间进行通信安全部署,提出主动安全防御策略,有效地解决了电力二次系统中存在的数据和业务安全保护的矛盾,提高了系统的检测辨识能力及整体防御功效。%On the basis of analyzing the protection sides of data security and business security,the power secondary system is divided into different sections according to the level of data secrecy and business secrecy.Under consideration of actual business of the power secondary system and unsafe factors in its operation,this paper makes a communication security deployment between the internal and external networks and proposes an active security defense strategy,thus effectively resolving the contradiction between data and business security protection in the power secondary system and improving the detection identification ability of the system.

  12. Alleged Genocide in Sudan - Where Does the US National Security Strategy Take Us in Light of the UN Genocide Convention and Lingering Memories of Failure to Intervene in Rwanda

    National Research Council Canada - National Science Library

    Block, Greg

    2005-01-01

    .... Using Rwanda as a baseline and the current situation in Sudan as a case study this project examines the US response to the alleged genocide from the perspective of the US as a signatory to the Genocide Convention. Given the US National Security Strategy what are the competing interests and concerns that impact this crisis? And what is the appropriate response to this crisis? Is there something about this specific allegation of genocide that suggests prevention efforts will succeed or fail?

  13. Infrastructure to support trading strategies against the occurrence of extraordinary events: Secure area of the equipment storage; Infraestructura de apoyo a las estrategias de operacion frente a la ocurrencia de sucesos extraordinarios: Area segura de almacenamiento de equipos

    Energy Technology Data Exchange (ETDEWEB)

    Blas Gordo, A. de; Asensio Vega, J.; Fernandez Morales, E. J.; Font Hadinger, I.

    2013-07-01

    Compliance with the requirements specified in the Technical Instructions ITC and ITC-1-2, issued by the Nuclear Safety Council (CSN), is conducting exhaustive analyzes on coping in Nuclear Power Plants emergencies due to the occurrence extraordinary events. As part of the necessary infrastructure, a secure area for parking and storage of projects teams involved in the development of various operational strategies. The design of it ensures compliance with all regulatory and practical requirements, ensuring minimization strategies and time functionality in the application of the same.

  14. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  15. Security in cloud computing

    OpenAIRE

    Moreno Martín, Oriol

    2016-01-01

    Security in Cloud Computing is becoming a challenge for next generation Data Centers. This project will focus on investigating new security strategies for Cloud Computing systems. Cloud Computingisarecent paradigmto deliver services over Internet. Businesses grow drastically because of it. Researchers focus their work on it. The rapid access to exible and low cost IT resources on an on-demand fashion, allows the users to avoid planning ahead for provisioning, and enterprises to save money ...

  16. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  17. Ethical Hacking in Information Security Curricula

    Science.gov (United States)

    Trabelsi, Zouheir; McCoey, Margaret

    2016-01-01

    Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…

  18. MARKAL-MACRO: A linked model for energy-economy analysis

    International Nuclear Information System (INIS)

    Manne, A.S.; Wene, C.O.

    1992-02-01

    MARKAL-MACRO is an experiment in model linkage for energy and economy analysis. This new tool is intended as an improvement over existing methods for energy strategy assessment. It is designed specifically for estimating the costs and analyzing the technologies proposed for reducing environmental risks such as global climate change or regional air pollution. The greenhouse gas debate illustrates the usefulness of linked energy-economy models. A central issue is the coupling between economic growth, the level of energy demands, and the development of an energy system to supply these demands. The debate is often connected with alternative modeling approaches. The competing philosophies may be labeled ''top-down macroeconomic'' and ''bottom-up engineering'' perspectives. MARKAL is a systems engineering (physical process) analysis built on the concept of a Reference Energy System (RES). MARKAL is solved by means of dynamic linear programming. In most applications, the end use demands are fixed, and an economically efficient solution is obtained by minimizing the present value of energy system's costs throughout the planning horizon. MACRO is a macroeconomic model with an aggregated view of long-term economic growth. The basis input factors of production are capital, labor and individual forms of energy. MACRO is solved by nonlinear optimization

  19. Impacts of macro - and microplastic on macrozoobenthos abundance in intertidal zone

    Science.gov (United States)

    Bangun, A. P.; Wahyuningsih, H.; Muhtadi, A.

    2018-02-01

    Plastics pollution in coastal areas is one of the topics that have received more attention over the past few years. The intertidal zone is a waters area that is directly affected by contamination of plastic waste from land and sea. The purpose of this study was to analyze the types and abundance of plastic waste in the intertidal zone and its impact on macrozoobenthos abundance. This research was conducted at Pesisir Desa Jaring Halus in February-April 2017. Macrozoobenthos and macro - micro plastic were collected by using quadratic transect. Sediments were collected with a core, to a depth of 30 cm. Microplastic and macroplastic abundances were analyzed using separation of sediment density and hand sorting. The dominant micro plastic types were film (52.30%), fiber (24.88%), fragments (22.74%), followed by pellets (0.1%). The total number of microplastics were 326,33 items and macro plastic were 308 items. Macroplastic abundance is positively correlated with microplastic (0.765). The abundance of macrozoobenthos is negatively correlated with microplastic abundance (-0.368) and with macro plastic abundance (-0.633). The management strategies were suggested clean up marine debris, decrease plastic using and built up the station of debris processing.

  20. Revolutionary Transformation in the Macro-Regional Modernities

    Czech Academy of Sciences Publication Activity Database

    Hrubec, Marek

    2015-01-01

    Roč. 11, č. 6 (2015), s. 79-91 ISSN 1841-0464 Institutional support: RVO:67985955 Keywords : macro-regional * modernities * revolutionary transformations * intercultural * global Subject RIV: AA - Philosophy ; Religion

  1. Evaluation of vitrification factors from DWPF's macro-batch 1

    International Nuclear Information System (INIS)

    Edwards, T.B.

    2000-01-01

    The Defense Waste Processing Facility (DWPF) is evaluating new sampling and analytical methods that may be used to support future Slurry Mix Evaporator (SME) batch acceptability decisions. This report uses data acquired during DWPF's processing of macro-batch 1 to determine a set of vitrification factors covering several SME and Melter Feed Tank (MFT) batches. Such values are needed for converting the cation measurements derived from the new methods to a ''glass'' basis. The available data from macro-batch 1 were used to examine the stability of these vitrification factors, to estimate their uncertainty over the course of a macro-batch, and to provide a recommendation on the use of a single factor for an entire macro-batch. The report is in response to Technical Task Request HLW/DWPF/TTR-980015

  2. Three Macro Controls Over China’s Real Estate Market

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The first macro control: to cool overheated real estate investment June 2003: The People’s Bank of China issued the Notice on Further Strengthening Credit and Loan Business Management of Real Estate

  3. Complex fluids with mobile charge-regulating macro-ions

    Science.gov (United States)

    Markovich, Tomer; Andelman, David; Podgornik, Rudi

    2017-10-01

    We generalize the concept of charge regulation of ionic solutions, and apply it to complex fluids with mobile macro-ions having internal non-electrostatic degrees of freedom. The suggested framework provides a convenient tool for investigating systems where mobile macro-ions can self-regulate their charge (e.g., proteins). We show that even within a simplified charge-regulation model, the charge dissociation equilibrium results in different and notable properties. Consequences of the charge regulation include a positional dependence of the effective charge of the macro-ions, a non-monotonic dependence of the effective Debye screening length on the concentration of the monovalent salt, a modification of the electric double-layer structure, and buffering by the macro-ions of the background electrolyte.

  4. THE CULTURE AND ARTS ORGANIZATION: MACRO-SOCIOLOGICAL ASPECT

    Directory of Open Access Journals (Sweden)

    Margarita Rasimovna Pashaeva

    2013-11-01

    Full Text Available In this study we analyze the macro-sociological aspect of culture and arts organization. The subject of research is reputation policy and communication technologies in  macro-sociological aspect of culture and arts organization. The target is the research the effects of macro-sociological aspect in the activities of such organization. In the study were used such methods of research: theoretical study and  synthesis; quantative method of elicitation: questionnaire; information processing methods of primary analysis; interpretation. The results of research can be applied in the activities of different culture and arts organization. The research identified the negative and positive tendencies in the context of the macro-sociological aspect.DOI: http://dx.doi.org/10.12731/2218-7405-2013-8-49

  5. Role of Ceratophyllum demersum in recycling macro elements from ...

    African Journals Online (AJOL)

    Michael Horsfall

    Role of Ceratophyllum demersum in recycling macro elements from wastewater ... wastewater and could be the best biosorption method for protecting the water pollution in the environment. .... Calcium concentration in plants: Analysis.

  6. The Generalist Model: Where do the Micro and Macro Converge?

    Directory of Open Access Journals (Sweden)

    Shari E. Miller

    2008-12-01

    Full Text Available Although macro issues are integral to social work, students continue to struggle with the acquisition of knowledge and skills pertaining to larger systems. Educators have developed innovative methods to integrate learning across systems of various sizes however it appears an imbalance persists. This challenge is supported by baccalaureate student responses to a social work program evaluation. Four years of data from 295 undergraduate students revealed that they felt less prepared to practice with larger, macro systems. Changes in curriculum to reflect collaboration and holism, and more research are needed to adequately provide macro learning and macro practice opportunities within the generalist model and in the context of the current socio-economic-political environment.

  7. Variation in composition of macro-benthic invertebrates as an ...

    African Journals Online (AJOL)

    Mo

    1 Makerere University Institute of Environment & Natural Resources, P.O. Box 7062 Kampala-Uganda ... benthic macro-invertebrates communities were evaluated using GIS techniques along an ...... Kendall Hunt Publishing Company, Iowa.

  8. Ultrafast pulse lasers jump to macro applications

    Science.gov (United States)

    Griebel, Martin; Lutze, Walter; Scheller, Torsten

    2016-03-01

    Ultrafast Lasers have been proven for several micro applications, e.g. stent cutting, for many years. Within its development of applications Jenoptik has started to use ultrafast lasers in macro applications in the automotive industry. The JenLas D2.fs-lasers with power output control via AOM is an ideal tool for closed loop controlled material processing. Jenoptik enhanced his well established sensor controlled laser weakening process for airbag covers to a new level. The patented process enables new materials using this kind of technology. One of the most sensitive cover materials is genuine leather. As a natural product it is extremely inhomogeneous and sensitive for any type of thermal load. The combination of femtosecond pulse ablation and closed loop control by multiple sensor array opens the door to a new quality level of defined weakening. Due to the fact, that the beam is directed by scanning equipment the process can be split in multiple cycles additionally reducing the local energy input. The development used the 5W model as well as the latest 10W release of JenLas D2.fs and achieved amazing processing speeds which directly fulfilled the requirements of the automotive industry. Having in mind that the average cycle time of automotive processes is about 60s, trials had been done of processing weakening lines in genuine leather of 1.2mm thickness. Parameters had been about 15 cycles with 300mm/s respectively resulting in an average speed of 20mm/s and a cycle time even below 60s. First samples had already given into functional and aging tests and passed successfully.

  9. Tutorial: simulating chromatography with Microsoft Excel Macros.

    Science.gov (United States)

    Kadjo, Akinde; Dasgupta, Purnendu K

    2013-04-22

    Chromatography is one of the cornerstones of modern analytical chemistry; developing an instinctive feeling for how chromatography works will be invaluable to future generation of chromatographers. Specialized software programs exist that handle and manipulate chromatographic data; there are also some that simulate chromatograms. However, the algorithm details of such software are not transparent to a beginner. In contrast, how spreadsheet tools like Microsoft Excel™ work is well understood and the software is nearly universally available. We show that the simple repetition of an equilibration process at each plate (a spreadsheet row) followed by discrete movement of the mobile phase down by a row, easily automated by a subroutine (a "Macro" in Excel), readily simulates chromatography. The process is readily understood by a novice. Not only does this permit simulation of isocratic and simple single step gradient elution, linear or multistep gradients are also easily simulated. The versatility of a transparent and easily understandable computational platform further enables the simulation of complex but commonly encountered chromatographic scenarios such as the effects of nonlinear isotherms, active sites, column overloading, on-column analyte degradation, etc. These are not as easily simulated by available software. Views of the separation as it develops on the column and as it is seen by an end-column detector are both available in real time. Excel 2010™ also permits a 16-level (4-bit) color gradation of numerical values in a column/row; this permits visualization of a band migrating down the column, much as Tswett may have originally observed, but in a numerical domain. All parameters of relevance (partition constants, elution conditions, etc.) are readily changed so their effects can be examined. Illustrative Excel spreadsheets are given in the Supporting Information; these are easily modified by the user or the user can write his/her own routine. Copyright

  10. Learning to Solve Problems by Searching for Macro-Operators

    Science.gov (United States)

    1983-07-01

    executing generalized robot plans. Aritificial Intelligence 3:25 1-288, 1972. [Frey 821 Frey, Alexander Ii. Jr., and David Singmaster. Handbook of Cubik...and that searching for macros may be a useful general learning paradigm. 1.1. Introduction One view of die die field of artificial intelligence is that... intelligence literature [Schofield 67, Gaschnig 79, Ericsson 761 and provides one of the simplest examples of the operation of the Macro Problem Solver. It

  11. Communication from the commission to the council and the European parliament. Final report on the green paper: towards a European strategy for the security of energy supply

    International Nuclear Information System (INIS)

    2002-06-01

    The Green Paper on the security of energy supply, adopted by the Commission more than a year ago, opened up a debate on energy policy unprecedented in 30 years. In most of the Member States this debate revived discussion on national options in the energy field. Looking ahead to the next twenty to thirty years, the Green Paper drew attention to the structural weaknesses and geopolitical, social and environmental shortcomings of the EU energy supply, notably as regards European commitments in the Kyoto Protocol. The European economy, steadily demanding more and more energy, is essentially based on fossil fuels. The Green Paper offers a clear strategy based on demand management. It has the merit of pointing out that the EU has little room for manoeuvre with regard to energy supply notably due to its low, or in certain cases less competitive (e.g. coal), energy resources. Therefore it is appropriate for the Union to concentrate on guiding and steering demand, unlike the United States which, in the energy plan it announced in May 2001, seeks to meet demand by constantly boosting supply. The Green Paper put 13 questions as a framework for the general debate. The conclusion is that there is virtually unanimous agreement on the strategic axis of demand management: energy consumption must be guided and steered. The conclusions of the Barcelona European Council, stressing in particular the need for better energy efficiency by 2010 and rapid adoption of energy taxation proposals, clearly give political backing to this priority. Without waiting for the debate to end, the Commission made some very well received proposals along these lines, involving actual legislation and not just encouraging words or exchange of good practice, some of which have already been adopted by the Council and the European Parliament. One of these proposals in particular was the Directive on electricity production from renewable sources, adopted in 2001. Another was the proposal for a Directive on

  12. Communication from the commission to the council and the European parliament. Final report on the green paper: towards a European strategy for the security of energy supply

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-06-15

    The Green Paper on the security of energy supply, adopted by the Commission more than a year ago, opened up a debate on energy policy unprecedented in 30 years. In most of the Member States this debate revived discussion on national options in the energy field. Looking ahead to the next twenty to thirty years, the Green Paper drew attention to the structural weaknesses and geopolitical, social and environmental shortcomings of the EU energy supply, notably as regards European commitments in the Kyoto Protocol. The European economy, steadily demanding more and more energy, is essentially based on fossil fuels. The Green Paper offers a clear strategy based on demand management. It has the merit of pointing out that the EU has little room for manoeuvre with regard to energy supply notably due to its low, or in certain cases less competitive (e.g. coal), energy resources. Therefore it is appropriate for the Union to concentrate on guiding and steering demand, unlike the United States which, in the energy plan it announced in May 2001, seeks to meet demand by constantly boosting supply. The Green Paper put 13 questions as a framework for the general debate. The conclusion is that there is virtually unanimous agreement on the strategic axis of demand management: energy consumption must be guided and steered. The conclusions of the Barcelona European Council, stressing in particular the need for better energy efficiency by 2010 and rapid adoption of energy taxation proposals, clearly give political backing to this priority. Without waiting for the debate to end, the Commission made some very well received proposals along these lines, involving actual legislation and not just encouraging words or exchange of good practice, some of which have already been adopted by the Council and the European Parliament. One of these proposals in particular was the Directive on electricity production from renewable sources, adopted in 2001. Another was the proposal for a Directive on

  13. The histone variant macroH2A is an epigenetic regulator of key developmental genes

    DEFF Research Database (Denmark)

    Buschbeck, Marcus; Uribesalgo, Iris; Wibowo, Indra

    2009-01-01

    The histone variants macroH2A1 and macroH2A2 are associated with X chromosome inactivation in female mammals. However, the physiological function of macroH2A proteins on autosomes is poorly understood. Microarray-based analysis in human male pluripotent cells uncovered occupancy of both macroH2A ...

  14. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  15. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  16. DISTRIBUTIONAND DIVERSITY OF MACRO ALGAE COMMUNITIES IN THE AMBON BAY

    Directory of Open Access Journals (Sweden)

    Christina Litaay

    2014-11-01

    Full Text Available Water conditions affected by natural and anthropogenic parameters such as sedimentation and solid waste disposal can influence the growth and distribution of macro algae. Sustainable management efforts can reduce damage on the Gulf coast of Ambon due to human activities and land clearing. This study was conducted in October 2008 using the transect method with 3 replicates in five locations i.e., Tantui, Air Salobar, Hative Besar, Halong, and Lateri. The interior and exterior waters of Ambon Bay contained different habitat conditions due to  sedimentation processes. The purpose of this study was to determine the distribution and diversity of macro algae communities in the Ambon Bay. The results found 21 species of macro- algae consisting of 10 species of Rhodhophyceae, 6 species of Chlorophyceae, and 5 species of Phaeophyceae. The highest density value of seaweed in Tantui was 389.0 g/m² of Chlorophyceae of Halimeda genus. In Air Salobar and Halong, the highest density value was Rhodophyceae of Gracilaria genus of 172.0 g/m² and 155.0 g/m², respectively. For the other genus in the Tantui and Lateri regions were dominated by Ulva at 92.10 gr/m2 and Padina of 20.0 gr/m2, respectively. The highest dominance of macro algae in the Hative Besar was found Chlorophyceae of Halimeda genus of 2.93 %, in the Air Salobar of Phaeophyceae of Turbinaria genus of 1.43 %. The difference values in density and the dominance of macro algae indicated an influence of habitat and environment due to seasons, sediment, and solid waste disposal to the diversity of macro algae. Keywords: Diversity, macro algae, Ambon Bay.

  17. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  18. Multi-State Initiatives---Agriculture Security Preparedness

    National Research Council Canada - National Science Library

    Gordon, Ellen

    2004-01-01

    ... to protect the nation's food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism including the struggle to secure the agriculture industry from potentially devastating attack...

  19. Concomitant macro and microvascular complications in diabetic nephropathy

    International Nuclear Information System (INIS)

    Alwakeel, Jamal S; AlSuwaida, Abdulkareem; Isnani, Arthur C; AlHarbi, Ali; Alam Awatif

    2009-01-01

    To determine the prevalence of concomitant microvascular and macro vascular complications of diabetic nephropathy we retrospectively reviewed the medical records of all 1,952 type 2 dia-betic patients followed-up at Security Forces Hospital, Riyadh, Saudi Arabia from January 1989 to December 2004. There were 626 (32.1%) patients (294 (47%) were males) who developed diabetic nephropathy. Their mean age was 66.9 + -11.4 years, mean duration of diabetes was 15.4 + -7.5 years, mean age at the onset of nephropathy was 61.5 + - 12.4 years, and mean duration of nephropathy was 3.9 + - 3.8 years. Concomitant diabetic complications included cataract (38.2%), acute coronary syndrome (36.1%), peripheral neuropathy (24.9%), myocardial infarction (24.1%), background retinopathy (22.4%), stroke (17.6%), proliferative retinopathy (11.7%), foot infection (7.3%), limb amputation (3.7%) and blindness (3%). Hypertension was documented in 577 (92.2%) patients, dyslipidemia in 266 (42.5%) and mortality from all causes in 86 (13.7%). There were 148 (23.6%) patients with one complication, 81 (12.9%) with two, 83 (13.3%) with three, and 61 (9.7%) with four or more. Deterioration of glomerular filtration rate was observed in 464 (74%) patients and doubling of serum creatinine in 250 (39.9%), while 95 (15.2%) developed end-stage renal disease (ESRD) at the end of study and 79 (12.6%) required dialysis. Complications were significantly more prevalent among males with greater number reaching ESRD level than females (P< 0.05). Relative risks of developing complications were significant after the onset of nephropathy; ACS (1.41), MI (1.49), stroke (1.48), diabetic foot (1.6), amputation (1.58) and death (1.93). We conclude that complications of diabetes are aggressive and progressive including high prevalence of diabetic nephropathy. Careful monitoring and proper institution of management protocols should be implemented to identify diabetic patients at high risk for complications and mitigate

  20. Concomitant macro and microvascular complications in diabetic nephropathy

    Energy Technology Data Exchange (ETDEWEB)

    Alwakeel, Jamal S; AlSuwaida, Abdulkareem [Div. of Nephrology, Dept. of Medicine, King Khalid Univ., Hospital, Riyadh (Saudi Arabia); Isnani, Arthur C [Dept. of Family and Community Medicine, King Khalid Univ. Hospital, Riyadh (Saudi Arabia); AlHarbi, Ali [Coll. of Medicine and Research Center, King Khalid Univ. Hospital, Riyadh (Saudi Arabia); Awatif, Alam [Div. of Nephrology, Dept. of Medicine, Security Forces Hospital, Riyadh (Saudi Arabia)

    2009-07-01

    To determine the prevalence of concomitant microvascular and macro vascular complications of diabetic nephropathy we retrospectively reviewed the medical records of all 1,952 type 2 dia-betic patients followed-up at Security Forces Hospital, Riyadh, Saudi Arabia from January 1989 to December 2004. There were 626 (32.1%) patients (294 (47%) were males) who developed diabetic nephropathy. Their mean age was 66.9 + -11.4 years, mean duration of diabetes was 15.4 + -7.5 years, mean age at the onset of nephropathy was 61.5 + - 12.4 years, and mean duration of nephropathy was 3.9 + - 3.8 years. Concomitant diabetic complications included cataract (38.2%), acute coronary syndrome (36.1%), peripheral neuropathy (24.9%), myocardial infarction (24.1%), background retinopathy (22.4%), stroke (17.6%), proliferative retinopathy (11.7%), foot infection (7.3%), limb amputation (3.7%) and blindness (3%). Hypertension was documented in 577 (92.2%) patients, dyslipidemia in 266 (42.5%) and mortality from all causes in 86 (13.7%). There were 148 (23.6%) patients with one complication, 81 (12.9%) with two, 83 (13.3%) with three, and 61 (9.7%) with four or more. Deterioration of glomerular filtration rate was observed in 464 (74%) patients and doubling of serum creatinine in 250 (39.9%), while 95 (15.2%) developed end-stage renal disease (ESRD) at the end of study and 79 (12.6%) required dialysis. Complications were significantly more prevalent among males with greater number reaching ESRD level than females (P< 0.05). Relative risks of developing complications were significant after the onset of nephropathy; ACS (1.41), MI (1.49), stroke (1.48), diabetic foot (1.6), amputation (1.58) and death (1.93). We conclude that complications of diabetes are aggressive and progressive including high prevalence of diabetic nephropathy. Careful monitoring and proper institution of management protocols should be implemented to identify diabetic patients at high risk for complications and mitigate

  1. Literature Review on Cyber Security Investment Decisions

    OpenAIRE

    ŞENTÜRK, Hakan; ÇİL, Celal Zaim; SAĞIROĞLU, Şeref

    2016-01-01

    Severe financial losses incurred by cyber security attacks with increasing complexity and frequency, as well as booming cyber security sector offering variety of products as investment options have led the focus of the research in the field to the economic dimension of cyber security. The need for determination of methods to be used when making cyber security investment decisions under budget constraints have become prominent. In five sections as the cyber security investment strategies, risk...

  2. Scaling up: Assessing social impacts at the macro-scale

    International Nuclear Information System (INIS)

    Schirmer, Jacki

    2011-01-01

    Social impacts occur at various scales, from the micro-scale of the individual to the macro-scale of the community. Identifying the macro-scale social changes that results from an impacting event is a common goal of social impact assessment (SIA), but is challenging as multiple factors simultaneously influence social trends at any given time, and there are usually only a small number of cases available for examination. While some methods have been proposed for establishing the contribution of an impacting event to macro-scale social change, they remain relatively untested. This paper critically reviews methods recommended to assess macro-scale social impacts, and proposes and demonstrates a new approach. The 'scaling up' method involves developing a chain of logic linking change at the individual/site scale to the community scale. It enables a more problematised assessment of the likely contribution of an impacting event to macro-scale social change than previous approaches. The use of this approach in a recent study of change in dairy farming in south east Australia is described.

  3. Three hitherto unreported macro-fungi from Kashmir Himalaya

    International Nuclear Information System (INIS)

    Pala, S.A.; Wana, A.H.; Boda, R.H.

    2012-01-01

    The Himalayan state, Jammu and Kashmir due to its climate ranging from tropical deciduous forests to temperate and coniferous forests provides congenial habitat for the growth of diverse macro fungal species which in turn gives it the status of 'hub' of macro-fungal species. The macro fungal species richness of the state is directly related to its expansive forest communities and diverse weather patterns, but all the regions of the state have not been extensively surveyed till now. In this backdrop, a systematic survey for exploration and inventorization of macro fungal species of Western Kashmir Himalaya was undertaken during the year 2009 and 2010, which in turn resulted identification of the three species viz., Thelephora caryophyllea (Schaeff.) Pers., Coltricia cinnamomea (Pers.) Murr., and Guepinia helvelloides Fr. as new reports from the Kashmir. These species were identified on the basis of macro and microscopic characters and also the aid of taxonomic keys, field manuals, mushroom herbaria and help from expert taxonomists in the related field was taken into account. (author)

  4. Characteristics of soil water retention curve at macro-scale

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Scale adaptable hydrological models have attracted more and more attentions in the hydrological modeling research community, and the constitutive relationship at the macro-scale is one of the most important issues, upon which there are not enough research activities yet. Taking the constitutive relationships of soil water movement--soil water retention curve (SWRC) as an example, this study extends the definition of SWRC at the micro-scale to that at the macro-scale, and aided by Monte Carlo method we demonstrate that soil property and the spatial distribution of soil moisture will affect the features of SWRC greatly. Furthermore, we assume that the spatial distribution of soil moisture is the result of self-organization of climate, soil, ground water and soil water movement under the specific boundary conditions, and we also carry out numerical experiments of soil water movement at the vertical direction in order to explore the relationship between SWRC at the macro-scale and the combinations of climate, soil, and groundwater. The results show that SWRCs at the macro-scale and micro-scale presents totally different features, e.g., the essential hysteresis phenomenon which is exaggerated with increasing aridity index and rising groundwater table. Soil property plays an important role in the shape of SWRC which will even lead to a rectangular shape under drier conditions, and power function form of SWRC widely adopted in hydrological model might be revised for most situations at the macro-scale.

  5. Railway infrastructure security

    CERN Document Server

    Sforza, Antonio; Vittorini, Valeria; Pragliola, Concetta

    2015-01-01

    This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railway infrastructure security. Based on analyses by academics, technology providers, and railway operators, it explains how to assess terrorist and criminal threats, design countermeasures, and implement effective security strategies. In so doing, it draws upon a range of experiences from different countries in Europe and beyond. The book is the first to be devoted entirely to this subject. It will serve as a timely reminder of the attractiveness of the railway infrastructure system as a target for criminals and terrorists and, more importantly, as a valuable resource for stakeholders and professionals in the railway security field aiming to develop effective security based on a mix of methodological, technological, and organizational tools. Besides researchers and decision makers in the field, the book will appeal to students interested in critical infrastructur...

  6. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    accompany the drawing up of a new security strategy for the country. A step in the right direction would be if, after public debate, the Government submitted a new version of the country’s security strategy for consideration and approval to the Parliament as the supreme representative body. The new strategy would thus be assigned greater importance than that of 2003 which was adopted only by the Government and, as a result, was often denied the status of a binding document. A broader public debate over the new security strategy would help ensure that the extended concept of security is more fully implemented in practice.

  7. Collaboration potentials in micro and macro politics of audience creativity

    DEFF Research Database (Denmark)

    Brites, Maria José; Chimirri, Niklas Alexander; Amaral, Inês

    2017-01-01

    In our stakeholder consultation following up on trends concerning the micro and macropolitics of audience action, we explore the potential impact of audiences’ micro-participation and connection to macro-actions. We address this issue taking into consideration intrinsic continuities and discontin...... and discontinuities between academia and the stakeholders’ perspectives. Our findings continue to emphasise the • (dis)connections between micro and macro actions • a technological appeal for action • collaboration potentials between academia and other stakeholders.......In our stakeholder consultation following up on trends concerning the micro and macropolitics of audience action, we explore the potential impact of audiences’ micro-participation and connection to macro-actions. We address this issue taking into consideration intrinsic continuities...

  8. MORTRAN-2, FORTRAN Language Extension with User-Supplied Macros

    International Nuclear Information System (INIS)

    Cook, A. James; Shustek, L.J.

    1980-01-01

    1 - Description of problem or function: MORTRAN2 is a FORTRAN language extension that permits a relatively easy transition from FORTRAN to a more convenient and structured language. Its features include free-field format; alphanumeric statement labels; flexible comment convention; nested block structure; for-by-to, do, while, until, loop, if-then-else, if-else, exit, and next statements; multiple assignment statements; conditional compilation; and automatic listing indentation. The language is implemented by a macro-based pre-processor and is further extensible by user-defined macros. 2 - Method of solution: The MORTRAN2 pre-processor may be regarded as a compiler whose object code is ANSI Standard FORTRAN. The MORTRAN2 language is dynamically defined by macros which are input at each use of the pre-processor. 3 - Restrictions on the complexity of the problem: The pre-processor output must be accepted by a FORTRAN compiler

  9. Ordered macro-microporous metal-organic framework single crystals

    Science.gov (United States)

    Shen, Kui; Zhang, Lei; Chen, Xiaodong; Liu, Lingmei; Zhang, Daliang; Han, Yu; Chen, Junying; Long, Jilan; Luque, Rafael; Li, Yingwei; Chen, Banglin

    2018-01-01

    We constructed highly oriented and ordered macropores within metal-organic framework (MOF) single crystals, opening up the area of three-dimensional–ordered macro-microporous materials (that is, materials containing both macro- and micropores) in single-crystalline form. Our methodology relies on the strong shaping effects of a polystyrene nanosphere monolith template and a double-solvent–induced heterogeneous nucleation approach. This process synergistically enabled the in situ growth of MOFs within ordered voids, rendering a single crystal with oriented and ordered macro-microporous structure. The improved mass diffusion properties of such hierarchical frameworks, together with their robust single-crystalline nature, endow them with superior catalytic activity and recyclability for bulky-molecule reactions, as compared with conventional, polycrystalline hollow, and disordered macroporous ZIF-8.

  10. Ordered macro-microporous metal-organic framework single crystals

    KAUST Repository

    Shen, Kui

    2018-01-16

    We constructed highly oriented and ordered macropores within metal-organic framework (MOF) single crystals, opening up the area of three-dimensional-ordered macro-microporous materials (that is, materials containing both macro- and micropores) in single-crystalline form. Our methodology relies on the strong shaping effects of a polystyrene nanosphere monolith template and a double-solvent-induced heterogeneous nucleation approach. This process synergistically enabled the in situ growth of MOFs within ordered voids, rendering a single crystal with oriented and ordered macro-microporous structure. The improved mass diffusion properties of such hierarchical frameworks, together with their robust single-crystalline nature, endow them with superior catalytic activity and recyclability for bulky-molecule reactions, as compared with conventional, polycrystalline hollow, and disordered macroporous ZIF-8.

  11. Ordered macro-microporous metal-organic framework single crystals

    KAUST Repository

    Shen, Kui; Zhang, Lei; Chen, Xiaodong; Liu, Lingmei; Zhang, Daliang; Han, Yu; Chen, Junying; Long, Jilan; Luque, Rafael; Li, Yingwei; Chen, Banglin

    2018-01-01

    We constructed highly oriented and ordered macropores within metal-organic framework (MOF) single crystals, opening up the area of three-dimensional-ordered macro-microporous materials (that is, materials containing both macro- and micropores) in single-crystalline form. Our methodology relies on the strong shaping effects of a polystyrene nanosphere monolith template and a double-solvent-induced heterogeneous nucleation approach. This process synergistically enabled the in situ growth of MOFs within ordered voids, rendering a single crystal with oriented and ordered macro-microporous structure. The improved mass diffusion properties of such hierarchical frameworks, together with their robust single-crystalline nature, endow them with superior catalytic activity and recyclability for bulky-molecule reactions, as compared with conventional, polycrystalline hollow, and disordered macroporous ZIF-8.

  12. Cyber security in digitalized nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, Kwang Young; Yi, Woo June [KoRTS Co., Ltd., Daejeon (Korea, Republic of)

    2008-10-15

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully.

  13. Cyber security in digitalized nuclear power plants

    International Nuclear Information System (INIS)

    Sohn, Kwang Young; Yi, Woo June

    2008-01-01

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully

  14. Micro and Macro Segregation in Alloys Solidifying with Equiaxed Morphology

    Science.gov (United States)

    Stefanescu, Doru M.; Curreri, Peter A.; Leon-Torres, Jose; Sen, Subhayu

    1996-01-01

    To understand macro segregation formation in Al-Cu alloys, experiments were run under terrestrial gravity (1g) and under low gravity during parabolic flights (10(exp -2) g). Alloys of two different compositions (2% and 5% Cu) were solidified at two different cooling rates. Systematic microscopic and SEM observations produced microstructural and segregation maps for all samples. These maps may be used as benchmark experiments for validation of microstructure evolution and segregation models. As expected, the macro segregation maps are very complex. When segregation was measured along the central axis of the sample, the highest macro segregation for samples solidified at 1g was obtained for the lowest cooling rate. This behavior is attributed to the longer time available for natural convection and shrinkage flow to affect solute redistribution. In samples solidified under low-g, the highest macro-segregation was obtained at the highest cooling rate. In general, low-gravity solidification resulted in less segregation. To explain the experimental findings, an analytical (Flemings-Nereo) and a numerical model were used. For the numerical model, the continuum formulation was employed to describe the macroscopic transports of mass, energy, and momentum, associated with the microscopic transport phenomena, for a two-phase system. The model proposed considers that liquid flow is driven by thermal and solutal buoyancy, and by solidification shrinkage. The Flemings-Nereo model explains well macro segregation in the initial stages of low-gravity segregation. The numerical model can describe the complex macro segregation pattern and the differences between low- and high-gravity solidification.

  15. Macro-Micro Simulation for Polymer Crystallization in Couette Flow

    Directory of Open Access Journals (Sweden)

    Chunlei Ruan

    2017-12-01

    Full Text Available Polymer crystallization in manufacturing is a process where quiescent crystallization and flow-induced crystallization coexists, and heat/mass transfer on a macroscopic level interacts with crystal morphology evolution on a microscopic level. Previous numerical studies on polymer crystallization are mostly concentrated at a single scale; they only calculate macroscale parameters, e.g., temperature and relative crystallinity, or they only predict microstructure details, e.g., crystal morphology and mean size of crystals. The multi-scale numerical works that overcome these disadvantages are unfortunately based on quiescent crystallization, in which flow effects are neglected. The objective of this work is to build up a macro-micro model and a macro-micro algorithm to consider both the thermal and flow effects on the crystallization. Our macro-micro model couples two parts: mass and heat transfer of polymeric flow at the macroscopic level, and nucleation and growth of spherulites and shish-kebabs at the microscopic level. Our macro-micro algorithm is a hybrid finite volume/Monte Carlo method, in which the finite volume method is used at the macroscopic level to calculate the flow and temperature fields, while the Monte Carlo method is used at the microscopic level to capture the development of spherulites and shish-kebabs. The macro-micro model and the macro-micro algorithm are applied to simulate polymer crystallization in Couette flow. The effects of shear rate, shear time, and wall temperature on the crystal morphology and crystallization kinetics are also discussed.

  16. Regulator Interface Strategies Implemented at the Y-12 National Security Complex Old Salvage Yard Soils Remediation Project, Oak Ridge, TN - 12162

    Energy Technology Data Exchange (ETDEWEB)

    Albrecht, Linda [Alliant Corporation (United States); Wilkerson, Laura; Skinner, Ralph [US DOE-ORO EM (United States); Birchfield, Joseph W. III [Link Technologies (United States)

    2012-07-01

    The Oak Ridge Y-12 National Security Complex housed an area known as the Old Salvage Yard (OSY) that was approximately 7 acres. The OSY was used as an area for the accumulation, processing and storage of scrap metal and equipment from Y-12 operations extending from 1968 until 2009. Areas in the northern sections of OSY also have been used for the storage of used oils containing solvents and the accumulation and recycling or de-heading and crushing of 55-gal metal drums. Scrap metal operations historically involved the accumulation, sorting, storage, public sale or disposal of scrap metal and equipment. Non-containerised storage of scrap metal was routine until 1995 when scrap metal received at OSY was placed in B-24 and B-25 boxes. Under the American Recovery and Reinvestment Act (ARRA), approximately 26,759 cubic meters of scrap metal and debris were removed and disposed at both on and off-site disposal facilities including the on-site, Oak Ridge Comprehensive Environmental Response, Compensation and Liability Act (CERCLA) landfill in 2010 and 2011. This removal action was performed in accordance with a CERCLA Record of Decision (ROD) and a close working relationship with both the U.S. Environmental Protection Agency (EPA) Region IV and Tennessee Department of Environment and Conservation (TDEC). Due to efficiencies and the excellent cooperative relationship forged with EPA Region IV and TDEC for Y-12 ARRA Cleanup Projects, a surplus of funding was available for additional remediation work that was completed in fiscal year (FY) 2011. The underlying OSY soils were targeted for characterization and potential remediation. To expedite these important activities, the U.S. Department of Energy Oak Ridge Environmental Management partnered with the regulators during detailed planning sessions through a variety of means to quickly and efficiently characterize and pinpoint areas requiring remediation according to previous ROD commitments. Data Quality Objectives (DQOs

  17. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  18. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  19. El debate micro-macro: dilemas y contextos

    Directory of Open Access Journals (Sweden)

    Vania Salles

    2001-06-01

    Full Text Available This paper discusses the general terms of the sociological debate on the micro macro question. Not only the main trends organizing the debate are examined, but also some ways to solve the dichotomies present in some proposals. It is held that contemporary theoretical practice produces —after the classics and with different focuses— a reflexivecorpus and research practices rooted in the blurring of the micro macro as polar questions, by the way of offering integrating proposals and overcoming reducing positions.

  20. The National Military Strategy of the United States of America 2015: The United States Military’s Contribution to National Security

    Science.gov (United States)

    2015-06-01

    are amplified by shifting demographics. Youth populations are rapidly growing in Africa and the Middle East, regions that face resource shortages...fear in opponents and generate support for their causes. They use improvised explosive devices (IED), suicide vests, and tailored cyber tools to...our security relationship with India and build upon our partnerships with New Zealand, Singapore, Indonesia, Malaysia , Vietnam, and Bangladesh. Such

  1. Considerations to Enhance the Florida Domestic Security Strategic Plan

    Science.gov (United States)

    2011-03-01

    security strategies. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION ...Thank you all. xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION A. PROBLEM STATEMENT After the terrorist attacks of September 11, 2001...State Homeland Security Strategy (Nebraska Emergency Mangement Agency, 2009) • Vermont Homeland Security Strategy (Vermont Department of Public

  2. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  3. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  4. The Water Security Hydra

    Science.gov (United States)

    Lall, U.

    2017-12-01

    As the editor of a new journal on water security, I have been pondering what it can mean theoretically and practically. At one level, it is pretty aobvious that it refers to the ability to affordably and reliably access water of appropriate quality, and to be protected from the water related ravages of nature, such as floods, droughts and water borne disease. The concept of water security can apply to a family, a company, a state or globally. Of course, since we value the environment, water security embraces the needs of the environment. Where, we consider economic development or energy production, water security also emerges as a critical factor. So, in short it touches almost all things about water that pertain to our lives. New stresses are created by a changing climate, growing populations and an ever changing society, economic activity and environment. Thus, if assuring water security is a goal at any of the scales of interest, many factors need to be considered, and what can really be assured, where and for how long emerges as an interesting question. Local (place, time, individuals, politics) as well as global (climate, economics, hydrology) factors interact to determine outcomes, not all of which are readily mapped in our mathematical or cognitive models to a functional notion of what constitutes security in the face of changing conditions and actors. Further, assurance implies going beyond characterization to developing actions, responses to stressors and risk mitigation strategies. How these perform in the short and long run, and what are the outcomes and strategies for impact mitigation in the event of failure then determines water security. Recognizing that providing assurance of water security has always been the goal of water management, regulation and development, perhaps the challenge is to understand what this means from the perspective of not just the "water managers" but the individuals who are the unwitting beneficiaries, or the instruments for

  5. Potential of dynamic spectrum allocation in LTE macro networks

    NARCIS (Netherlands)

    Hoffmann, H.; Ramachandra, P.; Kovacs, I.Z.; Jorguseski, L.; Gunnarsson, F.; Kurner, T.

    2015-01-01

    In recent years Mobile Network Operators (MNOs) worldwide are extensively deploying LTE networks in different spectrum bands and utilising different bandwidth configurations. Initially, the deployment is coverage oriented with macro cells using the lower LTE spectrum bands. As the offered traffic

  6. Portraying Monsters: Framing School Bullying through a Macro Lens

    Science.gov (United States)

    Horton, Paul

    2016-01-01

    This article critically considers the discourse on school bullying through the conceptual framework of lenses and argues that a macro lens has been utilised by school bullying researchers to bring into focus the characteristics of the individuals involved and the types of actions used. By considering earlier understandings of bullying, the article…

  7. Fertilization of Earth Ponds. III: Effects on Benthic Macro ...

    African Journals Online (AJOL)

    Organic fertilizers in form of cow and chicken manure were applied in oligotrophic or unproductive pond water over a period of one year to stimulate the production of benthic macro invertebrates for the benefit of trout culture, while maintaining adequate water quality. Development of aquatic macrophytes during both ...

  8. An Alternative Macro-economic Model for the Classroom

    Science.gov (United States)

    Holmes, Bryan

    1976-01-01

    Presents Michal Kalecki's macro-economic model and two-sector version of the model by Robinson and Eatwell as circular flow diagrams. Advantages of using this approach in first-year undergraduate economics programs are discussed. Available from: General Secretary, Economics Association, Room 340, Hamilton House, Mabledon Place, London WC1H 9BH,…

  9. Macro-Prudential Policies to Mitigate Financial System Vulnerabilities

    NARCIS (Netherlands)

    Claessens, S.; Ghosh, S.R.; Mihet, R.

    2014-01-01

    Macro-prudential policies aimed at mitigating systemic financial risks have become part of the policy toolkit in many emerging markets and some advanced countries. Their effectiveness and efficacy are not well-known, however. Using panel data regressions, we analyze how changes in balance sheets of

  10. Intake of macro- and micronutrients in Danish vegans.

    Science.gov (United States)

    Kristensen, Nadja B; Madsen, Mia L; Hansen, Tue H; Allin, Kristine H; Hoppe, Camilla; Fagt, Sisse; Lausten, Mia S; Gøbel, Rikke J; Vestergaard, Henrik; Hansen, Torben; Pedersen, Oluf

    2015-10-30

    Since information about macro- and micronutrient intake among vegans is limited we aimed to determine and evaluate their dietary and supplementary intake. Seventy 18-61 years old Danish vegans completed a four-day weighed food record from which their daily intake of macro- and micronutrients was assessed and subsequently compared to an age-range-matched group of 1,257 omnivorous individuals from the general Danish population. Moreover, the vegan dietary and supplementary intake was compared to the 2012 Nordic Nutrition Recommendations (NNR). Dietary intake differed significantly between vegans and the general Danish population in all measured macro- and micronutrients (p vegans the intake of macro- and micronutrients (including supplements) did not reach the NNR for protein, vitamin D, iodine and selenium. Among vegan women vitamin A intake also failed to reach the recommendations. With reference to the NNR, the dietary content of added sugar, sodium and fatty acids, including the ratio of PUFA to SFA, was more favorable among vegans. At the macronutrient level, the diet of Danish vegans is in better accordance with the NNR than the diet of the general Danish population. At the micronutrient level, considering both diet and supplements, the vegan diet falls short in certain nutrients, suggesting a need for greater attention toward ensuring recommended daily intake of specific vitamins and minerals.

  11. The Impact of Macro-adjustment Programmes on Housing ...

    African Journals Online (AJOL)

    The Impact of Macro-adjustment Programmes on Housing Investment in Kampala City, Uganda: Shelter Implications for the Urban Poor. ... Eastern Africa Social Science Research Review ... The adjustment methodology has side-lined and gravely undermined the housing sector thereby aggravating the shelter problem.

  12. South African tourism: An historic evaluation of macro tourism policies

    African Journals Online (AJOL)

    ... namely Rugby, Cricket and Soccer, and numerous other sporting, cultural and business events have successfully been hosted in the country. Macro policies governing tourism at the national level have been introduced to stimulate and guide tourism growth in such a way that the public at large can benefit. Furthermore ...

  13. Conceptualizing Educational Leadership: Does Exploring Macro-Level Facets Matters?

    Science.gov (United States)

    Sinha, Chetan

    2013-01-01

    The present review attempts to examine the present status of educational leadership highlighting the role of macro-level facets in Asian Pacific context. The conceptualization of educational leadership among researchers so far had been found to vary according to different contexts and situations. Theoretical perspectives associated with…

  14. Reproductive decision-making in a macro-micro environment

    NARCIS (Netherlands)

    Philipov, D.; Liefbroer, A.C.; Klobas, J.E.

    2015-01-01

    - Takes a new approach to understanding Europe’s fertility gap - Demonstrates how the macro-level environment affects micro-level decision-making - Provides new insights into how people make decisions about having children as well as how policies affect fertility This book provides new insights into

  15. Reproductive Decision-Making in a Macro-Micro Perspective

    NARCIS (Netherlands)

    Philipov, D.; Liefbroer, A.C.; Klobas, J.

    2015-01-01

    This book provides new insights into the significant gap that currently exists between desired and actual fertility in Europe. It examines how people make decisions about having children and demonstrates how the macro-level environment affects micro-level decision-making. Written by an international

  16. Effecting Organizational Change at the Macro Level of Professions

    Science.gov (United States)

    Green, Robert Anthony

    2017-01-01

    Much has been written in academic and popular publications about organizational change. Topics have ranged from case studies to anecdotal stories of how leaders can change an organization. There is little written on changing the culture and vision of a profession at the macro level. This dissertation shows that one key to effecting change within a…

  17. Development of an automated desktop procedure for defining macro ...

    African Journals Online (AJOL)

    methods (Von Neumann mean square error, CUSUM plots or unweighted values and the Worsley Likelihood Ratio Test (WLRT)) were used to define macro-reach breaks for four South African rivers (Crocodile, Olifants, Mhlathuze and Seekoei Rivers) and were compared to ... Water SA Vol.32 (3) 2006: pp.395-402 ...

  18. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  19. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  20. Homeland Security Affairs Journal (press release)

    OpenAIRE

    Naval Postgraduate School (U.S.); Center for Homeland Defense and Security

    2013-01-01

    Homeland Security Affairs (HSA) is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  1. Potential of dynamic spectrum allocation in LTE macro networks

    Science.gov (United States)

    Hoffmann, H.; Ramachandra, P.; Kovács, I. Z.; Jorguseski, L.; Gunnarsson, F.; Kürner, T.

    2015-11-01

    In recent years Mobile Network Operators (MNOs) worldwide are extensively deploying LTE networks in different spectrum bands and utilising different bandwidth configurations. Initially, the deployment is coverage oriented with macro cells using the lower LTE spectrum bands. As the offered traffic (i.e. the requested traffic from the users) increases the LTE deployment evolves with macro cells expanded with additional capacity boosting LTE carriers in higher frequency bands complemented with micro or small cells in traffic hotspot areas. For MNOs it is crucial to use the LTE spectrum assets, as well as the installed network infrastructure, in the most cost efficient way. The dynamic spectrum allocation (DSA) aims at (de)activating the available LTE frequency carriers according to the temporal and spatial traffic variations in order to increase the overall LTE system performance in terms of total network capacity by reducing the interference. This paper evaluates the DSA potential of achieving the envisaged performance improvement and identifying in which system and traffic conditions the DSA should be deployed. A self-optimised network (SON) DSA algorithm is also proposed and evaluated. The evaluations have been carried out in a hexagonal and a realistic site-specific urban macro layout assuming a central traffic hotspot area surrounded with an area of lower traffic with a total size of approximately 8 × 8 km2. The results show that up to 47 % and up to 40 % possible DSA gains are achievable with regards to the carried system load (i.e. used resources) for homogenous traffic distribution with hexagonal layout and for realistic site-specific urban macro layout, respectively. The SON DSA algorithm evaluation in a realistic site-specific urban macro cell deployment scenario including realistic non-uniform spatial traffic distribution shows insignificant cell throughput (i.e. served traffic) performance gains. Nevertheless, in the SON DSA investigations, a gain of up

  2. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  3. Sustainable Energy for All - What does it mean for Water and Food Security : Seeking sustainable development CLEWS: Climate-change, Land-use, Energy and Water (CLEW) Strategies

    OpenAIRE

    Hermann, Sebastian; Howells, Mark; Welsch, Manuel; Rogner, Hans Holger; Steduto, Pasquale; Gielen, Dolf; Roehrl, Alexander; Bazilian, Morgan

    2011-01-01

    This background note serves to inform the “hot topic” session entitled ‘Sustainable Energy for All – What does it mean for Water and Food Security?’.Energy is vital for human development. This is why the United Nations proclaimed 2012 as the ‘International Year of Sustainable Energy for All’. The goal is to ensure universal access to modern energy services by 2030. Today’s energy production, however, is already putting prohibitive strain on the global environment. In support of worldwide effo...

  4. Lecture 3: Web Application Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture focuses on security aspects of Web application development. Various vulnerabilities typical to web applications (such as Cross-site scripting, SQL injection, cross-site request forgery etc.) are introduced and discussed. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support servic...

  5. The characteristic of marketing macro environment of European developing countries and Ukraine for company's marketing activity

    OpenAIRE

    Peresadko, Galina; Bakastov, Ihor

    2013-01-01

    Іn the report the comparative analysis of different European macro-marketing in developing countries and Ukraine. The analysis of the demographic, economic, natural, technological, political and cultural factors. Also the perspectives for Ukraine's marketing macro environment.

  6. [Heavy metal pollution ecology of macro-fungi: research advances and expectation].

    Science.gov (United States)

    Zhou, Qi-xing; An, Xin-long; Wei, Shu-he

    2008-08-01

    Macro-fungi are the main component of biosphere and one of the ecological resources, and play very important roles in matter cycling and in maintaining ecological balances. This paper summarized and reviewed the research advances in the eco-toxicological effects of heavy metals on macro-fungi, the bioaccumulation function of macro-fungi on heavy metals, the ecological adaptation mechanisms of macro-fungi to heavy metal pollution, the role of macro-fungi as a bio-indicator of heavy metal pollution, and the potential of macro-fungi in the ecological remediation of contaminated environment. To strengthen the researches on the heavy metal pollution ecology of macro-fungi would be of practical significance in the reasonable utilization of macro-fungi resources and in the ecological remediation of contaminated environment.

  7. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  8. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  9. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  10. The Potential Use of Agroforestry Community Gardens as a Sustainable Import-Substitution Strategy for Enhancing Food Security in Subarctic Ontario, Canada

    Directory of Open Access Journals (Sweden)

    Maren Oelbermann

    2013-09-01

    Full Text Available The high prevalence of food insecurity experienced by northern First Nations partially results from dependence on an expensive import-based food system that typically lacks nutritional quality and further displaces traditional food systems. In the present study, the feasibility of import substitution by Agroforestry Community Gardens (AFCGs as socio-ecologically and culturally sustainable means of enhancing food security was explored through a case study of Fort Albany First Nation in subarctic Ontario, Canada. Agroforestry is a diverse tree-crop agricultural system that has enhanced food security in the tropics and subtropics. Study sites were selected for long-term agroforestry research to compare Salix spp. (willow-dominated AFCG plots to a “no tree” control plot in Fort Albany. Initial soil and vegetative analysis revealed a high capacity for all sites to support mixed produce with noted modifications, as well as potential competitive and beneficial willow-crop interactions. It is anticipated that inclusion of willow trees will enhance the long-term productive capacity of the AFCG test plots. As an adaptable and dynamic system, AFCGs have potential to act as a more reliable local agrarian system and a refuge for culturally significant plants in high-latitude First Nation socio-ecological systems, which are particularly vulnerable to rapid cultural, climatic, and ecological change.

  11. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  12. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  13. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  14. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  15. A Crude Reality; Exploring the Interdependencies of Energy (Oil), the Macro-Economy, and National Security

    Science.gov (United States)

    2012-04-11

    Policy (SWEEP) optimizing our own natural resources in the near term (oil, natural gas, coal, nuclear, wind, solar, hydro, geothermal and synthetics... geothermal and synthetics), and displaces the oil based economy with a long term energy transformation plan based on renewable energy, is vital to...climb and supply begins to diminish. Global energy demands will continue to rise as the developing economies of countries like Brazil, Russia, China

  16. Institutional diagnostics for African food security

    NARCIS (Netherlands)

    Schouten, Greetje; Vink, Martinus; Vellema, Sietze

    2018-01-01

    Securing access to affordable and nutritious food is an urgent topic on the agenda for development strategies in Africa. Intervention strategies targeting food security triggered a long lasting debate whether science and technology driven interventions could be the panacea for hunger eradication.

  17. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  18. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  19. Personal number Management : personal numbers and identity fraud – number strategies for security and privacy in an information society - part 1

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2002-01-01

    For the sake of clarity and manageability, this article is in the form of a checklist. It will be published in two parts. The first part in this issue presents some practical and juridical characteristics of personal number systems. But at the end of the day, it is the number strategy that

  20. Automation of the Weighting and its Register Using Macros; Automatizacion de la Pesada y su Registro mediante el Uso de Macro-Instrucciones

    Energy Technology Data Exchange (ETDEWEB)

    Gasco, C.; Ampudia, J.

    2005-07-01

    Macros automate a repetitive or complex task that oneself otherwise would have to execute manually. Macros have been implemented (based on Visual Basic Applications) on the laboratory calculation sheets to obtain automatically the weight-registers from the Balances. The combined utilization of the programme Balint (trademark Precisa) and macros has allowed us to transfer in real time the weight data to the sheets and later information storage. The method for using these macros has been summarised in this report. This way of working permits: to register the data of all the laboratory samples and to be available for auditory purposes. (Author) 4 refs.

  1. Clinimetrics and clinical psychometrics: macro- and micro-analysis.

    Science.gov (United States)

    Tomba, Elena; Bech, Per

    2012-01-01

    Clinimetrics was introduced three decades ago to specify the domain of clinical markers in clinical medicine (indexes or rating scales). In this perspective, clinical validity is the platform for selecting the various indexes or rating scales (macro-analysis). Psychometric validation of these indexes or rating scales is the measuring aspect (micro-analysis). Clinical judgment analysis by experienced psychiatrists is included in the macro-analysis and the item response theory models are especially preferred in the micro-analysis when using the total score as a sufficient statistic. Clinical assessment tools covering severity of illness scales, prognostic measures, issues of co-morbidity, longitudinal assessments, recovery, stressors, lifestyle, psychological well-being, and illness behavior have been identified. The constructive dialogue in clinimetrics between clinical judgment and psychometric validation procedures is outlined for generating developments of clinical practice in psychiatry. Copyright © 2012 S. Karger AG, Basel.

  2. Processing and Mechanical Properties of Macro Polyamide Fiber Reinforced Concrete.

    Science.gov (United States)

    Jeon, Joong Kyu; Kim, WooSeok; Jeon, Chan Ki; Kim, Jin Cheol

    2014-11-26

    This study developed a macro-sized polyamide (PA) fiber for concrete reinforcement and investigated the influence of the PA fiber on flexural responses in accordance with ASTM standards. PA fibers are advantageous compared to steel fibers that are corrosive and gravitated. The macro-sized PA fiber significantly improved concrete ductility and toughness. Unlike steel fibers, the PA fibers produced two peak bending strengths. The first-peaks occurred near 0.005 mm of deflection and decreased up to 0.5 mm of deflection. Then the bending strength increased up to second-peaks until the deflections reached between 1.0 and 1.5 mm. The averaged flexural responses revealed that PA fiber content did not significantly influence flexural responses before L /600, but had significant influence thereafter. Toughness performance levels were also determined, and the results indicated more than Level II at L /600 and Level IV at others.

  3. Macro and micro challenges for talent retention in South Africa

    Directory of Open Access Journals (Sweden)

    Berenice Kerr-Phillips

    2009-08-01

    Full Text Available The aim of the study was to explore the challenges presented in retaining South Africa’s talent at both macro (country and micro (organisational levels. Using a web-based survey placed on eight New Zealand sites, the reasons for emigration of South African talent during the period 1994–2006 were explored with 84 respondents. Utilising a purposive sampling technique, 20 semi-structured interviews were undertaken with identified ‘top talent’ in two financial services companies. Content analysis of the responses from both samples was employed. Reasons for emigration (macro issues included uncertainty about the future of the country, job insecurity and fears regarding both corruption and violent crime. Reasons for talent loss amongst identified top talent (micro issues were found to be linked to leadership, organisational culture and employment equity.

  4. Lead macro-encapsulation conceptual and experimental studies

    International Nuclear Information System (INIS)

    Orebaugh, E.G.

    1993-01-01

    Macro-encapsulation, the regulatory treatment for radioactively contaminated lead (mixed) waste has been conceptually and experimentally evaluated for practical application. Epoxy encapsulants molded around lead billets have proven to be exceptionally rugged, easily applied, have high radiation and chemical stability, and minimize required process equipment and production of secondary wastes. This technology can now be considered developed, and can be applied as discussed in this report

  5. %HPGLIMMIX: A High-Performance SAS Macro for GLMM Estimation

    Directory of Open Access Journals (Sweden)

    Liang Xie

    2014-06-01

    Full Text Available Generalized linear mixed models (GLMMs comprise a class of widely used statistical tools for data analysis with fixed and random effects when the response variable has a conditional distribution in the exponential family. GLMM analysis also has a close relationship with actuarial credibility theory. While readily available programs such as the GLIMMIX procedure in SAS and the lme4 package in R are powerful tools for using this class of models, these progarms are not able to handle models with thousands of levels of fixed and random effects. By using sparse-matrix and other high performance techniques, procedures such as HPMIXED in SAS can easily fit models with thousands of factor levels, but only for normally distributed response variables. In this paper, we present the %HPGLIMMIX SAS macro that fits GLMMs with large number of sparsely populated design matrices using the doubly-iterative linearization (pseudo-likelihood method, in which the sparse-matrix-based HPMIXED is used for the inner iterations with the pseudo-variable constructed from the inverse-link function and the chosen model. Although the macro does not have the full functionality of the GLIMMIX procedure, time and memory savings can be large with the new macro. In applications in which design matrices contain many zeros and there are hundreds or thousands of factor levels, models can be fitted without exhausting computer memory, and 90% or better reduction in running time can be observed. Examples with a Poisson, binomial, and gamma conditional distribution are presented to demonstrate the usage and efficiency of this macro.

  6. Macro photography with a tablet: applications on Science Teaching

    OpenAIRE

    Vieira, Leonardo Pereira; Lara, Vitor de Oliveira Moraes

    2013-01-01

    In this work we present a simple way to get Macro photography (enlarged photographs) using a tablet or phone. We initially discuss the technique, which is essentially the accommodation of a drop of water on the camera lens. Next, we explore some applications to science teaching in primary and secondary levels. As discussed in the text, the simplicity and power of the technique may make it a good teaching tool for use in various disciplines such as Science, Biology and Physics.

  7. Wage flexibility in Britain: some micro and macro evidence

    OpenAIRE

    Mark E Schweitzer

    2007-01-01

    This paper uses the British New Earnings Survey (NES) to derive both macro and micro measures of wage rigidities. The data set spans the 1975-2000 period, with wage observations covering approximately 1% of the British workforce. Using this data set, we consider whether wages have become more flexible in recent years. Evidence drawn from macroeconomic wage equation estimates suggests that, while the relationship between wages and unemployment seems to have changed, the responsiveness of wages...

  8. Macro-defect free cements. State of art

    International Nuclear Information System (INIS)

    Holanda, J.N.F.; Povoa, G.E.A.M.; Souza, G.P.; Pinatti, D.G.

    1998-01-01

    The purpose of this work is to prevent a state of art about macro-defect-free cement pastes (MDF cement ) of high mechanical strength. This new type of cement paste is obtained through addition of a water-soluble polymer, followed by intense shear mixing and application of low compacting pressure. It is presented fundamental aspects related to the processing of this MDF paste, as well as its main properties and applications are discussed. (author)

  9. Adsorption of copper onto char derived macro alga, Undaria pinnatifida

    International Nuclear Information System (INIS)

    Cho, Hye Jung; Ko, Jeong Huy; Heo, Hyeon Su; Park, Hye Jin; BAe, Yoon Ju; Kim, Jung Hwan; Park, Young-Kwon

    2010-01-01

    Full text: A release of heavy metals into the environment by industrial activities raises much environmental problems because they tend to remain indefinitely, circulating and eventually accumulating throughout the food chain. Copper is essential to human life and health but, like all heavy metals, is potentially toxic as well. The excessive intakes of copper result in its accumulation in the liver and produce gastrointestinal problems, kidney damage, anemia, and continued inhalation of copper-containing sprays is linked with an increase in lung cancer among exposed people. Consequently, we need to eliminate the copper in drinking water. Also, growth rates of marine macro algae far exceed those of terrestrial biomass, without water limitations, so annual primary production rates are higher for the major marine macro algae than for most terrestrial biomass. According to these reasons, we try to use the macro alga, Undaria pinnatifida. Adsorption of heavy metals is one of the possible technologies involved in the removal of toxic metals from industrial waste streams and mining waste water using low-cost adsorbents. In recent years, many low-cost adsorbents such as seaweeds, activated carbon, etc. have been investigated, but the char by macro alga, Undaria pinnatifida, have not proven to be the most effective and promising substrates. The aim of this study is to remove copper from its aqueous solution by Undaria pinnatifida char for various parameters like pH, contact time, and Cu(II) concentration. The adsorption capacity of Cu(II) by Undaria pinnatifida char was investigated as a function of pH, contact time, and Cu(II) concentration at room temperature. And it was verified using equilibrium studies. (author)

  10. Distributionand Diversity of Macro Algae Communities in the Ambon Bay

    OpenAIRE

    Litaay, Christina

    2014-01-01

    Water conditions affected by natural and anthropogenic parameters such as sedimentation and solid waste disposal can influence the growth and distribution of macro algae. Sustainable management efforts can reduce damage on the Gulf coast of Ambon due to human activities and land clearing. This study was conducted in October 2008 using the transect method with 3 replicates in five locations i.e., Tantui, Air Salobar, Hative Besar, Halong, and Lateri. The interior and exterior waters of Ambon B...

  11. Heralded generation of a micro-macro entangled state

    DEFF Research Database (Denmark)

    Andersen, Ulrik Lund; Neergaard-Nielsen, Jonas Schou

    2013-01-01

    Using different optical setups based on squeezed state and photon subtraction we show how optical entanglement between a macroscopic and a microscopic state-the so-called Schro¨dinger cat state or micro-macro state-can be generated. The entangled state is heralded and is thus produced a priori....... Furthermore, we show that the state can be used to map a microscopic qubit onto a macroscopic one thereby linking a qubit processor with a qumode processor....

  12. The Dialectical Nature of Business Strategy

    DEFF Research Database (Denmark)

    Gjerding, Allan Næs; Rasmussen, Jørgen Gulddahl

    Based on a theoretical overview and empirical observations, the paper discusses a variety of concepts of strategy. The main argument is that even though the concepts of strategy mostly reflect the perception of science at the macro-sociological level, the research field of strategy seems keen on ...... on mixing paradigms. The paper arrives at the argument that contemporary scholarly activities may benefit from viewing strategy as a dialectical phenomenon in terms of a continuous transposition of managerial decision making situations....

  13. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  14. Macro Study of Spatial Development Area on Tourism Village

    Directory of Open Access Journals (Sweden)

    Widhianthini Widhianthini

    2016-10-01

    Full Text Available Macro study is one approach that combines the rational method based on the results of previous studies by the authority with the empirical method utilizing the survey techniques. The purpose of this macro study is to identify and analyze the potentials, problems, and the limiting factors, and the needs of the regency; and to recommend the programs and models required by the community to achieve the sustainable development. This research uses the Participatory Rural Appraisal method, the  interview techniques (Semi Structured Interview, the technique of focused group discussion (FGD, the Rapid District Appraisal (RDA, then it is analyzed by the empirical and dynamical systems. The overview of macro studies is particularly relevant in developing the regions, especially the rural areas, based on the existing advantages, such as in Tabanan Regency. Tabanan Regency is a granary in Bali Province and the zoning of agricultural commodities in quadrant III,which is the rural farming area with combined functions between the cultivated and rural areas supported by the tourism department. The studies of the areas in the form of potential analysis, problem analysis, requirement analysis become the guidelines for preparing the development scenarios and program formats. The studies will then constitute the factors driving the realization of sustainable development of tourism villages in supporting the sustainable agriculture.

  15. Performance Evaluation Of Macro amp Micro Mobility In HMIP Networks

    Directory of Open Access Journals (Sweden)

    Osama Ali Abdelgadir

    2015-08-01

    Full Text Available Abstract Changing the location of mobile node during transmission or receiving of data always caused changing of the address of the mobile node which results in packet loss as well as delay in time taken to locate the new address of the Mobile Node therefore delay of data receiving is caused this problem was known as micro-mobility issue. To resolve this problem and ascurrently mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of mobile IP which supports quality of service minimum packet loss limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of mobile IP and micro mobility protocols where mobile IP handles macro mobility and HMIP cellular IP HAWAII handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed.HIERARCHICAL MICRO MOBILITY PROTOCOL is used. To identify the impact of micro-mobility in IP based Wireless Network to implement selected micro-mobility model of Hierarchal Micro Mobility Protocol in network simulator and for more analysis and measurements results and for the purpose of performance comparison between both Macro and Micro mobility Protocol Management.. Simulation results presented in this paper are based on ns 2

  16. Determinants of The Application of Macro Prudential Instruments

    Directory of Open Access Journals (Sweden)

    Zakaria Firano

    2017-09-01

    Full Text Available The use of macro prudential instruments today gives rise to a major debate within the walls of central banks and other authorities in charge of financial stability. Contrary to micro prudential instruments, whose effects remain limited, macro prudential instruments are different in nature and can affect the stability of the financial system. By influencing the financial cycle and the financial structure of financial institutions, the use of such instruments should be conducted with great vigilance as well as macroeconomic and financial expertise. But the experiences of central banks in this area are sketchy, and only some emerging countries have experience using these types of instruments in different ways. This paper presents an analysis of instruments of macro prudential policy and attempts to empirically demonstrate that these instruments should be used only in specific economic and financial situations. Indeed, the results obtained, using modeling bivariate panel, confirm that these instruments are more effective when used to mitigate the euphoria of financial and economic cycles. In this sense, the output gap, describing the economic cycle, and the Z-score are the intermediate variables for the activation of capital instruments. Moreover, the liquidity ratio and changes in bank profitability are the two early warning indicators for activation of liquidity instruments.

  17. U.S. Strategy for Bioterrorism Emergency Medical Preparedness and Response

    National Research Council Canada - National Science Library

    Lugo, Angel

    2003-01-01

    ... diseases and mass casualty dangers. The 2002 National Strategy for Homeland Security includes numerous emergency preparedness and response initiatives as part of the overall homeland security strategy...

  18. Macro-grazer herbivory regulates seagrass response to pulse and press nutrient loading.

    Science.gov (United States)

    Ravaglioli, Chiara; Capocchi, Antonella; Fontanini, Debora; Mori, Giovanna; Nuccio, Caterina; Bulleri, Fabio

    2018-05-01

    Coastal ecosystems are exposed to multiple stressors. Predicting their outcomes is complicated by variations in their temporal regimes. Here, by means of a 16-month experiment, we investigated tolerance and resistance traits of Posidonia oceanica to herbivore damage under different regimes of nutrient loading. Chronic and pulse nutrient supply were combined with simulated fish herbivory, treated as a pulse stressor. At ambient nutrient levels, P. oceanica could cope with severe herbivory, likely through an increase in photosynthetic activity. Elevated nutrient levels, regardless of the temporal regime, negatively affected plant growth and increased leaf nutritional quality. This ultimately resulted in a reduction of plant biomass that was particularly severe under chronic fertilization. Our results suggest that both chronic and pulse nutrient loadings increase plant palatability to macro-grazers. Strategies for seagrass management should not be exclusively applied in areas exposed to chronic fertilization since even short-term nutrient pulses could alter seagrass meadows. Copyright © 2018 Elsevier Ltd. All rights reserved.

  19. Evaluating the Competitiveness of the Northern and Southern Macro-Regions of Italy

    Directory of Open Access Journals (Sweden)

    Lucia Aquilino

    2016-07-01

    Full Text Available This study uses the Crouch and Ritchie (1999 model of competitiveness to investigate/measure the competitiveness of northern and southern Italian macro-regions. Researching competitive advantages along with identifying strengths/weaknesses represent the objectives of this study. 156 responses were analysed, and findings show that northern regions tend to be more competitive than southern regions. While naturally endowed and created resources represent strengths in both regions, the competitiveness of all the determinant factors included in the tourism development, planning and policy of both tourist destinations are found to be quite inadequate. Moreover, the findings revealed that these mature destinations are experiencing the effects unleashed by a number of trends such as the development of new forms of tourism, the increasing number of tourist arrivals, the growth of the global economy and the sophistication of tourists’ tastes, representing both opportunities and threats that Italian destinations need to consider when planning/developing new strategies.

  20. Assessing the Macro-Level Correlates of Malware Infections Using a Routine Activities Framework.

    Science.gov (United States)

    Holt, Thomas J; Burruss, George W; Bossler, Adam M

    2018-05-01

    The ability to gain unauthorized access to computer systems to engage in espionage and data theft poses a massive threat to individuals worldwide. There has been minimal focus, however, on the role of malicious software, or malware, which can automate this process. This study examined the macro-correlates of malware infection at the national level by using an open repository of known malware infections and utilizing a routine activities framework. Negative inflated binomial models for counts indicated that nations with greater technological infrastructure, more political freedoms, and with less organized crime financial impact were more likely to report malware infections. The number of Computer Emergency Response Teams (CERTs) in a nation was not significantly related with reported malware infection. The implications of the study for the understanding of malware infection, routine activity theory, and target-hardening strategies are discussed.

  1. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  2. IT Convergence and Security 2012

    CERN Document Server

    Chung, Kyung-Yong

    2013-01-01

    The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.

  3. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  4. Triple symmetric key cryptosystem for data security

    Science.gov (United States)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  5. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  6. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  7. A broadened typology on energy and security

    International Nuclear Information System (INIS)

    Johansson, Bengt

    2013-01-01

    A broadened typology describing the interconnection between energy and security is developed in this paper, with the aim of improving understanding of the relationship between energy and security by applying different research and policy perspectives. One approach involves studying energy as an object exposed to security threats, using concepts such as security of supply or security of demand. Another approach involves studying the role of the energy system as the subject in generating or enhancing insecurity. The latter approach includes studying the conflict-generating potential inherent in the economic value of energy, the risk of accidents and antagonistic attacks to energy infrastructure and the security risks related to the negative environmental impact of the energy system. In order to make a comprehensive analysis of the security consequences of proposed energy policies or strategies, all these aspects should be taken into account to varying degrees. The typology proposed here could be a valuable tool for ensuring that all security aspects have been considered. - Highlights: • The paper presents a broadened typology of energy and security, useful for policy analysis. • The energy system can be an object for security threats and as a subject generating or contributing to insecurity. • Energy as an object for security threats includes the concepts of security of supply and security of demand. • The economic value of energy can contribute to insecurity. • Technological and environmental risks of specific energy systems also provide potential threats to human security

  8. The integrated evaluation of the macro environment of companies providing transport services

    Directory of Open Access Journals (Sweden)

    A. Žvirblis

    2008-09-01

    Full Text Available The article presents the main principles of the integrated evaluation of macro environment components and factors influencing the performance of transport companies as well as providing the validated quantitative evaluation models and results obtained in evaluating the macro environment of Lithuanian companies providing transport services. Since quantitative evaluation is growing in importance, the process of developing the principles and methods of business macro environment quantitative evaluation is becoming relevant from both theoretical and practical perspectives. The created methodology is based on the concept of macro environment as an integrated whole of components, formalization and the principle of three-stage quantitative evaluation. The methodology suggested involves the quantitative evaluation of primary factors and macro environment components as an integral dimension (expressed in points. On the basis of this principle, an integrated macro environment evaluation parameter is established as its level index. The methodology integrates the identification of significant factors, building scenarios, a primary analysis of factors, expert evaluation, the quantitative evaluation of macro environment components and their whole. The application of the multi-criteria Simple Additive Weighting (SAW method is validated. The integrated evaluation of the macro environment of Lithuanian freight transportation companies was conducted. As a result, the level indices of all components as well as the level index of macro environment considered as a whole of components were identified. The latter reflects the extent of deviation from an average level of a favourable macro environment. This is important for developing strategic marketing decisions and expanding a strategic area.

  9. Linking ground motion measurements and macro-seismic observations in France: A case study based on the RAP (accelerometric) and BCSF (macro-seismic) databases

    International Nuclear Information System (INIS)

    Lesueur, Ch.

    2011-01-01

    Comparison between accelerometric and macro-seismic observations is made for three mw∼4.5 earthquakes of eastern France between 2003 and 2005. Scalar and spectral instrumental parameters are processed from the accelerometric data recorded by nine accelerometric stations located between 29 km and 180 km from the epicentres. Macro-seismic data are based on the French internet reports. In addition to the individual macro-seismic intensity, analysis of the internal correlation between the encoded answers highlights four predominant fields of questions, bearing different physical meanings: 1) 'vibratory motions of small objects', 2) 'displacement and fall of objects', 3) 'acoustic noise', and 4) 'personal feelings'. Best correlations between macro-seismic and instrumental observations are obtained when the macro-seismic parameters are averaged over 10 km radius circles around each station. macro-seismic intensities predicted by published pgv-intensity relationships quite agree with the observed intensities, contrary to those based on pga. The correlations between the macro-seismic and instrumental data, for intensities between ii and v (ems-98), show that pgv is the instrumental parameter presenting the best correlation with all macro-seismic parameters. The correlation with response spectra, exhibits clear frequency dependence over a limited frequency range [0.5-33 hz]. Horizontal and vertical components are significantly correlated with macro-seismic parameters between 1 and 10 hz, a range corresponding to both natural frequencies of most buildings and high energy content in the seismic ground motion. Between 10 and 25 hz, a clear lack of correlation between macro-seismic and instrumental data is observed, while beyond 25 hz the correlation coefficient increases, approaching that of the PGA correlation level. (author)

  10. Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers

    OpenAIRE

    2012-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Te...

  11. Bioelectronic platforms for optimal bio-anode of bio-electrochemical systems: From nano- to macro scopes.

    Science.gov (United States)

    Kim, Bongkyu; An, Junyeong; Fapyane, Deby; Chang, In Seop

    2015-11-01

    The current trend of bio-electrochemical systems is to improve strategies related to their applicability and potential for scaling-up. To date, literature has suggested strategies, but the proposal of correlations between each research field remains insufficient. This review paper provides a correlation based on platform techniques, referred to as bio-electronics platforms (BEPs). These BEPs consist of three platforms divided by scope scale: nano-, micro-, and macro-BEPs. In the nano-BEP, several types of electron transfer mechanisms used by electrochemically active bacteria are discussed. In the micro-BEP, factors affecting the formation of conductive biofilms and transport of electrons in the conductive biofilm are investigated. In the macro-BEP, electrodes and separators in bio-anode are debated in terms of real applications, and a scale-up strategy is discussed. Overall, the challenges of each BEP are highlighted, and potential solutions are suggested. In addition, future research directions are provided and research ideas proposed to develop research interest. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  13. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  14. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  15. Search for stellar gravitational collapses with the MACRO detector

    CERN Document Server

    Ambrosio, M; Baldini, A; Barbarino, G C; Barish, B C; Battistoni, G; Bellotti, R; Bemporad, C; Bernardini, P; Bilokon, H; Bloise, C; Bower, C; Brigida, M; Bussino, S; Cafagna, F; Campana, D; Carboni, M; Cecchini, S; Cei, F; Chiarella, V; Choudhary, B C; Coutu, S; Cozzi, M; De Cataldo, G; De Marzo, C; De Mitri, I; De Vincenzi, M; Dekhissi, H; Derkaoui, J; Di Credico, A; Favuzzi, C; Forti, C; Fusco, P; Giacomelli, G; Giannini, G; Giglietto, N; Giorgini, M; Grassi, M; Grillo, A; Gustavino, C; Habig, A; Hanson, K; Heinz, R; Iarocci, E; Katsavounidis, E; Katsavounidis, I; Kearns, E; Kim, H; Kyriazopoulou, S; Lamanna, E; Lane, C; Levin, D S; Lipari, P; Longley, N P; Longo, M J; Loparco, F; Maaroufi, F; Mancarella, G; Mandrioli, G; Margiotta, A; Marini, A; Martello, D; Marzari-Chiesa, A; Mazziotta, M N; Michael, D G; Monacelli, P; Montaruli, T; Monteno, M; Mufson, S; Musser, J; Nicolò, D; Nolty, R; Orth, C; Osteria, G; Palamara, O; Patera, V; Patrizii, L; Pazzi, R; Peck, C W; Perrone, L; Petrera, S; Popa, V; Raino, J A; Reynoldson, J; Ronga, F; Satriano, C; Scapparone, E; Scholberg, K; Sciubba, A; Sioli, M; Sirri, G; Sitta, M; Spinelli, P; Spinetti, M; Spurio, M; Steinberg, R; Stone, J L; Sulak, L R; Surdo, A; Tarle, G; Togo, V; Vakili, M; Walter, C W; Webb, R; 10.1140/epjc/s2004-01981-3

    2004-01-01

    We present the final results of the search for stellar gravitational collapses obtained by the MACRO experiment. The detector was active for a stellar collapse search for more than 11 years and it was sensitive to collapses occurring all over in our galaxy for 8.6 years. A real time system for a prompt recognition of neutrino bursts was developed and was operating on-line for almost the whole life of the experiment. No signal compatible with a neutrino burst from a galactic supernova was observed.

  16. Graphene macro-assembly-fullerene composite for electrical energy storage

    Science.gov (United States)

    Campbell, Patrick G.; Baumann, Theodore F.; Biener, Juergen; Merrill, Matthew; Montalvo, Elizabeth; Worsley, Marcus A.; Biener, Monika M.; Hernandez, Maira Raquel Ceron

    2018-01-16

    Disclosed here is a method for producing a graphene macro-assembly (GMA)-fullerene composite, comprising providing a GMA comprising a three-dimensional network of graphene sheets crosslinked by covalent carbon bonds, and incorporating at least 20 wt. % of at least one fullerene compound into the GMA based on the initial weight of the GMA to obtain a GMA-fullerene composite. Also described are a GMA-fullerene composite produced, an electrode comprising the GMA-fullerene composite, and a supercapacitor comprising the electrode and optionally an organic or ionic liquid electrolyte in contact with the electrode.

  17. The role of money in modern macro models

    OpenAIRE

    Seitz, Franz; Schmidt, Markus A.

    2013-01-01

    This paper is the starting point of a series of analyses aiming at re-discovering the role of money for monetary policy purposes. It provides an overview of the role of money in modern macro models. In particular, we are focussing on New Keynesian and New Monetarist models to investigate their main findings and most significant shortcomings in considering money properly. As a further step, we ask about the role of financial intermediaries in this respect. In dealing with these issues, we dist...

  18. Macro- to microscale heat transfer the lagging behavior

    CERN Document Server

    Tzou, D Y

    2014-01-01

    Physical processes taking place in micro/nanoscale strongly depend on the material types and can be very complicated. Known approaches include kinetic theory and quantum mechanics, non-equilibrium and irreversible thermodynamics, molecular dynamics, and/or fractal theory and fraction model. Due to innately different physical bases employed, different approaches may involve different physical properties in describing micro/nanoscale heat transport. In addition, the parameters involved in different approaches, may not be mutually inclusive. Macro- to Microscale Heat Transfer: The Lagging Behav

  19. Interaction of Macro-particles with LHC proton beam

    CERN Document Server

    Zimmermann, F; Xagkoni, A

    2010-01-01

    We study the interaction of macro-particles residing inside the LHC vacuum chamber, e.g. soot or thermalinsulation fragments, with the circulating LHC proton beam. The coupled equations governing the motion and charging rate of metallic or dielectric micron-size macroparticles are solved numerically to determine the time spent by such “dust” particles close to the path of the beam as well as the resulting proton-beam losses, which could lead to a quench of superconducting magnets and, thereby, to a premature beam abort.

  20. Predicting Bond Betas using Macro-Finance Variables

    DEFF Research Database (Denmark)

    Aslanidis, Nektarios; Christiansen, Charlotte; Cipollini, Andrea

    We conduct in-sample and out-of-sample forecasting using the new approach of combining explanatory variables through complete subset regressions (CSR). We predict bond CAPM betas and bond returns conditioning on various macro-fi…nance variables. We explore differences across long-term government ...... bonds, investment grade corporate bonds, and high-yield corporate bonds. The CSR method performs well in predicting bond betas, especially in-sample, and, mainly high-yield bond betas when the focus is out-of-sample. Bond returns are less predictable than bond betas....

  1. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  2. Natural Resources Management for Sustainable Food Security in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Natural Resources Management for Sustainable Food Security in the Sahel ... as well as strategies for managing the resource base with a view to improving food security. ... InnoVet-AMR grants to support development of innovative veterinary ...

  3. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  4. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  5. INL Vision and Strategy 2015

    International Nuclear Information System (INIS)

    Pillai, Rekha Sukamar

    2015-01-01

    This Laboratory vision and strategy presents INL's vision and strategy for the Laboratory and is our introduction to a special place dedicated to improving our nation's energy security future.

  6. The asymmetric effect of coal price on the China's macro economy using NARDL model

    Science.gov (United States)

    Hou, J. C.; Yang, M. C.

    2016-08-01

    The present work endeavors to explore the asymmetric effect of coal price on the China's macro economy by applying nonlinear autoregressive distributed lag (NARDL) model for the period of January 2005 to June 2015. The obtained results indicate that the coal price has a strong asymmetric effect on China's macro economy in the long-run. Namely one percent increase in coal price leads to 0.6194 percent of the China's macro economy increase; and while the coal price is reduces by 1 percent, the China's macro economy will decrease by 0.008 percent. These data indicate that when coal price rises, the effect on China's macro economy is far greater than the price decline. In the short-run, coal price fluctuation has a positive effect on the China's macro economy.

  7. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  8. Flexibility and security for older workers: HRM-arrangements in four European countries

    NARCIS (Netherlands)

    Tros, F.

    2010-01-01

    National policies in the Netherlands, Denmark, Germany and Belgium show policy shifts towards active ageing and towards flexicurity to enhance flexibility and security in the labour market. The main question is about the practice and implementation of these macro policies on the workplace level.

  9. Simplified Threshold RSA with Adaptive and Proactive Security

    DEFF Research Database (Denmark)

    Almansa Guerra, Jesus Fernando; Damgård, Ivan Bjerre; Nielsen, Jesper Buus

    2006-01-01

    We present the currently simplest, most efficient, optimally resilient, adaptively secure, and proactive threshold RSA scheme. A main technical contribution is a new rewinding strategy for analysing threshold signature schemes. This new rewinding strategy allows to prove adaptive security...... of a proactive threshold signature scheme which was previously assumed to be only statically secure. As a separate contribution we prove that our protocol is secure in the UC framework....

  10. 76 FR 10529 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From...

    Science.gov (United States)

    2011-02-25

    ... Security Protection From Unauthorized External Access AGENCY: Federal Aviation Administration (FAA), DOT... electronic system security protection for the aircraft control domain and airline information domain from... identified and assessed, and that effective electronic system security protection strategies are implemented...

  11. 76 FR 36863 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From...

    Science.gov (United States)

    2011-06-23

    ... Security Protection From Unauthorized External Access AGENCY: Federal Aviation Administration (FAA), DOT... for Gulfstream GVI airplanes. 1. The applicant must ensure electronic system security protection for... that effective electronic system security protection strategies are implemented to protect the airplane...

  12. Austrian Security Strategy: Need For Reformulation Due To Security Developments

    Science.gov (United States)

    2016-02-14

    accession to the North Atlantic Treaty Organization (NATO) as an option. Under the Austrian Constitution , the federal government wanted to maintain the...the Middle East and Africa completely overwhelmed the police at the border crossing between Austria and Hungary and Slovenia . On 14 September 2015...Hungary, Croatia, and Slovenia .33, 34, 35 At the end of October 2015 refugees broke through the barriers several times at the border crossing point

  13. Effects of macro nutrient concentration on biological N2 fixation by Azotobacter vinelandii ATCC 12837

    International Nuclear Information System (INIS)

    Liew Pauline Woan Ying; Nazalan Najimudin; Jong Bor Chyan; Latiffah Noordin; Khairuddin Abdul Rahim; Amir Hamzah Ahmad Ghazali

    2010-01-01

    The dynamic changes of biological N 2 fixation by Azotobacter vinelandii ATCC 12837 under the influence of various macro nutrients, specifically phosphorus (P) and potassium (K), was investigated. In this attempt, Oryza sativa L. var. MR 219 was used as the model plant. Results obtained showed changes in the biological N 2 fixation activities with different macro nutrient(s) manipulations. The research activity enables optimisation of macro nutrients concentration for optimal/ enhanced biological N 2 fixation by A. vinelandii ATCC 12837. (author)

  14. Search for stellar collapse with the MACRO detector at Gran Sasso

    International Nuclear Information System (INIS)

    1989-01-01

    The first MACRO supermodule commenced data taking in February 1989. Two complementary trigger and readout systems have been used to monitor the horizontal scintillation counters, which contain 42 tonnes (∼1 ktonne for the full MACRO detector) of liquid scintillator, for bursts of low energy anti-neutrinos from gravitational stellar collapses. This paper reports on an initial search and discusses the present as well as ultimate sensitivity of MACRO to this class of events. 4 figs

  15. Muon energy estimate through multiple scattering with the MACRO detector

    Energy Technology Data Exchange (ETDEWEB)

    Ambrosio, M.; Antolini, R.; Auriemma, G.; Bakari, D.; Baldini, A.; Barbarino, G.C.; Barish, B.C.; Battistoni, G.; Becherini, Y.; Bellotti, R.; Bemporad, C.; Bernardini, P.; Bilokon, H.; Bloise, C.; Bower, C.; Brigida, M.; Bussino, S.; Cafagna, F.; Calicchio, M.; Campana, D.; Candela, A.; Carboni, M.; Caruso, R.; Cassese, F.; Cecchini, S.; Cei, F.; Chiarella, V.; Choudhary, B.C.; Coutu, S.; Cozzi, M.; De Cataldo, G.; De Deo, M.; Dekhissi, H.; De Marzo, C.; De Mitri, I.; Derkaoui, J.; De Vincenzi, M.; Di Credico, A.; Dincecco, M.; Erriquez, O.; Favuzzi, C.; Forti, C.; Fusco, P.; Giacomelli, G.; Giannini, G.; Giglietto, N.; Giorgini, M.; Grassi, M.; Gray, L.; Grillo, A.; Guarino, F.; Gustavino, C.; Habig, A.; Hanson, K.; Heinz, R.; Iarocci, E.; Katsavounidis, E.; Katsavounidis, I.; Kearns, E.; Kim, H.; Kyriazopoulou, S.; Lamanna, E.; Lane, C.; Levin, D.S.; Lindozzi, M.; Lipari, P.; Longley, N.P.; Longo, M.J.; Loparco, F.; Maaroufi, F.; Mancarella, G.; Mandrioli, G.; Margiotta, A.; Marini, A.; Martello, D.; Marzari-Chiesa, A.; Mazziotta, M.N.; Michael, D.G.; Monacelli, P.; Montaruli, T.; Monteno, M.; Mufson, S.; Musser, J.; Nicolo, D.; Nolty, R.; Orth, C.; Osteria, G.; Palamara, O.; Patera, V.; Patrizii, L.; Pazzi, R.; Peck, C.W.; Perrone, L.; Petrera, S.; Pistilli, P.; Popa, V.; Raino, A.; Reynoldson, J.; Ronga, F.; Rrhioua, A.; Satriano, C.; Scapparone, E. E-mail: eugenio.scapparone@bo.infn.it; Scholberg, K.; Sciubba, A.; Serra, P.; Sioli, M. E-mail: maximiliano.sioli@bo.infn.it; Sirri, G.; Sitta, M.; Spinelli, P.; Spinetti, M.; Spurio, M.; Steinberg, R.; Stone, J.L.; Sulak, L.R.; Surdo, A.; Tarle, G.; Tatananni, E.; Togo, V.; Vakili, M.; Walter, C.W.; Webb, R

    2002-10-21

    Muon energy measurement represents an important issue for any experiment addressing neutrino-induced up-going muon studies. Since the neutrino oscillation probability depends on the neutrino energy, a measurement of the muon energy adds an important piece of information concerning the neutrino system. We show in this paper how the MACRO limited streamer tube system can be operated in drift mode by using the TDCs included in the QTPs, an electronics designed for magnetic monopole search. An improvement of the space resolution is obtained, through an analysis of the multiple scattering of muon tracks as they pass through our detector. This information can be used further to obtain an estimate of the energy of muons crossing the detector. Here we present the results of two dedicated tests, performed at CERN PS-T9 and SPS-X7 beam lines, to provide a full check of the electronics and to exploit the feasibility of such a multiple scattering analysis. We show that by using a neural network approach, we are able to reconstruct the muon energy for E{sub {mu}}<40 GeV. The test beam data provide an absolute energy calibration, which allows us to apply this method to MACRO data.

  16. Anti-Phytopathogenic Activities of Macro-Algae Extracts

    Directory of Open Access Journals (Sweden)

    Ingrid Ramírez

    2011-05-01

    Full Text Available Aqueous and ethanolic extracts obtained from nine Chilean marine macro-algae collected at different seasons were examined in vitro and in vivo for properties that reduce the growth of plant pathogens or decrease the injury severity of plant foliar tissues following pathogen infection. Particular crude aqueous or organic extracts showed effects on the growth of pathogenic bacteria whereas others displayed important effects against pathogenic fungi or viruses, either by inhibiting fungal mycelia growth or by reducing the disease symptoms in leaves caused by pathogen challenge. Organic extracts obtained from the brown-alga Lessonia trabeculata inhibited bacterial growth and reduced both the number and size of the necrotic lesion in tomato leaves following infection with Botrytis cinerea. Aqueous and ethanolic extracts from the red-alga Gracillaria chilensis prevent the growth of Phytophthora cinnamomi, showing a response which depends on doses and collecting-time. Similarly, aqueous and ethanolic extracts from the brown-alga Durvillaea antarctica were able to diminish the damage caused by tobacco mosaic virus (TMV in tobacco leaves, and the aqueous procedure is, in addition, more effective and seasonally independent. These results suggest that macro-algae contain compounds with different chemical properties which could be considered for controlling specific plant pathogens.

  17. From micro-correlations to macro-correlations

    International Nuclear Information System (INIS)

    Eliazar, Iddo

    2016-01-01

    Random vectors with a symmetric correlation structure share a common value of pair-wise correlation between their different components. The symmetric correlation structure appears in a multitude of settings, e.g. mixture models. In a mixture model the components of the random vector are drawn independently from a general probability distribution that is determined by an underlying parameter, and the parameter itself is randomized. In this paper we study the overall correlation of high-dimensional random vectors with a symmetric correlation structure. Considering such a random vector, and terming its pair-wise correlation “micro-correlation”, we use an asymptotic analysis to derive the random vector’s “macro-correlation” : a score that takes values in the unit interval, and that quantifies the random vector’s overall correlation. The method of obtaining macro-correlations from micro-correlations is then applied to a diverse collection of frameworks that demonstrate the method’s wide applicability.

  18. The Sensor Web: A Macro-Instrument for Coordinated Sensing

    Directory of Open Access Journals (Sweden)

    Kevin A. Delin

    2002-07-01

    Full Text Available The Sensor Web is a macro-instrument concept that allows for the spatiotemporal understanding of an environment through coordinated efforts between multiple numbers and types of sensing platforms, including both orbital and terrestrial and both fixed and mobile. Each of these platforms, or pods, communicates within their local neighborhood and thus distributes information to the instrument as a whole. Much as intelligence in the brain is a result of the myriad of connections between dendrites, it is anticipated that the Sensor Web will develop a macro-intelligence as a result of its distributed information with the pods reacting and adapting to their environment in a way that is much more than their individual sum. The sharing of data among individual pods will allow for a global perception and purpose of the instrument as a whole. The Sensor Web is to sensors what the Internet is to computers, with different platforms and operating systems communicating via a set of shared, robust protocols. This paper will outline the potential of the Sensor Web concept and describe the Jet Propulsion Laboratory (JPL Sensor Webs Project (http://sensorwebs.jpl.nasa.gov/. In particular, various fielded Sensor Webs will be discussed.

  19. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  20. Impact of Macro Environmental Factors on Garments Industry That Drives Export in Bangladesh

    Directory of Open Access Journals (Sweden)

    Islam Mohammad

    2017-08-01

    Full Text Available It goes without saying that Garments industry of Bangladesh has drawn a special attention to the mass people in the world because of being both cost leader and quality leader at the same time. The purpose of this research paper is to analyze the garments industry in Bangladesh which is going to be an emerging tiger in the world economy. It also aims to assess the impact of macro-environmental factors affecting the industry by PESTEL analysis. Again, five forces model has been analyzed to assess the impacts of competitive external factors on the Garments industry in Bangladesh. Furthermore, Garments sector competitive responses to the primary issues affecting the industry have been evaluated here. It also outlines the primary external influences to which this industry is subject. In this case, SWOT analysis has been conducted to assess the competitive position of this industry in comparison with the global perspective. The study suggests that total export is highly correlated with the exports of garments. It also finds that there is severe lacking in the safety and security compliance, wages and compensations and code of conduct of the current organizations. Moreover, GSP facility withdrawn can impact severely on the ready made garments of Bangladesh to compete with price in the international market with China, India and Vietnam etc. The ready made garments sector of Bangladesh is enjoying cost leadership as a source of completive advantage because of cheap labor. Finally, the study would like to recommend for further improvement of garment sector in Bangladesh.

  1. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  2. A SAS-macro for estimation of the cumulative incidence using Poisson regression

    DEFF Research Database (Denmark)

    Waltoft, Berit Lindum

    2009-01-01

    the hazard rates, and the hazard rates are often estimated by the Cox regression. This procedure may not be suitable for large studies due to limited computer resources. Instead one uses Poisson regression, which approximates the Cox regression. Rosthøj et al. presented a SAS-macro for the estimation...... of the cumulative incidences based on the Cox regression. I present the functional form of the probabilities and variances when using piecewise constant hazard rates and a SAS-macro for the estimation using Poisson regression. The use of the macro is demonstrated through examples and compared to the macro presented...

  3. Dynamic Resource Partitioning for Downlink Femto-to-Macro-Cell Interference Avoidance

    Directory of Open Access Journals (Sweden)

    Zubin Bharucha

    2010-01-01

    Full Text Available Femto-cells consist of user-deployed Home Evolved NodeBs (HeNBs that promise substantial gains in system spectral efficiency, coverage, and data rates due to an enhanced reuse of radio resources. However, reusing radio resources in an uncoordinated, random fashion introduces potentially destructive interference to the system, both, in the femto and macro layers. An especially critical scenario is a closed-access femto-cell, cochannel deployed with a macro-cell, which imposes strong downlink interference to nearby macro user equipments (UEs that are not permitted to hand over to the femto-cell. In order to maintain reliable service of macro-cells, it is imperative to mitigate the destructive femto-cell to macro-cell interference. The contribution in this paper focuses on mitigating downlink femto-cell to macro-cell interference through dynamic resource partitioning, in the way that HeNBs are denied access to downlink resources that are assigned to macro UEs in their vicinity. By doing so, interference to the most vulnerable macro UEs is effectively controlled at the expense of a modest degradation in femto-cell capacity. The necessary signaling is conveyed through downlink high interference indicator (DL-HII messages over the wired backbone. Extensive system level simulations demonstrate that by using resource partitioning, for a sacrifice of 4% of overall femto downlink capacity, macro UEs exposed to high HeNB interference experience a tenfold boost in capacity.

  4. Multi-scale-nonlinear interactions among macro-MHD mode, micro-turbulence, and zonal flow

    International Nuclear Information System (INIS)

    Ishizawa, Akihiro; Nakajima, Noriyoshi

    2007-01-01

    This is the first numerical simulation demonstrating that macro-magnetohydrodynamic (macro-MHD) mode is exited as a result of multi-scale interaction in a quasi-steady equilibrium formed by a balance between zonal flow and micro-turbulence via reduced-two-fluid simulation. Only after obtaining the equilibrium which includes zonal flow and the turbulence caused by kinetic ballooning mode is this simulation of macro-MHD mode, double tearing mode, accomplished. In the quasi-steady equilibrium a macro-fluctuation which has the same helicity as that of double tearing mode is a part of the turbulence until it grows as a macro-MHD mode finally. When the macro-MHD grows it effectively utilize free energy of equilibrium current density gradient because of positive feedback loop between suppression of zonal flow and growth of the macro-fluctuation causing magnetic reconnection. Thus once the macro-MHD grows from the quasi-equilibrium, it does not go back. This simulation is more comparable with experimental observation of growing macro-fluctuation than traditional MHD simulation of linear instabilities in a static equilibrium. (author)

  5. Secure direct communication based on secret transmitting order of particles

    International Nuclear Information System (INIS)

    Zhu Aidong; Zhang Shou; Xia Yan; Fan Qiubo

    2006-01-01

    We propose the schemes of quantum secure direct communication based on a secret transmitting order of particles. In these protocols, the secret transmitting order of particles ensures the security of communication, and no secret messages are leaked even if the communication is interrupted for security. This strategy of security for communication is also generalized to a quantum dialogue. It not only ensures the unconditional security but also improves the efficiency of communication

  6. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  7. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  8. A Design Methodology for Computer Security Testing

    OpenAIRE

    Ramilli, Marco

    2013-01-01

    The field of "computer security" is often considered something in between Art and Science. This is partly due to the lack of widely agreed and standardized methodologies to evaluate the degree of the security of a system. This dissertation intends to contribute to this area by investigating the most common security testing strategies applied nowadays and by proposing an enhanced methodology that may be effectively applied to different threat scenarios with the same degree of effectiveness. ...

  9. AP1000 Design for Security

    International Nuclear Information System (INIS)

    Long, L.B.; Cummins, W.E.; Winters, J.W.

    2006-01-01

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000

  10. Towards Comprehensive Food Security Measures: Comparing Key ...

    African Journals Online (AJOL)

    Food security is a multi-dimensional issue that has been difficult to measure comprehensively, given the one-dimensional focus of existing indicators. Three indicators dominate the food security measurement debate: Household Food Insecurity Access Scale (HFIAS), Dietary Diversity Score (DDS) and Coping Strategies ...

  11. Social Security and Fighting Poverty in Tunisia

    Directory of Open Access Journals (Sweden)

    Hasna Khemili

    2018-02-01

    Full Text Available The objective of this study was to examine the role of social security in fighting poverty in Metlaoui, Tunisia, using survey data collected between July 2012 and January 2014, covering 200 poor households. We used questionnaire data, which gave a thorough analysis of the reactions, behavior, and strategies adopted by poor households as a result of various forms of risk. Social security has an effect on a number of different areas, including health, education, housing, and income. Our methodology explored both complete and partial risk-sharing, to investigate the impact of social security schemes on the strategies adopted by households to cope with economic shocks. The estimation results of different models showed that social security could help social security-covered households choose less costly strategies to cope with risks. However, the role of social security remains insufficient, given that covered households had less confidence in its services and they adopted strategies of self-insurance or income smoothing. Overall, the results showed that social security plays an important role in Metlaoui, but it remains insufficient, especially for households that are not covered by social security and are suffering from heavy health expenditures.

  12. Privacy and security disclosures on telecardiology websites

    NARCIS (Netherlands)

    Dubbeld, L.

    2006-01-01

    This article discusses telemedicine providers¿ online privacy and security disclosures. It presents the results of an exploratory study of a number of telecardiology companies¿ Web sites, providing insight in some of the current strategies towards data protection and information security in the

  13. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2006-01-01

    ..., %%Strategy for Victory," the Bush Administration indicates that U.S. forces will remain in Iraq until the country is able to provide for its own security and does not serve as a host for radical Islamic terrorists...

  14. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    The Administration is claiming success in reversing the deterioration in security that had become acute by the end of 2006, attributing the gains to a troop surge strategy announced by President Bush on January 10, 2007...

  15. 国家网络安全审查制度的法律困惑与中国策略%Legal puzzlements and the Chinese strategies for the national cyber-security inspection system

    Institute of Scientific and Technical Information of China (English)

    马民虎; 马宁

    2015-01-01

    我国网络安全审查制度存在诸多亟待解答的法律困惑,对于网络安全审查制度本身也存在需要修正的“误读”,为了避免“贸易保护主义”对制度本身正当性造成的减损,应当有针对性地实施中国策略,实现网络安全审查的应然状态,坚持以风险控制为审查目的,以 IT 供应链为审查范围,以立法和标准为审查基础。%Currently,China’s national cyber-security inspection system still has many legal puzzle-ments waiting to be solved urgently,as well as some “misinterpretations”.To avoid the damage to its justification caused by the “trade protectionism”,we should purposely implement the Chinese strate-gies in order to achieve the ideal state for this system with the risk-control as the aim,IT supply chain as the inspection coverage and the legislation and criterion as the basis.

  16. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  17. Homeland Security - Can It be Done?

    Science.gov (United States)

    2003-04-07

    and get past the shenanigans in Congress and implement homeland security strategies.ř The new DHS is scheduled to move 22 federal agencies and...uniform laws to license and regulate certain financial services, since terrorists exploit such services. The strategy also takes care with definitions...initiative from organizations interested in the security of sensitive information, such as financial services, healthcare, and government. 47Joseph R. Barnes

  18. CTTITEM: SAS macro and SPSS syntax for classical item analysis.

    Science.gov (United States)

    Lei, Pui-Wa; Wu, Qiong

    2007-08-01

    This article describes the functions of a SAS macro and an SPSS syntax that produce common statistics for conventional item analysis including Cronbach's alpha, item difficulty index (p-value or item mean), and item discrimination indices (D-index, point biserial and biserial correlations for dichotomous items and item-total correlation for polytomous items). These programs represent an improvement over the existing SAS and SPSS item analysis routines in terms of completeness and user-friendliness. To promote routine evaluations of item qualities in instrument development of any scale, the programs are available at no charge for interested users. The program codes along with a brief user's manual that contains instructions and examples are downloadable from suen.ed.psu.edu/-pwlei/plei.htm.

  19. Atmospheric neutrino-induced muons in the MACRO detector

    CERN Document Server

    Ronga, F

    1999-01-01

    A measurement of the flux of neutrino-induced muons using the MACRO detector is presented. Different event topologies, corresponding to different neutrino parent energies can be detected. The upward throughgoing muon sample is the larger event sample. The observed upward-throughgoing muons are 26% fewer than expected and the zenith angle distribution does not fit with the expected one. Assuming neutrino oscillations, both measurements suggest maximum mixing and Dm2 of a few times 10-3 eV2. The other samples are due to the internally produced events and to upward-going stopping muons. These data show a regular deficit of observed events in each angular bin, as expected assuming neutrino oscillations with maximum mixing, in agreement with the analysis of the upward-throughgoing muon sample.

  20. Macro and Micro Remote Viewing of Objects in Sealed Gloveboxes

    International Nuclear Information System (INIS)

    Heckendorn, F.M.

    2004-01-01

    The Savannah River Site uses sophisticated glovebox facilities to process and analyze material that is radiologically contaminated or that must be protected from contamination by atmospheric gases. The analysis can be visual, non destructive measurement, or destructive measurement, and allows for the gathering of information that would otherwise not be obtainable. Macro and Micro systems that cover a range of 2X to 400X magnifications with a robust system compatible with the harsh glovebox environment were installed. Remote video inspection systems were developed and deployed in Savannah River Site glovebox facilities that provide high quality or mega-pixel quality remote views, for remote inspections. The specialized video systems that are the subject of this report exhibited specialized field application of remote video/viewing techniques by expanding remote viewing to high and very high quality viewing in gloveboxes. This technological enhancement will allow the gathering of precision information that is otherwise not available

  1. Explanatory IRT Analysis Using the SPIRIT Macro in SPSS

    Directory of Open Access Journals (Sweden)

    DiTrapani, Jack

    2018-04-01

    Full Text Available Item Response Theory (IRT is a modeling framework that can be applied to a large variety of research questions spanning several disciplines. To make IRT models more accessible for the general researcher, a free tool has been created that can easily conduct one-parameter logistic IRT (1PL analyses using the convenient point-and-click interface in SPSS without any required downloads or add-ons. This tool, the SPIRIT macro, can fit 1PL models with person and item covariates, DIF analyses, multidimensional models, multigroup models, rating scale models, and several other variations. Example explanatory models are presented with an applied dataset containing responses to an ADHD rating scale. Illustrations of how to fit basic 1PL models as well as two more complicated analyses using SPIRIT are given.

  2. Respiratory monitoring system based on fiber optic macro bending

    Science.gov (United States)

    Purnamaningsih, Retno Wigajatri; Widyakinanti, Astari; Dhia, Arika; Gumelar, Muhammad Raditya; Widianto, Arif; Randy, Muhammad; Soedibyo, Harry

    2018-02-01

    We proposed a respiratory monitoring system for living activities in human body based on fiber optic macro-bending for laboratory scale. The respiration sensor consists of a single-mode optical fiber and operating on a wavelength at around 1550 nm. The fiber optic was integrated into an elastic fabric placed on the chest and stomach of the monitored human subject. Deformations of the flexible textile involving deformations of the fiber optic bending curvature, which was proportional to the chest and stomach expansion. The deformation of the fiber was detected using photodetector and processed using microcontroller PIC18F14K50. The results showed that this system able to display various respiration pattern and rate for sleeping, and after walking and running activities in real time.

  3. Search for lightly ionizing particles with the MACRO detector

    CERN Document Server

    Ambrosio, M; Auriemma, G; Bakari, D; Baldini, A; Barbarino, G C; Barish, B C; Battistoni, G; Bellotti, R; Bemporad, C; Bernardini, P; Bilokon, H; Bisi, V; Bloise, C; Bower, C; Brigida, M; Bussino, S; Cafagna, F; Calicchio, M; Campana, D; Carboni, M; Cecchini, S; Cei, F; Chiarella, V; Choudhary, B C; Coutu, S; De Cataldo, M A A; Dekhissi, H; De Marzo, C; De Mitri, I; Derkaoui, J E; De Vincenzi, M; Di Credico, A; Erriquez, O; Favuzzi, C; Forti, C; Fusco, P; Giacomelli, G; Giannini, G; Giglietto, N; Giorgini, M; Grassi, M; Gray, L; Grillo, A; Guarino, F; Gustavino, C; Habig, A; Hanson, K; Heinz, R; Iarocci, Enzo; Katsavounidis, E; Katsavounidis, I; Kearns, E T; Kim, H; Kyriazopoulou, S; Lamanna, E; Lane, C; Levin, D S; Lipari, P; Longley, N P; Longo, M J; Loparco, F; Maaroufi, F; Mancarella, G; Mandrioli, G; Margiotta, A; Marini, A; Martello, D; Marzari-Chiesa, A; Mazziotta, M N; Michael, D G; Mikheyev, S P; Miller, L; Monacelli, P; Montaruli, T; Monteno, M; Mufson, S L; Musser, J; Nicolò, D; Nolty, R; Orth, C; Okada, C; Osteria, G; Ouchrif, M; Palamara, O; Patera, V; Patrizii, L; Pazzi, R; Peck, C W; Perrone, L; Petrera, S; Pistilli, P; Popa, V; Rainó, A; Reynoldson, J; Ronga, F; Satriano, C; Satta, L; Scapparone, E; Scholberg, K; Sciubba, A; Serra, P; Sioli, M; Sitta, M; Spinelli, P; Spinetti, M; Spurio, M; Steinberg, R; Stone, J L; Sulak, Lawrence R; Surdo, A; Tarle, G; Togo, V; Vakili, M; Vilela, E; Walter, C W; Webb, R

    2000-01-01

    A search for lightly ionizing particles has been performed with the MACRO detector. This search was sensitive to particles with charges between 1/5 e and close to the charge of an electron, with beta between approximately 0.25 and 1.0. Unlike previous searches both single track events and tracks buried within high multiplicity muon showers were examined. In a period of approximately one year no candidates were observed. Assuming an isotropic flux, for the single track sample this corresponds to a 90% C.L. upper flux limit Phi

  4. Macro Data Analysis of Traffic Accidents in Indonesia

    Directory of Open Access Journals (Sweden)

    Annisa Jusuf

    2017-04-01

    Full Text Available This paper presents a macro data analysis of Indonesian road accidents in the form of statistical data. Traffic accidents and their subsequent fatalities bring enormous social and economic consequences. A good understanding of the problem is expected to initiate major action toward the improvement of road and vehicle safety. One important milestone is the collection and analysis of road accident data. The results from this study portray the ‘tangled threads’ problem of traffic in Indonesia. The population number and number of vehicles have increased steadily, as has been accurately predicted by experts. Meanwhile, there is not enough infrastructure growth. Motorcycles are the main contributor to traffic accidents and fatalities due to their popularity as an effective vehicle to jump traffic jams. The ‘tangled threads’ need an extremely creative and comprehensive solution.

  5. Macro-invertebrate decline in surface water polluted with imidacloprid.

    Directory of Open Access Journals (Sweden)

    Tessa C Van Dijk

    Full Text Available Imidacloprid is one of the most widely used insecticides in the world. Its concentration in surface water exceeds the water quality norms in many parts of the Netherlands. Several studies have demonstrated harmful effects of this neonicotinoid to a wide range of non-target species. Therefore we expected that surface water pollution with imidacloprid would negatively impact aquatic ecosystems. Availability of extensive monitoring data on the abundance of aquatic macro-invertebrate species, and on imidacloprid concentrations in surface water in the Netherlands enabled us to test this hypothesis. Our regression analysis showed a significant negative relationship (P<0.001 between macro-invertebrate abundance and imidacloprid concentration for all species pooled. A significant negative relationship was also found for the orders Amphipoda, Basommatophora, Diptera, Ephemeroptera and Isopoda, and for several species separately. The order Odonata had a negative relationship very close to the significance threshold of 0.05 (P = 0.051. However, in accordance with previous research, a positive relationship was found for the order Actinedida. We used the monitoring field data to test whether the existing three water quality norms for imidacloprid in the Netherlands are protective in real conditions. Our data show that macrofauna abundance drops sharply between 13 and 67 ng l(-1. For aquatic ecosystem protection, two of the norms are not protective at all while the strictest norm of 13 ng l(-1 (MTR seems somewhat protective. In addition to the existing experimental evidence on the negative effects of imidacloprid on invertebrate life, our study, based on data from large-scale field monitoring during multiple years, shows that serious concern about the far-reaching consequences of the abundant use of imidacloprid for aquatic ecosystems is justified.

  6. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  7. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  8. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  9. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  10. A zwitterionic macro-crosslinker for durable non-fouling coatings.

    Science.gov (United States)

    Wang, Wei; Lu, Yang; Xie, Jinbing; Zhu, Hui; Cao, Zhiqiang

    2016-03-28

    A novel zwitterionic macro-crosslinker was developed and applied to fabricate durable non-fouling coatings on a polyurethane substrate. The zwitterionic macro-crosslinker coating exhibited superior durability over the traditional brush polymer coating and was able to retain its non-fouling property even after weeks of shearing in flowing liquid.

  11. Evolutionary modelling of the macro-economic impacts of catastrophic flood events

    NARCIS (Netherlands)

    Safarzynska, K.E.; Brouwer, R.; Hofkes, M.

    2013-01-01

    This paper examines the possible contribution of evolutionary economics to macro-economic modelling of flood impacts to provide guidance for future economic risk modelling. Most macro-economic models start from a neoclassical economic perspective and focus on equilibrium outcomes, either in a static

  12. SPSS Macros for Assessing the Reliability and Agreement of Student Evaluations of Teaching

    Science.gov (United States)

    Morley, Donald D.

    2009-01-01

    This article reports and demonstrates two SPSS macros for calculating Krippendorff's alpha and intraclass reliability coefficients in repetitive situations where numerous coefficients are needed. Specifically, the reported SPSS macros were used to evaluate the interrater agreement and reliability of student evaluations of teaching in thousands of…

  13. Investigation of porous concrete through macro and meso-scale testing

    NARCIS (Netherlands)

    Agar Ozbek, A.S.; Weerheijm, J.; Schlangen, H.E.J.G.

    2010-01-01

    In designing a porous concrete, containing a high volume of air pores, the effects of its mesoscale phases on its macro level properties have to be known. For this purpose, porous concretes having different aggregate gradings and cement paste compositions were investigated through macro-scale

  14. A Macro-Micro-Symbolic Teaching to Promote Relational Understanding of Chemical Reactions

    Science.gov (United States)

    Jaber, Lama Ziad; Boujaoude, Saouma

    2012-01-01

    The purpose of this research is threefold: (1) to identify the difficulties that Grade 10 students in a Lebanese school have that hinder their conceptual understanding at the micro-macro-symbolic interface in chemistry, (2) to investigate the effect of a macro-micro-symbolic teaching approach on students' relational understanding of chemical…

  15. Comprehensive comparison of macro-strain mode and displacement mode based on different sensing technologies

    Science.gov (United States)

    Hong, Wan; Zhang, Jian; Wu, Gang; Wu, Zhishen

    2015-01-01

    A comprehensive comparison of macro-strain mode and displacement mode obtained from distributed macro-strain sensing and high-density point sensing (such as accelerometers) technologies is presented in this paper. Theoretical derivation reveals that displacement mode shape from accelerometers and modal macro-strain from distributed macro-strain sensors can be converted into each other. However, it is realized that displacement mode shape as global behavior of a structure can still be calculated with high-precision from modal macro-strain considering measurement errors in practical monitoring, whereas modal macro-strain can hardly be accurately achieved from displacement mode shape when signals are corrupted with noise in practical monitoring. Simulation and experiment results show that the calculated displacement mode shapes are very close to the actual ones even if the noise level reaches 5%. Meanwhile, damage index using measured modal macro-strain is still effective when the measurements are corrupted with 5% noise which is reliable for damage detection in practical monitoring. Calculating modal macro-strain from noise-polluted displacement mode shape will cause an unacceptable error if the noise level reaches only 0.5%, which has been verified in the simulation.

  16. Macro Cell Muting Coordination for Non-Uniform Topologies in LTE-A HetNets

    DEFF Research Database (Denmark)

    Soret, Beatriz; Pedersen, Klaus I.

    2013-01-01

    irregular scenarios is how to operate eICIC, and especially how to coordinate macro-cell muting. Our analysis shows that for eICIC to provide gain in such scenarios, it is recommended to use fully time aligned traditional Almost Blank Subframes (ABS) in the macro-cells with picos, while first tier...

  17. Comparing the photocatalytic activity of TiO2 at macro- and microscopic scales

    DEFF Research Database (Denmark)

    Torras-Rosell, Antoni; Johannsen, Sabrina Rostgaard; Dirscherl, Kai

    2016-01-01

    . The photocatalytic properties of TiO2 at macro- and microscopic scales are investigated by comparing photocatalytic degradation of acetone and electrochemical experiments to Kelvin probe force microscopy. The good agreement between the macro- and microscopic experiments suggests that Kelvin probe force microscopy...

  18. Studying neighborhood crime across different macro spatial scales: The case of robbery in 4 cities.

    Science.gov (United States)

    Hipp, John R; Wo, James C; Kim, Young-An

    2017-11-01

    Whereas there is a burgeoning literature focusing on the spatial distribution of crime events across neighborhoods or micro-geographic units in a specific city, the present study expands this line of research by selecting four cities that vary across two macro-spatial dimensions: population in the micro-environment, and population in the broader macro-environment. We assess the relationship between measures constructed at different spatial scales and robbery rates in blocks in four cities: 1) San Francisco (high in micro- and macro-environment population); 2) Honolulu (high in micro- but low in macro-environment population); 3) Los Angeles (low in micro- but high in macro-environment population); 4) Sacramento (low in micro- and macro-environment population). Whereas the socio-demographic characteristics of residents further than ½ mile away do not impact robbery rates, the number of people up to 2.5 miles away are related to robbery rates, especially in the two cities with smaller micro-environment population, implying a larger spatial scale than is often considered. The results show that coefficient estimates differ somewhat more between cities differing in micro-environment population compared to those differing based on macro-environment population. It is therefore necessary to consider the broader macro-environment even when focusing on the level of crime across neighborhoods or micro-geographic units within an area. Copyright © 2017 Elsevier Inc. All rights reserved.

  19. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  20. U.S. Army War College Guide to Strategy

    National Research Council Canada - National Science Library

    Cerami, Joseph

    2001-01-01

    For more than 3 decades, the Army War College Department of National Security and Strategy has faced the challenge of educating future strategic leaders on the subject of national security, or grand strategy...