WorldWideScience

Sample records for macro security strategy

  1. Strategy of Increasing Food Security based on Macro and Micro Aspects

    Directory of Open Access Journals (Sweden)

    Neni Widayaningsih

    2016-06-01

    Full Text Available The preliminary studies that have been conducted show that the food availability in 27 districts in Banyumas Regency on average is still low. The purpose of this research is to formulate of a strategy to improve the food security by synergizing the macro and micro aspects. The method used is the tabulation analysis, IFE and EFE Matrix, and also IE Matrix. The IE matrix shows the food security based on the macro and micro aspects that are in the first cell, which means that the food security conditions are experiencing the growing and buliding. The strategies of improving the food security from the micro and macro aspects are first, to develop the food production in accordance with the potential and comodities of the excellent food in accordance with the specializations of regions (districts. Second, it requires a partnership and a cooperation of distributing the excellent food production. Third, the investment is required to improve the diversification of food. Fourth, it requires the cooperation between the farmers and the government agencies concerned with the development, supply and service of excellent means of agricultural production with supervision and increased credit services. Fifth, the off-farm activities should be developed by forming the cooperatives or the small and household businesses on the basis of farming activities. Besides, in order to meet the consumption of food that is safe, qualified, and nutritious, it is necessary to increase the knowledge and awareness about the food security at the household level by empowering the cooperatives or small and household businesses by utilizing Dasa Wisma group, PKK, Majelis Ta'lim, and other non-governmental groups.

  2. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    International Nuclear Information System (INIS)

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-01-01

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a 'dirty bomb'. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  3. Technology strategy as macro-actor

    DEFF Research Database (Denmark)

    Tryggestad, Kjell

    2003-01-01

    -human entities to the explanatory repertoire of strategy research, another line of inquiry is pursued. The performative perspective thus proposed, is inspired by the classical work of Von Clausewitz and the recent anthropology of science, technology and organizational identities. In the proposed perspective...... case account for how the strategic technology and the strategic collective emerge and co-produce each other as a macro-actor, only to become transformed in unexpected ways - as common technology and reflective human subjects.In the concluding section, it is argued that the humanity of the reflective...... outcomes, as providers of explanations and observations. The expression `technological strategy as macro-actor' summarizes these findings and the associated implications for research and practice....

  4. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  5. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  6. Energy security strategy and nuclear power

    International Nuclear Information System (INIS)

    Toichi, Tsutomu; Shibata, Masaharu; Uchiyama, Yoji; Suzuki, Tatsujiro; Yamazaki, Kazuo

    2006-01-01

    This special edition of 'Energy security strategy and nuclear power' is abstracts of the 27 th Policy Recommendations 'The Establishment of an International Energy Security System' by the Japan Forum on International Relations, Inc on May 18 th , 2006. It consists of five papers: Energy security trend in the world and Japan strategy by Tsutomu Toichi, Establishment of energy strategy supporting Japan as the focus on energy security by Masaharu Shibata, World pays attention to Japan nuclear power policy and nuclear fuel cycle by Yoji Uchiyama, Part of nuclear power in the energy security - the basic approach and future problems by Tatsujiro Suzuki, and Drawing up the energy strategy focused on the national interests - a demand for the next government by Kazuo Yamazaki. (S.Y.)

  7. A macro-economic framework for evaluation of cyber security risks related to protection of intellectual property.

    Science.gov (United States)

    Andrijcic, Eva; Horowitz, Barry

    2006-08-01

    The article is based on the premise that, from a macro-economic viewpoint, cyber attacks with long-lasting effects are the most economically significant, and as a result require more attention than attacks with short-lasting effects that have historically been more represented in literature. In particular, the article deals with evaluation of cyber security risks related to one type of attack with long-lasting effects, namely, theft of intellectual property (IP) by foreign perpetrators. An International Consequence Analysis Framework is presented to determine (1) the potential macro-economic consequences of cyber attacks that result in stolen IP from companies in the United States, and (2) the likely sources of such attacks. The framework presented focuses on IP theft that enables foreign companies to make economic gains that would have otherwise benefited the U.S. economy. Initial results are presented.

  8. SECURITY STRATEGIES OF MEMBER STATES OF THE EUROPEAN UNION FROM THE LISBON TREATY AND THE EUROPEAN SECURITY STRATEGY

    Directory of Open Access Journals (Sweden)

    PABLO RIVAS PARDO

    2017-09-01

    in mind, it is possible to study the variability of the Security Strategy in relation to four strategic guidelines: strategic self-perception, the necessity to tune these postulates with the common objectives of the European Union, the statement of threats and finally the actions projected by these strategies to face the changing environment of international security. This variability will seek the fact of the existence or nonexistence of tuning and consistency between the Security Strategies and the community positions in the matter of security and defense. The selected countries are those who have published their documents after the signing of the Treaty of Lisbon and the publication of the European Security Strategy, in other words, after2009: Austria, Bulgaria, Slovenia, Spain, Estonia, Holland, Hungary, Lithuania, UK and the Czech Republic.

  9. ECONOMIC SAFETY PROBLEM IN MODERN MACRO AND MICRO CONCEPTS

    Directory of Open Access Journals (Sweden)

    I. I. Rekun

    2014-01-01

    Full Text Available Purpose. Security is an important component of economic security and the guaranteeing of appropriate national interests in the state. All these things are closely related to the economic efficiency of operations of economic entities, with economic independence, stability and security of a society. In addition, economic security is a part of national security, its foundation and material basis. The problem of economic security in modern conditions at the micro and macro levels requires determining the main directions of its formation. Methodology. To achieve this goal, basic directions of a security mechanism of the economic system, in particular on the macro level were grounded. Findings. Economic security is such state of the state economy operation in which the order of equilibrium occurred in certain organizational and legal norms on the basis of social life. These regulations are created be the state, principles of coexistence, which are transmitted from generation to generation. The current state of economic security guaranteeing at the macro and micro levels was analyzed. The system of indicators that can be used in the assessment of the security system was determined. Originality. Propositions concerning necessary changes in the policy of economic security in a state were formulated. The system of indicators which can be used in the assessment of the security system was offered. Practical value. Using of the proposed system of economic security indicators will expand the list of important factors affecting on its status and allow us determining the main directions of its formation.

  10. Kanttekeningen bij de Europese cyber security strategie

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Smulders, A.C.M.; Kamphuis, P.

    2013-01-01

    In februari presenteerde de Europese Unie de Europese cyber security strategie en begeleidende concept richtlijn. The Hague Security Delta (HSD) is verheugd dat de Nederlandse Nationale Cyber Security Strategie nu ook op Europees niveau navolging krijgt. Toch plaatsen we een paar kantekeningen.

  11. Food Security Strategy Based on Computer Innovation

    OpenAIRE

    Ruihui Mu

    2015-01-01

    Case analysis to identify innovative strategies for food security occurred in the Oriental Hotel, voluntarily implement food safety control. Food security strategy investigation and the reasons for their use of multiple data sources, including accommodation and catering industry to implement and document interviews with key decision makers in the hotel performed to observe the business environment were examined. This finding suggests that addressing food security, not only is the food control...

  12. An RNA-Seq strategy to detect the complete coding and non-coding transcriptome including full-length imprinted macro ncRNAs.

    Directory of Open Access Journals (Sweden)

    Ru Huang

    Full Text Available Imprinted macro non-protein-coding (nc RNAs are cis-repressor transcripts that silence multiple genes in at least three imprinted gene clusters in the mouse genome. Similar macro or long ncRNAs are abundant in the mammalian genome. Here we present the full coding and non-coding transcriptome of two mouse tissues: differentiated ES cells and fetal head using an optimized RNA-Seq strategy. The data produced is highly reproducible in different sequencing locations and is able to detect the full length of imprinted macro ncRNAs such as Airn and Kcnq1ot1, whose length ranges between 80-118 kb. Transcripts show a more uniform read coverage when RNA is fragmented with RNA hydrolysis compared with cDNA fragmentation by shearing. Irrespective of the fragmentation method, all coding and non-coding transcripts longer than 8 kb show a gradual loss of sequencing tags towards the 3' end. Comparisons to published RNA-Seq datasets show that the strategy presented here is more efficient in detecting known functional imprinted macro ncRNAs and also indicate that standardization of RNA preparation protocols would increase the comparability of the transcriptome between different RNA-Seq datasets.

  13. Cultivation Strategy for Freshwater Macro- and Micro-Algae as Biomass Stock for Lipid Production

    Directory of Open Access Journals (Sweden)

    Marieska Verawaty

    2017-07-01

    Full Text Available In this research, an algae cultivation strategy was studied. Integrating algae cultivation with wastewater treatment is currently seen as one of the most economical ways of producing algae biomass. A combination of an anaerobic baffled reactor (ABR and a constructed wetland (CW was applied for treating domestic wastewater with an additional collection tank for improving effluent quality. The effluent produced from the three stages was used as algae cultivation media and suplemented with 10% bold basal medium (BBM. The results showed both micro- and macro-algae growth and their lipid contents were higher when they were grown in effluent-BBM (9:1 v/v media. The lipid content of the micro-algae mixed culture was 16.5% while for macro-algae Oedogonium sp and Cladophora sp it was 6.90% and 6.75% respectively.

  14. Drie nationale cyber security strategieën vergeleken

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2011-01-01

    Onafhankelijk van elkaar brachten Frankrijk, Duitsland en Nederland hun nationale cyber security strategieën vrijwel tegelijk uit. De strategieën hebben overeenkomsten, maar tonen ook grote verschillen. De drie landen onderkennen een urgente noodzaak om cyber security aan te pakken, maar hebben

  15. Security Isolation Strategy Mechanism for Lightweight Virtualization Environment

    Directory of Open Access Journals (Sweden)

    Liu Qian

    2017-01-01

    Full Text Available For cloud service providers, lightweight virtualization is a more economical way of virtualization. While the user is worried about the safety of applications and data of the container, due to the container sharing the underlying interface and the kernel, therefore the security and trusted degree of lightweight virtualization container isolation mechanism is critical for the promotion of lightweight virtualization service. Because the user cannot directly participate in the process of the construction and management of container isolation mechanism, it is difficult for them to establish confidence in the security and trusted degree of container isolation mechanism. Based on the research and analysis of system credible and virtualization isolation mechanism, this paper puts forward a set of lightweight virtualization security isolation strategy mechanism, divides lightweight virtualization container storage address space into several parts, puts forward the definition of lightweight virtualization security isolation, gives the formal description and proof of container security isolation strategy, and combines with related technology to verify the feasibility of lightweight virtualization security isolation strategy mechanism. The mechanism has important guiding significance for cloud services providers to deploy container security isolation.

  16. Organisational Information Security Strategy: Review, Discussion and Future Research

    Directory of Open Access Journals (Sweden)

    Craig A. Horne

    2017-05-01

    Full Text Available Dependence on information, including for some of the world’s largest organisations such as governments and multi-national corporations, has grown rapidly in recent years. However, reports of information security breaches and their associated consequences indicate that attacks are escalating on organisations conducting these information-based activities. Organisations need to formulate strategy to secure their information, however gaps exist in knowledge. Through a thematic review of academic security literature, (1 we analyse the antecedent conditions that motivate the adoption of a comprehensive information security strategy, (2 the conceptual elements of strategy and (3 the benefits that are enjoyed post-adoption. Our contributions include a definition of information security strategy that moves from an internally-focussed protection of information towards a strategic view that considers the organisation, its resources and capabilities, and its external environment. Our findings are then used to suggest future research directions.

  17. Threat Prioritization Process for the Czech Security Strategy Making

    Directory of Open Access Journals (Sweden)

    Milos Balaban

    2012-06-01

    Full Text Available This article offers systematic view of a process of identification of security threats and, subsequently, their use in the making of strategic documents, notably the Security Strategy of the Czech Republic. It is not the aim of the authors to name or define such threats, but to present the process itself. It is paramount to any credible security strategy that it deals with the threat identification in the most precise fashion. The authors take reservations against the “catalogue” approach and claim the processes of prioritization and categorization to be essential for any policies derived from the security strategy, especially in times of economic need. It is also the 2011 final paper of the project “Trends, Risks, and Scenarios of the Security Developments in the World, Europe, and the Czech Republic – Impacts on the Policy and Security System of the Czech Republic” (TRS / VG20102013009.

  18. Strategies for online test security.

    Science.gov (United States)

    Hart, Leigh; Morgan, Lesley

    2009-01-01

    As online courses continue to increase, maintaining academic integrity in student evaluation is a challenge. The authors review several strategies, with varying degrees of cost and technology, to improve test security in the online classroom.

  19. The National Security Strategy and National Interests: Quantity or Quality?

    National Research Council Canada - National Science Library

    Mercado, Leo

    2001-01-01

    The national security strategy (NSS), National Security Strategy for a New Century, published in December 1999, categorizes national interests as vital, important, and humanitarian and other interests...

  20. FINANCIAL-ECONOMICAL ENTERPRISE SECURITY STRATEGY FORMING IN THE TERMS OF UNCONFORMITY

    Directory of Open Access Journals (Sweden)

    Galyna Mykhayliv

    2016-03-01

    Full Text Available Theoretical points as for definition of “financial-economical security” have been researched and summing up. The present attitude were analyzed as for the financial-economical enterprise security forming in the terms of unconformity and system attitude necessity stipulated for strategy system management by a financial-economical enterprise security. Keywords: financial-economical enterprise security, strategy management, financial security, economical security, financial stability, economical security, external JEL: M 20

  1. Guide to National Security Policy and Strategy

    National Research Council Canada - National Science Library

    Bartholomees, Jr, J. B

    2006-01-01

    ...: Theory of War and Strategy and National Security Policy and Strategy. The result for this book is the expansion of the block on strategic theory and the introduction of a block on specific strategic issues...

  2. Ten national cyber security strategies: A comparison

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Besseling, K. van; Spoelstra, M.; Graaf, P. de

    2013-01-01

    A number of nations developed and published a national cyber security strategy (NCSS). Most of them were published in the period 2009 - 2011. Despite the fact that each of these NCSS intends to address the cyber security threat, large differences exist between the NCSS approaches. This paper

  3. Finger multibiometric cryptosystems: fusion strategy and template security

    Science.gov (United States)

    Peng, Jialiang; Li, Qiong; Abd El-Latif, Ahmed A.; Niu, Xiamu

    2014-03-01

    We address two critical issues in the design of a finger multibiometric system, i.e., fusion strategy and template security. First, three fusion strategies (feature-level, score-level, and decision-level fusions) with the corresponding template protection technique are proposed as the finger multibiometric cryptosystems to protect multiple finger biometric templates of fingerprint, finger vein, finger knuckle print, and finger shape modalities. Second, we theoretically analyze different fusion strategies for finger multibiometric cryptosystems with respect to their impact on security and recognition accuracy. Finally, the performance of finger multibiometric cryptosystems at different fusion levels is investigated on a merged finger multimodal biometric database. The comparative results suggest that the proposed finger multibiometric cryptosystem at feature-level fusion outperforms other approaches in terms of verification performance and template security.

  4. Why Europe needs a new European Security Strategy

    NARCIS (Netherlands)

    Drent, M.E.; Landman, Lennart

    2012-01-01

    Next year, the European Security Strategy: A Secure Europe in a Better World will be ten years old. Both the European Union and the world around it have changed in that time. In this Clingendael Policy Brief Margriet Drent and Lennart Landman argue that the European Union's foreign and security

  5. Public Diplomacy: Enabling National Security Strategy

    National Research Council Canada - National Science Library

    Smith, Russell H

    2007-01-01

    Public diplomacy seeks to promote the national interests of the United States through understanding, informing and influencing foreign audiences in accord with the 2006 National Security Strategy (NSS...

  6. Computing security strategies in finite horizon repeated Bayesian games

    KAUST Repository

    Lichun Li

    2017-07-10

    This paper studies security strategies in two-player zero-sum repeated Bayesian games with finite horizon. In such games, each player has a private type which is independently chosen according to a publicly known a priori probability. Players\\' types are fixed all through the game. The game is played for finite stages. At every stage, players simultaneously choose their actions which are observed by the public. The one-stage payoff of player 1 (or penalty to player 2) depends on both players types and actions, and is not directly observed by any player. While player 1 aims to maximize the total payoff over the game, player 2 wants to minimize it. This paper provides each player two ways to compute the security strategy, i.e. the optimal strategy in the worst case. First, a security strategy that directly depends on both players\\' history actions is derived by refining the sequence form. Noticing that history action space grows exponentially with respect to the time horizon, this paper further presents a security strategy that depends on player\\'s fixed sized sufficient statistics. The sufficient statistics is shown to consist of the belief on one\\'s own type, the regret on the other player\\'s type, and the stage, and is independent of the other player\\'s strategy.

  7. Strategy and management of network security at KEK

    International Nuclear Information System (INIS)

    Kiyoharu Hashimoto; Teiji Nakamura; Hitoshi Hirose, Yukio Karita; Youhei Morita; Soh Suzuki; Fukuko Yuasa

    2001-01-01

    Recently the troubles related to the network security have often occurred at KEK. According to their security policy, the authors have started the strategy against the daily attacks. It consists of two fundamental things; the monitoring and the access control. To monitor the network, the authors have installed the intrusion detection system and have managed it since 1998. For the second thing, the authors arranged three categories to classify all hosts (about 5000 hosts) at KEK according to their security level. To realize these three categories, the authors filter the incoming packet from outside KEK whether it has a SYN flag or not. The network monitoring and the access control produced good effects in keeping the security level high. Since 2000 the authors have started the transition of LAN from shared-media network to switched network. Now almost part of LAN was re-configured and in this new LAN 10 Mbps 100 Mbps/1Gbps Ethernet are supported. Currently the authors are planning further speedup (10 Gbps) and redundancy of network. Not only LAN but also WAN, network speed will be upgraded to 10 Gbps thanks to the strong promotion of IT by Japanese government. In this very high speed network, the authors' current strategy will be affected and again the network security becomes a big issue. The authors describe the experiences in practice of the current strategy and management know-how together with the discussion on the new strategy

  8. Assessing Information Security Strategies, Tactics, Logic and Framework

    CERN Document Server

    Vladimirov, Andrew; Michajlowski, Andriej

    2010-01-01

    This book deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours. It will give readers the founding principles around information security assessments and why they are important, whilst providing a fluid framework for developing an astute 'information security mind' capable of rapid adaptation to evolving technologies, markets, regulations, and laws.

  9. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  10. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  11. CHINA’S STRATEGY OF ENERGY SECURITY IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Xing Li

    2013-01-01

    Full Text Available U.S.recently launched strategy of rebalancing to Asia worsens the atmosphere forChina’s energy security and increases the risks for energy transportation from Africa and theMiddle East. The diversification of energy sources is a reasonable strategic choice, so the importance of the Eurasian continent forChinaincreases. Central Asia does not play anymore a supporting role in the agenda ofChina’s energy security strategy. It is rather becoming a region of major strategic importance.

  12. Spacepower for Australias Security - Grand Strategy or Strategy of Grandeur

    Science.gov (United States)

    2012-06-01

    2000), 34–35; Also see Peter H Diamandis and Steven Kotler , Abundance: The Future Is Better Than You Think (New York: Free Press, 2012... Kotler . Abundance: The Future Is Better Than You Think. New York: Free Press, 2012. DOD. “National Security Space Strategy -Unclassified Summary

  13. Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies

    Science.gov (United States)

    2016-12-01

    have begun discussing strategies for securing entities in cyberspace—includ- ing the files and software belonging to corporations , government...through the best strategies for deterring cyber-incursions. The immigration analogy is particularly useful for exploring how would-be intruders learn...analysis, evaluation, and refinement of professional expertise in war, strategy , operations, national security, resource management, and responsible

  14. Teaching Note--Incorporating Social Innovation Content into Macro Social Work Education

    Science.gov (United States)

    Pitt-Catsouphes, Marcie; Cosner Berzin, Stephanie

    2015-01-01

    The practice of social innovation offers promising approaches for addressing social issues. Although many social innovation strategies are congruent with macro social work theory and practice, some of the insights and tactics that have emerged in the social innovation field have the potential to strengthen current macro practice. Based on our…

  15. Achieving National Security Strategy: An Effective Process?

    National Research Council Canada - National Science Library

    Mullery, Brian W

    2008-01-01

    The purpose of this research paper is two-fold: 1) to examine whether the U.S. government is properly organized and equipped at the Executive level, to achieve the goals of the President's National Security Strategy and 2...

  16. ASPECTS OF POLICIES AND STRATEGIES FOR CYBER SECURITY IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Ilina ARMENCHEVA

    2015-10-01

    Full Text Available Freedom and prosperity of mankind greatly depend on an innovative, safe and reliable Internet that, of course, will keep evolving. Cyber space must be protected from incidents, misuse and abuse. Handling the increasing number of threats to cyber security is a challenge that national security and the trend in the international environment face. This makes taking fast and adequate measures at national, European and international level a must. Changing national security strategies and adopting new cyber security strategies are a part of these measures.

  17. The Nuclear Imperative in Russia’s Security Strategy

    Directory of Open Access Journals (Sweden)

    J. Oscar Alvarez Calzada

    2005-10-01

    Full Text Available The process which culminated in the disappearance of the USSR was heavily influenced by that Soviet Union’s inability to maintain the level of technology reached by the US in the arms race. Under the circumstances of deteriorating Russian power which have been developing since 1991, and given the precariousness that affects its armed forces, nuclear weapons have become the core element of the Russian Federation’s national security strategy. This article explores the causes that have led to this nuclear imperative in Russia’s security strategy; and secondly, it presents the most relevant, and worrying, consequence that this dependence has generated, which is the lowering of the threshold necessary forthe use of nuclear weapons.

  18. Parents' experience of hospitalization: different strategies for feeling secure.

    Science.gov (United States)

    Kristensson-Hallström, I; Elander, G

    1997-01-01

    Twenty parents of boys (ages 2-14 years) hospitalized for hypospadias repair in a pediatric surgery department in Sweden, were interviewed concerning their experience when their child was hospitalized. A qualitative analysis of the interviews indicated that the most important issue to the parents was finding security at the hospital. Parents manifested one of three different strategies that enabled them to feel secure at the hospital; (a) relinquishing the care of their children to the nursing staff; (b) obtaining a measure of control over their children's care; and (c) relying on knowing their child best. The parental strategy adopted to feel secure was found to correspond with the way parents experienced the hospitalization. Differences were found in their children's experiences of pain and the alleviation of the pain during the hospitalization.

  19. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Science.gov (United States)

    2010-07-26

    ... National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... National Health Security Strategy (NHSS) of the United States of America (2009) and build upon the NHSS Interim Implementation Guide for the National Health Security Strategy of the United States of America...

  20. The Maritime Infrastructure Recovery Plan for the National Strategy for Maritime Security

    National Research Council Canada - National Science Library

    2006-01-01

    ... to the jurisdiction of the United States. The MIRP, the Maritime Commerce Security Plan, and the Maritime Transportation System Security Plan were developed in close coordination under the National Strategy for Maritime Security (NSMS...

  1. The MARKAL-MACRO model and the climate change

    International Nuclear Information System (INIS)

    Kypreos, S.

    1996-07-01

    MARKAL-MACRO and its extensions is a model appropriate to study partial and general equilibrium in the energy markets and the implications of the carbon dioxide mitigation policy. The main advantage of MM is the explicit treatment of energy demand, supply and conversion technologies, including emission control and conservation options, within a general equilibrium framework. The famous gap between top-down and bottom-up models is resolved and the economic implications of environmental and supply policy constraints can be captured either in an aggregated (Macro) or in a sectorial (Micro) level. The multi-regional trade version of the model allows to study questions related to efficient and equitable allocation of cost and benefits associated with the climate change issue. Finally, the stochastic version of the model allows to assess policies related to uncertain and even catastrophic effects and define appropriate hedging strategies. The report is divided in three parts: - the first part gives an overview of the new model structure. It describes its macro economic part and explains its calibration, - the second part refers to the model applications for Switzerland when analyzing the economic implications of curbing CO 2 emissions or policies related to the introduction of a carbon tax, including a hedging strategy, - the last part is organized in form of Appendices and gives a mathematical description and some potential extensions of the model. It describes also a sensitivity analysis done with MARKAL-MACRO in 1992. (author) figs., tabs., refs

  2. It's Time for a National Energy Security Strategy

    National Research Council Canada - National Science Library

    Wright, George G

    2008-01-01

    .... can preserve that standing in the world. Colonel Greg Wright argues that what is needed to retain our military and economic superpower advantage is a new overarching United States National Energy Security Strategy...

  3. The new terrorism and the American national security strategy : implications for Turkey's security

    OpenAIRE

    Türe, Nail

    2004-01-01

    Cataloged from PDF version of article. This thesis analyzes the consequences of the American National Security Strategy, carried out as part of the post September 11 ‘war on terrorism’, in terms of Turkey’s security. Whether the reasons or aims of a declaration of war on terrorism are right or not, the reality is that the U.S. has made important steps with significant implications for the whole world as well as for Turkey. Terrorism, which has changed some of its features by th...

  4. Security solutions: strategy and architecture

    Science.gov (United States)

    Seto, Myron W. L.

    2002-04-01

    Producers of banknotes, other documents of value and brand name goods are being presented constantly with new challenges due to the ever increasing sophistication of easily-accessible desktop publishing and color copying machines, which can be used for counterfeiting. Large crime syndicates have also shown that they have the means and the willingness to invest large sums of money to mimic security features. To ensure sufficient and appropriate protection, a coherent security strategy has to be put into place. The feature has to be appropriately geared to fight against the different types of attacks and attackers, and to have the right degree of sophistication or ease of authentication depending upon by whom or where a check is made. Furthermore, the degree of protection can be considerably increased by taking a multi-layered approach and using an open platform architecture. Features can be stratified to encompass overt, semi-covert, covert and forensic features.

  5. Healthy public policy in poor countries: tackling macro-economic policies.

    Science.gov (United States)

    Mohindra, K S

    2007-06-01

    Large segments of the population in poor countries continue to suffer from a high level of unmet health needs, requiring macro-level, broad-based interventions. Healthy public policy, a key health promotion strategy, aims to put health on the agenda of policy makers across sectors and levels of government. Macro-economic policy in developing countries has thus far not adequately captured the attention of health promotion researchers. This paper argues that healthy public policy should not only be an objective in rich countries, but also in poor countries. This paper takes up this issue by reviewing the main macro-economic aid programs offered by international financial institutions as a response to economic crises and unmanageable debt burdens. Although health promotion researchers were largely absent during a key debate on structural adjustment programs and health during the 1980s and 1990s, the international macro-economic policy tool currently in play offers a new opportunity to participate in assessing these policies, ensuring new forms of macro-economic policy interventions do not simply reproduce patterns of (neoliberal) economics-dominated development policy.

  6. Security strategy of powered-off SRAM for resisting physical attack to data remanence

    International Nuclear Information System (INIS)

    Yu Kai; Zou Xuecheng; Yu Guoyi; Wang Weixu

    2009-01-01

    This paper presents a security strategy for resisting a physical attack utilizing data remanence in powered-off static random access memory (SRAM). Based on the mechanism of physical attack to data remanence, the strategy intends to erase data remanence in memory cells once the power supply is removed, which disturbs attackers trying to steal the right information. Novel on-chip secure circuits including secure power supply and erase transistor are integrated into conventional SRAM to realize erase operation. Implemented in 0.25 μm Huahong-NEC CMOS technology, an SRAM exploiting the proposed security strategy shows the erase operation is accomplished within 0.2 μs and data remanence is successfully eliminated. Compared with conventional SRAM, the retentive time of data remanence is reduced by 82% while the operation power consumption only increases by 7%.

  7. What Type of State Homeland Security Strategy Should the State of New Jersey Develop?

    National Research Council Canada - National Science Library

    Rosell, Richard G

    2007-01-01

    The State of New Jersey does not have a written homeland security strategy. This thesis argues that New Jersey should have such a strategy, particularly since it risks losing federal homeland security funding if it does...

  8. Citizen-based Strategies to Improve Community Security: Working ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Citizen-based Strategies to Improve Community Security: Working with Vulnerable Populations to Address Urban Violence in Medellin ... Water Resources Association, in close collaboration with IDRC, is holding a webinar titled “Climate change and adaptive water management: Innovative solutions from the Global South”.

  9. Cyber Security Analysis of Turkey

    OpenAIRE

    Senturk, Hakan; Çil, Zaim; Sağıroğlu, Şeref

    2016-01-01

    Considering the criticality of the cyber security threat in the 21st century, it is presumed that the nations are busy with series of activities in order to protect their security in the cyber space domain. In this paper, in light of the recent developments in the cyber security field, Turkey’s cyber security analysis is performed using a macro analysis model. We researched for the measures taken in Turkey with respect to those in the other countries, reviewed the posture, the activities and ...

  10. The Path to a Culturally Relevant National Security Strategy

    National Research Council Canada - National Science Library

    Frappler, John

    2008-01-01

    .... In an attempt to remain ahead of its enemies in the prosecution of the GWOT, the United States has proceeded with an extensive review of its National Security Strategy and an historic transformation...

  11. DOD/COCOM Water Security Program Strategy Document

    Science.gov (United States)

    2011-04-22

    treatment and disposal. DOD/COCOM Water Security Program Strategy 22 18. Toxic Minerals In regions where there are naturally occurring unsafe...surface hydrologic observations using remote sensing to provide data on precipitation, radiation, temperature, soil moisture, groundwater, snowcover...habitat alteration and aquaculture . 13. Centers for Disease Control (CDC) Works with partners throughout the nation and the world to monitor health

  12. MACRO

    International Nuclear Information System (INIS)

    Rogner, H.H.

    1989-01-01

    The description is given to MACRO which is a numerically formulated macroeconomic model constructed to reflect the economy of the European Community. The model belongs to the group of general equilibrium models often applied in long-term macroeconomic energy modeling. Furthermore, MACRO was designed so as to interact with other more technically oriented energy demand and supply models. It's main objective is to provide consistency checks between assumptions concerning energy trade, energy prices, resource availability and energy-related capital requirements. 5 figs

  13. The Role of Corporate Defense Services in International Security Strategy

    National Research Council Canada - National Science Library

    Baroody, J. R

    2000-01-01

    National military strategy involves evaluating all elements of power, analyzing their capabilities and limitations, and incorporating these tools into a course of military action to secure political goals...

  14. The Role of Corporate Defense Services in International Security Strategy

    National Research Council Canada - National Science Library

    Baroody, J. R

    2000-01-01

    .... The privatization and outsourcing of activities that were once solely the province of sovereign governments provide challenges and opportunities to planners and analysts involved in national security strategy...

  15. Computing security strategies in finite horizon repeated Bayesian games

    KAUST Repository

    Lichun Li; Langbort, Cedric; Shamma, Jeff S.

    2017-01-01

    in the worst case. First, a security strategy that directly depends on both players' history actions is derived by refining the sequence form. Noticing that history action space grows exponentially with respect to the time horizon, this paper further presents a

  16. Parser Macros for Scala

    OpenAIRE

    Duhem, Martin; Burmako, Eugene

    2015-01-01

    Parser macros are a new kind of macros that allow developers to create new language constructs and to define their own syntax for using them. In this report, we present why parser macros are useful and the kind of problems that they help to solve. We will also see how they are implemented and gain insight about how they take advantage from scala.meta, the new metaprogramming toolkit for Scala. Finally, we will discuss what are the current limitations of parser macros and what is left for futu...

  17. MACRO-PUBLIC RELATIONS: CRISIS COMMUNICATION IN THE AGE OF INTERNET

    Directory of Open Access Journals (Sweden)

    Zhongxuan Lin

    2013-12-01

    Full Text Available In order to study the crisis communication in the age of Internet, the study takes the battle between two Internet companies, Tencent and Qihoo, as a case study, but focuses more on their huge public audiences, which may be defined as a “macro-public” crowd. The study employs multiple research methods including survey, focus groups interviews and content analysis to explore their “macro-public relations” which may be driven by the spiral of silence and crowd psychology. This dynamic underground power is the reason that two companies employed similar public relations strategies in crisis communication but the results of the crisis were different. The study attempts to contribute to the knowledge base by defining and highlighting the power and function of “macro-public relations” for crisis communication in the age of Internet.

  18. Cyber Security Test Strategy for Non-safety Display System

    International Nuclear Information System (INIS)

    Son, Han Seong; Kim, Hee Eun

    2016-01-01

    Cyber security has been a big issue since the instrumentation and control (I and C) system of nuclear power plant (NPP) is digitalized. A cyber-attack on NPP should be dealt with seriously because it might cause not only economic loss but also the radioactive material release. Researches on the consequences of cyber-attack onto NPP from a safety point of view have been conducted. A previous study shows the risk effect brought by initiation of event and deterioration of mitigation function by cyber terror. Although this study made conservative assumptions and simplifications, it gives an insight on the effect of cyber-attack. Another study shows that the error on a non-safety display system could cause wrong actions of operators. According to this previous study, the failure of the operator action caused by a cyber-attack on a display system might threaten the safety of the NPP by limiting appropriate mitigation actions. This study suggests a test strategy focusing on the cyber-attack on the information and display system, which might cause the failure of operator. The test strategy can be suggested to evaluate and complement security measures. Identifying whether a cyber-attack on the information and display system can affect the mitigation actions of operator, the strategy to obtain test scenarios is suggested. The failure of mitigation scenario is identified first. Then, for the test target in the scenario, software failure modes are applied to identify realistic failure scenarios. Testing should be performed for those scenarios to confirm the integrity of data and to assure effectiveness of security measures

  19. Cyber Security Test Strategy for Non-safety Display System

    Energy Technology Data Exchange (ETDEWEB)

    Son, Han Seong [Joongbu University, Geumsan (Korea, Republic of); Kim, Hee Eun [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security has been a big issue since the instrumentation and control (I and C) system of nuclear power plant (NPP) is digitalized. A cyber-attack on NPP should be dealt with seriously because it might cause not only economic loss but also the radioactive material release. Researches on the consequences of cyber-attack onto NPP from a safety point of view have been conducted. A previous study shows the risk effect brought by initiation of event and deterioration of mitigation function by cyber terror. Although this study made conservative assumptions and simplifications, it gives an insight on the effect of cyber-attack. Another study shows that the error on a non-safety display system could cause wrong actions of operators. According to this previous study, the failure of the operator action caused by a cyber-attack on a display system might threaten the safety of the NPP by limiting appropriate mitigation actions. This study suggests a test strategy focusing on the cyber-attack on the information and display system, which might cause the failure of operator. The test strategy can be suggested to evaluate and complement security measures. Identifying whether a cyber-attack on the information and display system can affect the mitigation actions of operator, the strategy to obtain test scenarios is suggested. The failure of mitigation scenario is identified first. Then, for the test target in the scenario, software failure modes are applied to identify realistic failure scenarios. Testing should be performed for those scenarios to confirm the integrity of data and to assure effectiveness of security measures.

  20. Polish Defense Policy in the Context of National Security Strategy

    National Research Council Canada - National Science Library

    Bieniek, Piotr S

    2006-01-01

    ...) and the North Atlantic Treaty Organization (NATO). Polish security policy and strategy is shaped by its geographical location, which places Poland in NATO's main strategic area opposite the Russian Federation and Belarus...

  1. Minapadi Development Strategy in Supporting National Food Security

    Science.gov (United States)

    Lestari, Sri; Bambang, Azis Nur

    2018-02-01

    Efforts to achieve food security, especially food self-sufficiency, face severe challenges. Intensification needs to be done in optimizing the existing land by applying integrated agriculture. One of them is by integrating agriculture and fishery aspect with implementation of minapadi. Minapadi cultivation has actually grown since a long time, but in the course of time this system Began displaced because of pesticides and chemical fertilizers. Become flagship Minapadi back in line with the increasing public awareness of the importance of sustainable environment, health, increasing demand for organic products that are free from pesticide residues which means safe for consumption. Minapadi is the answer to the fulfillment of people's need for carbohydrate and protein food. Blending the fulfillment of carbohydrates is rice as the staple food of most people with the fulfillment of animal protein from fish commodities to add nutritional value. In realizing the food security strategy is required Minapadi development. This descriptive research aims to find out various minapadi development strategies in several regions with different methods based on the literature and previous studies. The result is the formulation of minapadi development strategy in an area not necessarily can be applied in other areas.This occurs because of differences in setting criteria/ variables based on the characteristics and potential of a region, the strengths and opportunities, as well as the weaknesses and threats that the area may encounter.

  2. Strategies to Minimize the Effects of Information Security Threats on Business Performance

    Science.gov (United States)

    Okoye, Stella Ifeyinwa

    2017-01-01

    Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…

  3. Security Strategies of Both Players in Asymmetric Information Zero-Sum Stochastic Games with an Informed Controller

    KAUST Repository

    Li, Lichun

    2017-11-07

    This paper considers a zero-sum two-player asymmetric information stochastic game where only one player knows the system state, and the transition law is controlled by the informed player only. For the informed player, it has been shown that the security strategy only depends on the belief and the current stage. We provide LP formulations whose size is only linear in the size of the uninformed player\\'s action set to compute both history based and belief based security strategies. For the uninformed player, we focus on the regret, the difference between 0 and the future payoff guaranteed by the uninformed player in every possible state. Regret is a real vector of the same size as the belief, and depends only on the action of the informed player and the strategy of the uninformed player. This paper shows that the uninformed player has a security strategy that only depends on the regret and the current stage. LP formulations are then given to compute the history based security strategy, the regret at every stage, and the regret based security strategy. The size of the LP formulations are again linear in the size of the uninformed player action set. Finally, an intrusion detection problem is studied to demonstrate the main results in this paper.

  4. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process guidance and assistance and strategy review in collaboration...

  5. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  6. Formal And Informal Macro-Regional Transport Clusters As A Primary Step In The Design And Implementation Of Cluster-Based Strategies

    Directory of Open Access Journals (Sweden)

    Nežerenko Olga

    2015-09-01

    Full Text Available The aim of the study is the identification of a formal macro-regional transport and logistics cluster and its development trends on a macro-regional level in 2007-2011 by means of the hierarchical cluster analysis. The central approach of the study is based on two concepts: 1 the concept of formal and informal macro-regions, and 2 the concept of clustering which is based on the similarities shared by the countries of a macro-region and tightly related to the concept of macro-region. The authors seek to answer the question whether the formation of a formal transport cluster could provide the BSR a stable competitive position in the global transportation and logistics market.

  7. US National Security Strategy and preemption

    International Nuclear Information System (INIS)

    Kristensen, H.M.

    2006-01-01

    According to a US National Security Strategy analysis conducted in 2006, preemption has evolved from concept into doctrine. The concept plan for Global Strike (CONPLAN 8022-02) will be maintained by the Joint Functional Component Command for Space and Global Strike (JFCC-SGS), which is planned to be fully operational from the autumn of 2006. The aim of CONPLAN 8022 is to be able to destroy by nuclear weapons those targets that cannot be destroyed by other means. Should deterrence fail, weapons must be ready to be put to use, be they nuclear or conventional. (author)

  8. Household food security status and coping strategies of rural ...

    African Journals Online (AJOL)

    Household food security status and coping strategies of rural dwellers in Irewole local government areas of Osun State. CG Ajala. Abstract. No Abstract. Bowen Journal of Agriculture Vol. 3 (2) 2006: pp. 192-199. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT.

  9. Impact of water scarcity on food security at macro level in Pakistan

    OpenAIRE

    Fahim, Muhammad Amir

    2011-01-01

    Pakistan is confronting the problem of water scarcity which is rendering an adverse impact on food security. The study examines the impact of water scarcity on food security in an era of climate change. It further focuses on projecting the future trends of water and food stock. The research effort probes the links among water scarcity, climate change, food security, water security, food inflation, poverty and management of water resources. Data on food security was collected from the FSA (Foo...

  10. 101 Ready-To-Use Excel Macros

    CERN Document Server

    Alexander, Michael

    2012-01-01

    Save time and be more productive with this helpful guide to Excel macros! While most books about Excel macros offer only minor examples, usually aimed at illustrating a particular topic, this invaluable resource provides you with the tools needed to efficiently and effectively program Excel macros immediately. Step-by-step instructions show you how to create VBA macros and explain how to customize your applications to look and work exactly as you want them to. By the end of the book, you will understand how each featured macro works, be able to reuse the macros included in the book and online,

  11. Improved security detection strategy in quantum secure direct communication protocol based on four-particle Green-Horne-Zeilinger state

    Energy Technology Data Exchange (ETDEWEB)

    Li, Jian; Nie, Jin-Rui; Li, Rui-Fan [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Jing, Bo [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Beijing Institute of Applied Meteorology, Beijing (China). Dept. of Computer Science

    2012-06-15

    To enhance the efficiency of eavesdropping detection in the quantum secure direct communication protocol, an improved quantum secure direct communication protocol based on a four-particle Green-Horne-Zeilinger (GHZ) state is presented. In the protocol, the four-particle GHZ state is used to detect eavesdroppers, and quantum dense coding is used to encode the message. In the security analysis, the method of entropy theory is introduced, and two detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference that has been introduced. If the eavesdropper wants to obtain all the information, the detection rate of the quantum secure direct communication using an Einstein-Podolsky-Rosen (EPR) pair block will be 50% and the detection rate of the presented protocol will be 87%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol proposed is more secure than the others. (orig.)

  12. Security Strategies of Both Players in Asymmetric Information Zero-Sum Stochastic Games with an Informed Controller

    KAUST Repository

    Li, Lichun; Langbort, Cedric; Shamma, Jeff S.

    2017-01-01

    that the security strategy only depends on the belief and the current stage. We provide LP formulations whose size is only linear in the size of the uninformed player's action set to compute both history based and belief based security strategies. For the uninformed

  13. National Security Strategy: A Flawed Guide to the Future, Political Science

    National Research Council Canada - National Science Library

    Leahy, Michael

    2003-01-01

    The Goldwater-Nichols Defense Department Reorganization Act of 1986 requires the executive branch to periodically provide written documentation of the United States National Security Strategy (NSS). The George W...

  14. Micro-processus et macro-structures

    Directory of Open Access Journals (Sweden)

    Aaron Victor Cicourel

    2008-10-01

    Full Text Available Des approches sociologiques traditionnelles ont défini des macro-structures sociales comme un niveau particulier de la réalité sociale, à distinguer des micro-épisodes de l’action sociale. Cela les a conduits à concevoir ces macro-structures et à mener des recherches sur elles de manière plus ou moins indépendante des pratiques observables de la vie quotidienne. Cicourel soutient que les faits (macro-sociaux ne sont pas simplement donnés, mais émergent de pratiques routinières de la vie de tous les jours. Le macro, au sens de descriptions résumées, hors contexte, normalisées et typifiées, est un produit typique des procédures interactives et organisationnelles qui transforment les micro-événements en structures macro-sociales. Ainsi une précondition pour l’intégration des phénomènes micro- et macro-sociaux dans notre théorie et dans notre méthodologie renvoie à l’identification des processus contribuant à la création de macro-structures par des inférences routinières, des interprétations et des procédure de résumé. Le texte montre aussi que les différences entre approches micro-sociologiques apparaissent parallèles à celles existant entre approches micro et macro. On se centrant sur de petits fragments d’interactions conversationnelles, certains travaux micro-sociologiques tendent à ignorer ce qui informe ces interactions conversationnelles pour les participants eux-mêmes. Les comptes rendus décontextualisés produits par de telles méthodes ressemblent à la décontextualisation résultant des procédures macro-sociologiques d’agrégation. Contre cela, Cicourel défend la constitution de bases de données comparatives n’incluant pas seulement le contexte des interactions de face à face, mais étudiant aussi les phénomènes sociaux de manière systématique à travers différents contextes.Micro-processes and macro-structures. Notes on articulation between different levels of analysis

  15. Dynamic modeling and adaptive vibration suppression of a high-speed macro-micro manipulator

    Science.gov (United States)

    Yang, Yi-ling; Wei, Yan-ding; Lou, Jun-qiang; Fu, Lei; Fang, Sheng; Chen, Te-huan

    2018-05-01

    This paper presents a dynamic modeling and microscopic vibration suppression for a flexible macro-micro manipulator dedicated to high-speed operation. The manipulator system mainly consists of a macro motion stage and a flexible micromanipulator bonded with one macro-fiber-composite actuator. Based on Hamilton's principle and the Bouc-Wen hysteresis equation, the nonlinear dynamic model is obtained. Then, a hybrid control scheme is proposed to simultaneously suppress the elastic vibration during and after the motor motion. In particular, the hybrid control strategy is composed of a trajectory planning approach and an adaptive variable structure control. Moreover, two optimization indices regarding the comprehensive torques and synthesized vibrations are designed, and the optimal trajectories are acquired using a genetic algorithm. Furthermore, a nonlinear fuzzy regulator is used to adjust the switching gain in the variable structure control. Thus, a fuzzy variable structure control with nonlinear adaptive control law is achieved. A series of experiments are performed to verify the effectiveness and feasibility of the established system model and hybrid control strategy. The excited vibration during the motor motion and the residual vibration after the motor motion are decreased. Meanwhile, the settling time is shortened. Both the manipulation stability and operation efficiency of the manipulator are improved by the proposed hybrid strategy.

  16. New nuclear power in the UK: A strategy for energy security?

    International Nuclear Information System (INIS)

    Watson, Jim; Scott, Alister

    2009-01-01

    The aim of this paper is to explore the extent to which the construction of new nuclear power plants in the UK can safeguard or enhance energy security. The paper starts with a discussion of energy security, and breaks it down into four main categories of threat. These include threats due to fossil fuel scarcity and external disruptions, problems due to a lack of investment in infrastructure, threats due to technology or infrastructure failure, and risks due to domestic activism or terrorism. The paper then discusses one of the most common strategies put forward to improve security-the promotion of diversity within energy systems. Following this, the paper assesses the potential for new nuclear investment to ameliorate security threats in each of the four categories introduced earlier in the paper. The paper concludes that whilst nuclear investment can help to mitigate some threats to UK energy security, the government's case for supporting this investment ignores some equally important security issues. As a result, the energy security case for nuclear power has not yet been made.

  17. New nuclear power in the UK. A strategy for energy security?

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Jim; Scott, Alister [Sussex Energy Group, SPRU, The Freeman Centre, University of Sussex, Brighton, East Sussex BN1 9QE (United Kingdom)

    2009-12-15

    The aim of this paper is to explore the extent to which the construction of new nuclear power plants in the UK can safeguard or enhance energy security. The paper starts with a discussion of energy security, and breaks it down into four main categories of threat. These include threats due to fossil fuel scarcity and external disruptions, problems due to a lack of investment in infrastructure, threats due to technology or infrastructure failure, and risks due to domestic activism or terrorism. The paper then discusses one of the most common strategies put forward to improve security - the promotion of diversity within energy systems. Following this, the paper assesses the potential for new nuclear investment to ameliorate security threats in each of the four categories introduced earlier in the paper. The paper concludes that whilst nuclear investment can help to mitigate some threats to UK energy security, the government's case for supporting this investment ignores some equally important security issues. As a result, the energy security case for nuclear power has not yet been made. (author)

  18. New nuclear power in the UK: A strategy for energy security?

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Jim, E-mail: w.j.watson@sussex.ac.u [Sussex Energy Group, SPRU, Freeman Centre, University of Sussex, Brighton, East Sussex BN1 9QE (United Kingdom); Scott, Alister [Sussex Energy Group, SPRU, Freeman Centre, University of Sussex, Brighton, East Sussex BN1 9QE (United Kingdom)

    2009-12-15

    The aim of this paper is to explore the extent to which the construction of new nuclear power plants in the UK can safeguard or enhance energy security. The paper starts with a discussion of energy security, and breaks it down into four main categories of threat. These include threats due to fossil fuel scarcity and external disruptions, problems due to a lack of investment in infrastructure, threats due to technology or infrastructure failure, and risks due to domestic activism or terrorism. The paper then discusses one of the most common strategies put forward to improve security-the promotion of diversity within energy systems. Following this, the paper assesses the potential for new nuclear investment to ameliorate security threats in each of the four categories introduced earlier in the paper. The paper concludes that whilst nuclear investment can help to mitigate some threats to UK energy security, the government's case for supporting this investment ignores some equally important security issues. As a result, the energy security case for nuclear power has not yet been made.

  19. Food Security Strategies for Vanuatu

    OpenAIRE

    Welegtabit, Shadrack R.

    2001-01-01

    This report describes and analyzes food security conditions and policies in Vanuatu. The national food security systems are dualistic in nature, and the rural and urban food security systems are weakly related. Household food security in rural areas is primarily determined by access to arable land and fishery resources, whereas in urban areas household food security is primarily determined by access to employment. Household food security has been a concern in both rural and urban areas. Both ...

  20. Universal compliance: The Carnegie Endowment's new strategy for nuclear security

    International Nuclear Information System (INIS)

    Gottemoeller, R.

    2005-01-01

    I would like to give a short briefing on Universal Compliance, the Carnegie Endowment's new strategy for nuclear security. It contains our recommendations for a new, effective nuclear non-proliferation strategy, set out against a description of the rapidly evolving security environment. I will begin with a description of that environment, but first I would like to remind you of the process that we followed in producing this report: - We launched a draft of the report at the Carnegie International Nonproliferation Conference in June 2004. In the months afterwards we sought comments and expert opinion from experts in the United States of America and around the world - we visited 15 countries. We truly tried to get comments from the broadest possible community. - I would also like to emphasize that this was a team effort, involving our President, Jessica Mathews, and four other senior experts at the Endowment

  1. 75 FR 18819 - Second DRAFT NIST Interagency Report (NISTIR) 7628, Smart Grid Cyber Security Strategy and...

    Science.gov (United States)

    2010-04-13

    ... a cyber attack. 2. It is essential that those parts or equipment of the Smart Grid that optimize the...-0143-01] Second DRAFT NIST Interagency Report (NISTIR) 7628, Smart Grid Cyber Security Strategy and... (NIST) seeks comments on the second draft of NISTIR 7628, Smart Grid Cyber Security Strategy and...

  2. Children's perceptions of emotion regulation strategy effectiveness: links with attachment security.

    Science.gov (United States)

    Waters, Sara F; Thompson, Ross A

    2016-08-01

    Six- and nine-year-old children (N = 97) heard illustrated stories evoking anger in a story character and provided evaluations of the effectiveness of eight anger regulation strategies. Half the stories involved the child's mother as social partner and the other half involved a peer. Attachment security was assessed via the Security Scale. Children reported greater effectiveness for seeking support from adults and peers in the peer context than the mother context, but perceived venting as more effective with mothers. Children with higher security scores were more likely to endorse problem solving and less likely to endorse aggression in both social contexts than those with lower security scores. Early evidence for gender differences was found in that boys endorsed the effectiveness of distraction while girls endorsed venting their emotion.

  3. A generalized macro-assembler

    International Nuclear Information System (INIS)

    Kaul, Mohan Lai

    1970-01-01

    The objective of this research is to study existing macro assemblers, and to create a generalized macro assembler, MAG-I, which is a system independent of a source language, and provides the following possibilities: development of any existing language, translation from a language to another, and creation of a new language. The user can choose his own notations to define macros. The system is implemented on an IBM 360/91 computer. Programs are written in symbolic language and the input/output software is written in Fortran [fr

  4. Maternal Strategies to Access Food Differ by Food Security Status.

    Science.gov (United States)

    Gorman, Kathleen S; McCurdy, Karen; Kisler, Tiffani; Metallinos-Katsaras, Elizabeth

    2017-01-01

    Household food insecurity is associated with health and behavior risk. Much less is known about how food insecurity is related to strategies that adults use in accessing food: how and where they shop, use of alternative food sources, and their ability to manage resources. To examine how maternal behaviors, including shopping, accessing alternative sources of food, and managing resources, are related to household food security status (HHFSS). Cross-sectional study collecting survey data on HHFSS, shopping behaviors, use of alternative food sources, and managing resources obtained from low-income mothers of preschool-aged children. One hundred sixty-four low-income mothers of young children (55% Hispanic) from two communities in Rhode Island. HHFSS was measured using 10 items from the 18-item Core Food Security Module to assess adult food security. Mothers were surveyed about where, when, and how often they shopped; the strategies they use when shopping; their use of alternative sources of food, including federal, state, and local assistance; and their ability to manage their resources. Analysis of variance and χ 2 analyses assessed the associations between demographic variables, shopping, accessing alternative food sources, and managing resources, and HHFSS. Multivariate logistic regression assessed the associations between HHFSS and maternal demographic variables, food shopping, strategies, alternative sources of food, and ability to manage resources. Maternal age and language spoken at home were significantly associated with HHFSS; food insecurity was 10% more likely among older mothers (adjusted odds ratio [aOR] 1.10, 95% CI 1.03 to 1.17) and 2.5 times more likely among Spanish-speaking households (compared with non-Spanish speaking [aOR 3.57, 95% CI 1.25 to 10.18]). Food insecurity was more likely among mothers reporting more informal strategies (aOR 1.98, 95% CI 1.28 to 3.01; P<0.05) and perceiving greater inability to manage resources (aOR 1.60, 95% CI 1

  5. Macro-economic environmental models

    International Nuclear Information System (INIS)

    Wier, M.

    1993-01-01

    In the present report, an introduction to macro-economic environmental models is given. The role of the models as a tool for policy analysis is discussed. Future applications, as well as the limitations given by the data, are brought into focus. The economic-ecological system is described. A set of guidelines for implementation of the system in a traditional economic macro-model is proposed. The characteristics of empirical national and international environmental macro-economic models so far are highlighted. Special attention is paid to main economic causalities and their consequences for the environmental policy recommendations sat by the models. (au) (41 refs.)

  6. ZEUS - standardized macros for the TPA computer

    International Nuclear Information System (INIS)

    Winde, M.

    1976-01-01

    An existing cross-assembler with macro-option was modified to allow the usage of the ZEUS macros. The ZEUS macros are understood by the assembler without prior definition by the user. ZEUS macros allow the programmer, who is obliged to code his TPA (PDP-8) programs on the assembler level to formulate his program logic as in a higher level language. ZEUS macros offer all basic elements necessary for structured programming. (author)

  7. Macro-Fiber Composite Based Transduction

    Science.gov (United States)

    2016-03-01

    substrate Material properties of single crystal macro fiber composite actuators for active twist rotor blades Park, Jae-Sang (Seoul National...Passive Smart Structures and Integrated Systems 2007 Material properties of single crystal macro fiber composite actuators for active twist rotor ...19b. TELEPHONE NUMBER (Include area code) 10-03-20 16 Final Report 01 Jan 2013 - 31 Dec 2015 Macro-Fiber Composite Based Transduction N000-14-13-1-0212

  8. Modeling Turkey’s future LNG supply security strategy

    International Nuclear Information System (INIS)

    Efe Biresselioglu, Mehmet; Hakan Demir, Muhittin; Kandemir, Cansu

    2012-01-01

    Turkey was among those countries which decided to increase its natural gas consumption in the 1990s, due to its relative low cost and lack of impact on the environment. However, a heavy dependence on imports, from Algeria, Qatar and Nigeria, respectively, creates a threat to energy security, both in terms of source and supply diversity. Accordingly, we follow an analytical approach to identify the accuracy of our assumption, considering the current economic, political and security risk. To this end, we formulate and solve a mixed integer programming model that determines the optimal sourcing strategy for Turkey’s increasing LNG demand. This model demonstrates a number of alternative policy options for LNG supply. Furthermore, we consider that increasing the proportion of LNG in the overall gas supply will contribute to the aim of improving Turkey’s level of energy security. - Highlights: ► Turkey’s best policy option is to increase the share of LNG. ► Turkey’s main suppliers of LNG will be Algeria, Egypt, Nigeria, and Trinidad and Tobago. ► Norway, Libya, and Oman contribute to the supply with rather smaller shares. ► With high risk scenario Algeria, Egypt, Nigeria and Libya will not be suppliers. ► Oman and Qatar will cover; even though they are high-cost suppliers.

  9. Why Macro Practice Matters

    Science.gov (United States)

    Reisch, Michael

    2016-01-01

    This article asserts that macro practice is increasingly important in today's rapidly changing and complex practice environment. It briefly explores the history of macro practice in U.S. social work, summarizes its major contributions to the profession and to U.S. society, and provides some suggestions for how social work programs can expand…

  10. Spreadsheet macros for coloring sequence alignments.

    Science.gov (United States)

    Haygood, M G

    1993-12-01

    This article describes a set of Microsoft Excel macros designed to color amino acid and nucleotide sequence alignments for review and preparation of visual aids. The colored alignments can then be modified to emphasize features of interest. Procedures for importing and coloring sequences are described. The macro file adds a new menu to the menu bar containing sequence-related commands to enable users unfamiliar with Excel to use the macros more readily. The macros were designed for use with Macintosh computers but will also run with the DOS version of Excel.

  11. Linking Resilience and Transformation as Micro- and Macro Adaptation

    Science.gov (United States)

    Friedman, E.; Breitzer, R.; Solecki, W. D.

    2017-12-01

    The concept of resiliency within climate adaptation planning and practice is widespread, but in some ways it has begun to suffer from its own success. While resiliency provides a valuable frame for understanding the conditions and opportunities for localized responses to increasing climate risks, the concept's ubiquitous use leads to it being applied to often conflicting policy agendas, which can mask or limit the capacity to connect efforts focused on near term risk to longer term and emergent climate threats in communities. These challenges are particularly evident in the context of extreme events and in the post extreme event policy windows. To overcome these issues and take advantage of the post-event policy window, the NOAA RISA Climate Change Risk in the Urban Northeast (CCRUN) project has been developing two specific, "boutique", policy tools. These include the PELT (Post-event learning toolkit) and MART (Macro-adaptation Resilience toolkit) toolkits. Embedded in these toolkits are two approaches to small scale strategies often associated with near term action (i.e., micro-adaptation) and large scale strategies associated with broad longer term needs (i.e., macro-adaptation). In this paper, these two approaches - micro and macro adaptation - are theoretically defined and presented in practice through the beta-testing of the PELT and MART toolkits. Most importantly, we illustrate how the theoretical links between resiliency and transformation can be operationalized through the use of these approaches, and how these approaches can be implemented in everyday risk management practice. We present our work through selected case studies in the Northeast US region, specifically in Jamaica Bay, New York, and Eastwick neighborhood in Philadelphia.

  12. Joint Macro and Femto Field Performance and Interference Measurements

    DEFF Research Database (Denmark)

    Jørgensen, Niels T.K.; Isotalo, Tero; Pedersen, Klaus

    2012-01-01

    In this paper macro performance in a co-channel macro and femto setup is studied. Measurements are performed in a live Universal Mobile Telecommunication System (UMTS) network. It is concluded that femto interference does not affect macro downlink (DL) performance as long as the macro Received Si...... radius smaller than 5 meter – with realistic power settings. This makes co-channel femto deployment less promising in dense macro environments with good macro RSCP coverage.......In this paper macro performance in a co-channel macro and femto setup is studied. Measurements are performed in a live Universal Mobile Telecommunication System (UMTS) network. It is concluded that femto interference does not affect macro downlink (DL) performance as long as the macro Received...... Signal Code Power (RSCP) is stronger than femto RSCP. We also conclude that a macro escape carrier is a robust DL interference management solution. In uplink (UL) direction it is shown that a single femto UE close to macro cell potentially can cause a noise rise of 6 dB in the surrounding macro cell...

  13. Resilient Communication: A New Crisis Communication Strategy for Homeland Security

    Science.gov (United States)

    2012-03-01

    communication theory. Author, Timothy Coombs , in Ongoing Crisis Communication , discusses the need for a crisis management 10 plan to prepare for potential... COMMUNICATION : A NEW CRISIS COMMUNICATION STRATEGY FOR HOMELAND SECURITY by Sharon L. Watson March 2012 Thesis Advisor: Christopher Bellavita...REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Resilient Communication : A New Crisis Communication

  14. A security framework for nationwide health information exchange based on telehealth strategy.

    Science.gov (United States)

    Zaidan, B B; Haiqi, Ahmed; Zaidan, A A; Abdulnabi, Mohamed; Kiah, M L Mat; Muzamel, Hussaen

    2015-05-01

    This study focuses on the situation of health information exchange (HIE) in the context of a nationwide network. It aims to create a security framework that can be implemented to ensure the safe transmission of health information across the boundaries of care providers in Malaysia and other countries. First, a critique of the major elements of nationwide health information networks is presented from the perspective of security, along with such topics as the importance of HIE, issues, and main approaches. Second, a systematic evaluation is conducted on the security solutions that can be utilized in the proposed nationwide network. Finally, a secure framework for health information transmission is proposed within a central cloud-based model, which is compatible with the Malaysian telehealth strategy. The outcome of this analysis indicates that a complete security framework for a global structure of HIE is yet to be defined and implemented. Our proposed framework represents such an endeavor and suggests specific techniques to achieve this goal.

  15. An Assessment of the United States National Security Strategy for Combating Terrorism

    National Research Council Canada - National Science Library

    Chambliss, John

    2004-01-01

    .... While terrorism may be simply viewed as a crime against humanity the United States must pursue a comprehensive policy and strategy to deal with such acts anywhere and anytime because they threaten its national security...

  16. Macro-environmental policy: Principles and design

    International Nuclear Information System (INIS)

    Huppes, G.

    1993-01-01

    The central theme of this book is how macro-environmental policy can be developed, which does not prescribe or suggest specific technologies and products bu realizes the environmental quality desired by changing the general context. The publication is composed of four main parts. The framework for analysis and the normative principles for policy design and evaluation, the first two parts, form the analytic core. The framework for analysis gives a classification of instruments in terms of permutations of a limited number of defining elements. The normative principles guide choices in instrument design and, as the flexible response strategy, guide their application in specific policies. Detailing two main new instruments (the standard method for life cycle analysis and the substance deposit, and applying the instrument strategy as developed to the cases make up the next two parts

  17. MARKAL-MACRO: A linked model for energy-economy analysis

    International Nuclear Information System (INIS)

    Manne, A.S.; Wene, C.O.

    1992-02-01

    MARKAL-MACRO is an experiment in model linkage for energy and economy analysis. This new tool is intended as an improvement over existing methods for energy strategy assessment. It is designed specifically for estimating the costs and analyzing the technologies proposed for reducing environmental risks such as global climate change or regional air pollution. The greenhouse gas debate illustrates the usefulness of linked energy-economy models. A central issue is the coupling between economic growth, the level of energy demands, and the development of an energy system to supply these demands. The debate is often connected with alternative modeling approaches. The competing philosophies may be labeled ''top-down macroeconomic'' and ''bottom-up engineering'' perspectives. MARKAL is a systems engineering (physical process) analysis built on the concept of a Reference Energy System (RES). MARKAL is solved by means of dynamic linear programming. In most applications, the end use demands are fixed, and an economically efficient solution is obtained by minimizing the present value of energy system's costs throughout the planning horizon. MACRO is a macroeconomic model with an aggregated view of long-term economic growth. The basis input factors of production are capital, labor and individual forms of energy. MACRO is solved by nonlinear optimization

  18. On the merits of plant-based proteins for global food security: Marrying macro and micro perspectives

    NARCIS (Netherlands)

    de Boer, J.; Aiking, H.

    2011-01-01

    This paper aims to demonstrate the importance of protein production for the global environment and to give insight into the way consumers frame the protein part of their meal. Using a macro perspective, it presents a review of the literature on current and future impacts of the nutritional

  19. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    ... with state and local stakeholders. Federal state and local reviewers regard the current state and urban homeland security strategies as generally inadequate and indicative of limited strategic planning processes...

  20. Recursive macro generator for the TAS-86 language. First part: the macro generator language. Second part: system internal logics

    International Nuclear Information System (INIS)

    Zraick, Samir

    1970-01-01

    A macro-generator is a translator which is able to interpret and translate a programme written in a macro-language. After a first part presenting the main notions and proposing a brief description of the TAS-86 language, the second part of this research thesis reports the development of the macro-generator language, and notably presents the additional functionalities provided by the macro generator. The development is illustrated by logical flowcharts and programming listings

  1. Bioelectronic platforms for optimal bio-anode of bio-electrochemical systems: From nano- to macro scopes.

    Science.gov (United States)

    Kim, Bongkyu; An, Junyeong; Fapyane, Deby; Chang, In Seop

    2015-11-01

    The current trend of bio-electrochemical systems is to improve strategies related to their applicability and potential for scaling-up. To date, literature has suggested strategies, but the proposal of correlations between each research field remains insufficient. This review paper provides a correlation based on platform techniques, referred to as bio-electronics platforms (BEPs). These BEPs consist of three platforms divided by scope scale: nano-, micro-, and macro-BEPs. In the nano-BEP, several types of electron transfer mechanisms used by electrochemically active bacteria are discussed. In the micro-BEP, factors affecting the formation of conductive biofilms and transport of electrons in the conductive biofilm are investigated. In the macro-BEP, electrodes and separators in bio-anode are debated in terms of real applications, and a scale-up strategy is discussed. Overall, the challenges of each BEP are highlighted, and potential solutions are suggested. In addition, future research directions are provided and research ideas proposed to develop research interest. Copyright © 2015 Elsevier Ltd. All rights reserved.

  2. Assessing information security strategies, tactics, logic and framewortk

    CERN Document Server

    Vladimirov, Andrew; Gavrilenko, Konstantin

    2015-01-01

    Build a strategic response to cyber attacks The activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations. Many people in business understand that the insights from the classics of military strategy are as relevant to modern commerce as they are to war. It is clear that organisations need to develop a view of cybersecurity that goes beyond technology: all staff in the organisation have a role to play, and it is the senior managers who must ensure, like generals marshalling their forces, that all staff know the cyber security policies that

  3. Energy access and security strategies in Small Island Developing States

    International Nuclear Information System (INIS)

    Wolf, Franziska; Surroop, Dinesh; Singh, Anirudh; Leal, Walter

    2016-01-01

    Small Islands Developing States (SIDS) are isolated and surrounded by ocean. The generation and use of energy resources are two very important aspects for the development of SIDS. Unfortunately, most of SIDS do not use their potential in respect of energy resources, and they as a result have to depend on the import of fossil fuels in order to meet their energy needs. This increases the overall vulnerability of SIDS as they have to depend on the rising or fluctuating fossil fuels prices. Some SIDS, especially in the geographically dispersed Pacific region, do not have proper access to energy whereas other SIDS struggle more with energy security issue. At the same time, SIDS are most vulnerable to the impacts and effects of climate change, as they are among the ones to be most severely affected in case of natural calamities and sea-level rise. Drawing on experiences from Fiji and Mauritius, this paper explains core elements related to energy access and security in SIDS, contextualizes and discusses barriers and list some of the strategies that may be used to ensure access to and a continuous supply of energy in SIDS. A situational analysis of two SIDS outlines their current energy situation and compares their energy policies to globally accepted criteria for SIDS policies as well as with each other. It is claimed that the diverging energy performances of Fiji and Mauritius cannot be explained by policies differences. The reasons for the varying energy performances may therefore lie in the administrative and institutional mechanisms used by the two countries in implementing their energy policies. Finally, to enable SIDS to reduce their overall vulnerability and become truly sustainable islands, it is recommended to undertake careful assessments of the particular local contexts under which island energy regimes operate. - Highlights: • Core elements related to energy access/security in SIDS, barriers and strategies. • Situational analysis of two SIDS: Fiji and

  4. Control Systems Cyber Security:Defense in Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  5. Balanced Scorecard: A Strategic Tool in Implementing Homeland Security Strategies

    OpenAIRE

    Caudle, Sharon

    2008-01-01

    This article appeared in Homeland Security Affairs (October 2008), v.4 no.3 Starting in the early 1990s, Robert S. Kaplan and David P. Norton advocated a 'balanced scorecard' translating an organization's mission and existing business strategy into specific strategic objectives that could be linked in cause and effect relationships and measured operationally. The balanced scorecard stressed drivers of future organizational performance -- capabilities, resources, and business processes -- a...

  6. Influence of Secondary Cooling Mode on Solidification Structure and Macro-segregation Behavior for High-carbon Continuous Casting Bloom

    Science.gov (United States)

    Dou, Kun; Yang, Zhenguo; Liu, Qing; Huang, Yunhua; Dong, Hongbiao

    2017-07-01

    A cellular automaton-finite element coupling model for high-carbon continuously cast bloom of GCr15 steel is established to simulate the solidification structure and to investigate the influence of different secondary cooling modes on characteristic parameters such as equiaxed crystal ratio, grain size and secondary dendrite arm spacing, in which the effect of phase transformation and electromagnetic stirring is taken into consideration. On this basis, evolution of carbon macro-segregation for GCr15 steel bloom is researched correspondingly via industrial tests. Based on above analysis, the relationship among secondary cooling modes, characteristic parameters for solidification structure as well as carbon macro-segregation is illustrated to obtain optimum secondary cooling strategy and alleviate carbon macro-segregation degree for GCr15 steel bloom in continuous casting process. The evaluating method for element macro-segregation is applicable in various steel types.

  7. Impacts of macro - and microplastic on macrozoobenthos abundance in intertidal zone

    Science.gov (United States)

    Bangun, A. P.; Wahyuningsih, H.; Muhtadi, A.

    2018-02-01

    Plastics pollution in coastal areas is one of the topics that have received more attention over the past few years. The intertidal zone is a waters area that is directly affected by contamination of plastic waste from land and sea. The purpose of this study was to analyze the types and abundance of plastic waste in the intertidal zone and its impact on macrozoobenthos abundance. This research was conducted at Pesisir Desa Jaring Halus in February-April 2017. Macrozoobenthos and macro - micro plastic were collected by using quadratic transect. Sediments were collected with a core, to a depth of 30 cm. Microplastic and macroplastic abundances were analyzed using separation of sediment density and hand sorting. The dominant micro plastic types were film (52.30%), fiber (24.88%), fragments (22.74%), followed by pellets (0.1%). The total number of microplastics were 326,33 items and macro plastic were 308 items. Macroplastic abundance is positively correlated with microplastic (0.765). The abundance of macrozoobenthos is negatively correlated with microplastic abundance (-0.368) and with macro plastic abundance (-0.633). The management strategies were suggested clean up marine debris, decrease plastic using and built up the station of debris processing.

  8. A comparison between MARKAL-MACRO and MARKAL

    International Nuclear Information System (INIS)

    Schepers, E.

    1995-11-01

    Differences between CO 2 -reduction scenarios of the MARKAL-MACRO model and the MARKAL model are studied. Also attention is paid to the rebound effect, i.e. the effect on a price decrease leads to an increase of the energy demand, and energy savings will result in a redistribution of saved income over other goods and services. MARKAL is an energy supply model and MACRO is a macro-economic model. The combination of the two is an example of a hard-linked model between a top-down model (MACRO) and a bottom-up model (MARKAL). 15 figs., 5 tabs., 18 refs., 2 appendices

  9. Macro-prudentiality and financial stability

    Directory of Open Access Journals (Sweden)

    Cristian Ionescu

    2012-12-01

    Full Text Available Taking into consideration the fact that financial crises, as a manifestation form of the financial instability, are becoming more and more frequent, complex and severe, it is important to discuss about the macroeconomic prudentiality, in order to protect and save the economy of a country or of a region by the inherent fragility of a very developed financial system. Therefore, the paper aims to analyze the following aspects: the macro-prudential regulation (in order to a better understanding of the financial instability process, the development of the macro-prudential vision and instruments (but emphasizing the existing limits and economic policies (in order to implement an operational macro-prudential regulation.

  10. A macro perspective for client-centred practice in curricula: Critique and teaching methods.

    Science.gov (United States)

    Fleming-Castaldy, Rita P

    2015-07-01

    Client-centred practice is often eclipsed by social, economic, and political inequities. Ignoring these realities obstructs clients' goal attainment. The author advocates for the integration of a macro perspective inclusive of participation barriers and supports in occupational therapy curricula and seeks to motivate educators to adopt teaching approaches that develop students' abilities to address the complexities of client-centred practice. This article integrates a critical analysis of the literature on client-centred practice with reflexivity on disability studies and autoethnography. Educational standards require students to learn about the social, economic, and political contexts that impact on client-centred practice and the need for advocacy to enable participation. Theoretical support of a macro perspective for client-centred practice is strongly evident in the literature. Information on methods for teaching students how to actualize these concepts in practice is scant. Thus, strategies to inform the integration of a macro perspective into curricula and concrete activities to develop students' competencies for empowered client-centred practice are required. Educators have an ethical responsibility to critique their pedagogy to determine whether they are adequately preparing students for client-centred practice. The focus must move from teaching a micro perspective of client-centred practice to a macro perspective that enables occupational justice and empowerment.

  11. The International Macro-Environment of an Organization

    OpenAIRE

    Ileana (Badulescu) Anastase; Cornel Grigorut

    2016-01-01

    The international macro-environment (supranational macro-environment) brings together allthe uncontrollable factors with a global impact, and it is related to the organization’s indirectrelationships on international markets. Romania’s globalization and the EU integration increasedthe importance of the macro-environment for all organizations, regardless of their degree ofinternationalization. In marketing, we must master the main agreements between countries and theregulations emanating from ...

  12. Diversification of oil import sources and energy security. A key strategy or an elusive objective?

    International Nuclear Information System (INIS)

    Vivoda, Vlado

    2009-01-01

    This paper explores the relationship between the diversification of sources of imported oil and energy security of oil-importing countries. It examines the importance of diversification policy for oil importers, explains why oil importers implement oil diversification policy, and contextualizes the oil import diversification strategy in the overall energy security policy of oil importers. The paper analyzes the factors and the contexts that affect the level of importance assigned to oil import diversification policy in oil-importing countries, and the limitations that may affect the successful implication of oil import diversification policy. The examples are drawn from the world's top three oil importers, the United States, Japan, and China. The policymakers in these and other oil-importing countries place much importance on energy security. The diversification of oil import sources is used as one of the strategies to enhance energy security in oil-importing countries. This paper is important for policymakers in oil-importing countries as it provides them with a qualitative conceptual framework with which to evaluate the need to diversify their countries' sources of imported oil, and with which to identify the likely limitations to the successful implementation of oil import diversification policy. (author)

  13. Toward an energy security strategy for Canada : a discussion paper

    International Nuclear Information System (INIS)

    2005-12-01

    Energy security strategies for Canada were presented in this paper. Article 6.05 of North American Free Trade Agreement (NAFTA) prohibits Canada from reducing the proportion of energy exported to the United States or Mexico. Between 1982 and 2002, natural gas consumption in Canada rose by 96 per cent while exports increased by 396 per cent. Crude oil consumption increased by 29 per cent, while exports rose by 595 per cent. Government practices have tended towards extracting and exporting resources as quickly as possible with no consideration to resource availability for future generations. In addition, much of the value of Canadian resources has been given to private corporations. The environment has been damaged in order to enable faster extraction, and First Nations, employees, and communities have been placed at the mercy of corporations and international markets. Canada's unique cultural and societal arrangements have not been protected. Four principles to address these concerns were presented: (1) managing non-renewable resources as responsible stewards and conserving their economic availability for future generations; (2) ensuring that the benefits from fossil fuels are invested in other forms of capital that will ensure the future prosperity and energy security of Canada; (3) ensuring that the extraction and use of resources has minimal impacts on the planet and (4) a re-direction of the proceeds from resource exploitation towards education, social and health services, land claims and land use settlements, and the elimination of poverty among First Nations people. It was suggested that energy-related jobs and workers should be protected through the development of an industrial strategy which includes investment in renewable energy development and re-training programs for workers. Consistent depoliticized policies are needed to reduce the impact on low-income Canadians of free-market price swings and the unavoidable costs of environmental protection. It was

  14. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  15. Constraints on genes shape long-term conservation of macro-synteny in metazoan genomes

    Directory of Open Access Journals (Sweden)

    Putnam Nicholas H

    2011-10-01

    Full Text Available Abstract Background Many metazoan genomes conserve chromosome-scale gene linkage relationships (“macro-synteny” from the common ancestor of multicellular animal life 1234, but the biological explanation for this conservation is still unknown. Double cut and join (DCJ is a simple, well-studied model of neutral genome evolution amenable to both simulation and mathematical analysis 5, but as we show here, it is not sufficent to explain long-term macro-synteny conservation. Results We examine a family of simple (one-parameter extensions of DCJ to identify models and choices of parameters consistent with the levels of macro- and micro-synteny conservation observed among animal genomes. Our software implements a flexible strategy for incorporating genomic context into the DCJ model to incorporate various types of genomic context (“DCJ-[C]”, and is available as open source software from http://github.com/putnamlab/dcj-c. Conclusions A simple model of genome evolution, in which DCJ moves are allowed only if they maintain chromosomal linkage among a set of constrained genes, can simultaneously account for the level of macro-synteny conservation and for correlated conservation among multiple pairs of species. Simulations under this model indicate that a constraint on approximately 7% of metazoan genes is sufficient to constrain genome rearrangement to an average rate of 25 inversions and 1.7 translocations per million years.

  16. Writing Excel Macros with VBA

    CERN Document Server

    Roman, Steven

    2008-01-01

    To achieve the maximum control and flexibility from Microsoft® Excel often requires careful custom programming using the VBA (Visual Basic for Applications) language. Writing Excel Macros with VBA, 2nd Edition offers a solid introduction to writing VBA macros and programs, and will show you how to get more power at the programming level: focusing on programming languages, the Visual Basic Editor, handling code, and the Excel object model.

  17. Nuclear security: strategies and techniques

    International Nuclear Information System (INIS)

    Khan, I.K.

    2010-05-01

    The modern society, whether in developed or in developing countries, depend on the availability of nuclear energy and on the day-to-day use of radioactive materials in medicine, agriculture, industry and for research. Before 9/11, these activities were mainly covered by safety rules regarding health and environment. Since 9/ 11, it is clear, that these activities also require adequate security. For the continued and expanded use of nuclear energy or radioactive materials, nuclear security is indispensable and an important prerequisite for successful and sustainable development. Many of our nuclear security services, expert assistance and training events, we have assisted Member States in their efforts to improve their preparedness and response capabilities and acquired a much better understanding of Member States prob and the need for further support. The end of the Cold War was marked by a shift from a bi-polar structure of global security into a more complex and unpredictable configuration of world affairs. It also brought about new security challenges, i.e. an increased probability for low-density regional, national or sub-national conflicts with new and more dispersed threats emanating from a larger number of actors, including non-state actors; terrorists or criminals. The audio-visual impact of modern media has enhanced the socio-psychological impact on a global scale of such conflicts. The number of cases of illicit trafficking in nuclear materials that were recorded since the 90's raised concern about the international physical protection regime and triggered an effort to enhance our capabilities for prevention, detection and responses regarding terrorist acts, as well as to strengthen the Convention on the Physical Protection of Nuclear Material

  18. Linking ground motion measurements and macro-seismic observations in France: A case study based on the RAP (accelerometric) and BCSF (macro-seismic) databases

    International Nuclear Information System (INIS)

    Lesueur, Ch.

    2011-01-01

    Comparison between accelerometric and macro-seismic observations is made for three mw∼4.5 earthquakes of eastern France between 2003 and 2005. Scalar and spectral instrumental parameters are processed from the accelerometric data recorded by nine accelerometric stations located between 29 km and 180 km from the epicentres. Macro-seismic data are based on the French internet reports. In addition to the individual macro-seismic intensity, analysis of the internal correlation between the encoded answers highlights four predominant fields of questions, bearing different physical meanings: 1) 'vibratory motions of small objects', 2) 'displacement and fall of objects', 3) 'acoustic noise', and 4) 'personal feelings'. Best correlations between macro-seismic and instrumental observations are obtained when the macro-seismic parameters are averaged over 10 km radius circles around each station. macro-seismic intensities predicted by published pgv-intensity relationships quite agree with the observed intensities, contrary to those based on pga. The correlations between the macro-seismic and instrumental data, for intensities between ii and v (ems-98), show that pgv is the instrumental parameter presenting the best correlation with all macro-seismic parameters. The correlation with response spectra, exhibits clear frequency dependence over a limited frequency range [0.5-33 hz]. Horizontal and vertical components are significantly correlated with macro-seismic parameters between 1 and 10 hz, a range corresponding to both natural frequencies of most buildings and high energy content in the seismic ground motion. Between 10 and 25 hz, a clear lack of correlation between macro-seismic and instrumental data is observed, while beyond 25 hz the correlation coefficient increases, approaching that of the PGA correlation level. (author)

  19. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes. These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.

  20. Some security strategies for smart cards

    Energy Technology Data Exchange (ETDEWEB)

    Ros, F [Gemalto, St Cyr en Val, BP 6021, 45060 Orlans Cedex (France); Harba, R [LESI, Polytech' Orlans-LESI, 12 rue de Blois, 45067 Orleans Cedex 2 (France)

    2007-07-15

    This paper details current developments at Gemalto in the field of security. It focuses on two different security processes for ID cards. The first one consists in adding observable security features in the ID image to allow quick visual verification and serves mainly to detect counterfeit attempts. The second consists in watermarking ID images during the pre personalization step by a secret key stored in the chip. The interest of the different approaches is demonstrated with several real ID images.

  1. [Heavy metal pollution ecology of macro-fungi: research advances and expectation].

    Science.gov (United States)

    Zhou, Qi-xing; An, Xin-long; Wei, Shu-he

    2008-08-01

    Macro-fungi are the main component of biosphere and one of the ecological resources, and play very important roles in matter cycling and in maintaining ecological balances. This paper summarized and reviewed the research advances in the eco-toxicological effects of heavy metals on macro-fungi, the bioaccumulation function of macro-fungi on heavy metals, the ecological adaptation mechanisms of macro-fungi to heavy metal pollution, the role of macro-fungi as a bio-indicator of heavy metal pollution, and the potential of macro-fungi in the ecological remediation of contaminated environment. To strengthen the researches on the heavy metal pollution ecology of macro-fungi would be of practical significance in the reasonable utilization of macro-fungi resources and in the ecological remediation of contaminated environment.

  2. The International Macro-Environment of an Organization

    Directory of Open Access Journals (Sweden)

    Ileana (Badulescu Anastase

    2016-01-01

    Full Text Available The international macro-environment (supranational macro-environment brings together allthe uncontrollable factors with a global impact, and it is related to the organization’s indirectrelationships on international markets. Romania’s globalization and the EU integration increasedthe importance of the macro-environment for all organizations, regardless of their degree ofinternationalization. In marketing, we must master the main agreements between countries and theregulations emanating from general international bodies, reflecting on their business, on differentforeign markets. Knowledge of the international environment is possible only through an analysisof its components (Anastase, I., 2012, p.41.

  3. Call for a new national security strategy: governing the future instead of deterring it

    Directory of Open Access Journals (Sweden)

    Alexei I. Podberezkin

    2017-01-01

    Full Text Available The article attempts to present a new vision for the strategic development of the Russian Federation. The authors note that the search for strategy should be made on the meta-level analysis in order to take into account either the military and political context of national security or the future interests of Russia. This allows one to reduce uncertainty in the strategic planning process. The author notes that the current military-political strategy of Russia is based on a fairly old idea of deterrence. This strategy is reactive in nature and involves responding to external challenges and threats in the international political environment. Meanwhile, the global political landscape is undergoing a significant transformation, in which a key aspect of national security will be a wide range of connectivity options to further political development of the state and society. Another disadvantage of deterrence strategy is that the threats are not differentiated from national interests and political goals. The author offers his version of the conceptualization of the terminology and the essential differences of different types of threats and assess the consequences of misunderstanding such differences. As for the strategy of deterrence, the authors suggest an alternative strategy of “control”, which aims at the formation of a systemic perspective directions of development of the society. A key element of this strategy is the forging and maintenance of the national human capital, which provides connectivity, adaptability and innovationability of various branches of the governance and dealing with external challenges. “Control” means an intensification strategy of the state policy in the field of science, culture, the promotion of spiritual development and production of advanced innovation.

  4. Call for a new national security strategy: governing the future instead of deterring it

    Directory of Open Access Journals (Sweden)

    Alexei I. Podberezkin

    2017-01-01

    Full Text Available The article attempts to present a new vision for the strategic development of the Russian Federation. The authors note that the search for strategy should be made on the meta-level analysis in order to take into account either the military and political context of national security or the future interests of Russia. This allows one to reduce uncertainty in the strategic planning process. The author notes that the current military-political strategy of Russia is based on a fairly old idea of deterrence. This strategy is reactive in nature and involves responding to external challenges and threats in the international political environment. Meanwhile, the global political landscape is undergoing a significant transformation, in which a key aspect of national security will be a wide range of connectivity options to further political development of the state and society. Another disadvantage of deterrence strategy is that the threats are not differentiated from national interests and political goals. The author offers his version of the conceptualization of the terminology and the essential differences of different types of threats and assess the consequences of misunderstanding such differences. As for the strategy of deterrence, the authors suggest an alternative strategy of “control”, which aims at the formation of a systemic perspective directions of development of the society. A key element of this strategy is the forging and maintenance of the national human capital, which provides connectivity, adaptability and innovationability of various branches  of the governance and dealing with external challenges. “Control” means an intensification strategy of the state policy in the field of science, culture, the promotion of spiritual development and production of advanced innovation.

  5. Automation of the Weighting and its Register Using Macros; Automatizacion de la Pesada y su Registro mediante el Uso de Macro-Instrucciones

    Energy Technology Data Exchange (ETDEWEB)

    Gasco, C.; Ampudia, J.

    2005-07-01

    Macros automate a repetitive or complex task that oneself otherwise would have to execute manually. Macros have been implemented (based on Visual Basic Applications) on the laboratory calculation sheets to obtain automatically the weight-registers from the Balances. The combined utilization of the programme Balint (trademark Precisa) and macros has allowed us to transfer in real time the weight data to the sheets and later information storage. The method for using these macros has been summarised in this report. This way of working permits: to register the data of all the laboratory samples and to be available for auditory purposes. (Author) 4 refs.

  6. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  7. Grand Strategy for the United States in the 21st Century? (A Look at the National Security Strategy Document of 2002 and Beyond)

    National Research Council Canada - National Science Library

    Tinsley, Peter G

    2005-01-01

    This paper examines the National Security Strategy (NSS) document of September 2002 and determines whether it provides a grand strategic framework that can be sustained for the rest of the Bush presidency and beyond...

  8. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  9. Complex fluids with mobile charge-regulating macro-ions

    Science.gov (United States)

    Markovich, Tomer; Andelman, David; Podgornik, Rudi

    2017-10-01

    We generalize the concept of charge regulation of ionic solutions, and apply it to complex fluids with mobile macro-ions having internal non-electrostatic degrees of freedom. The suggested framework provides a convenient tool for investigating systems where mobile macro-ions can self-regulate their charge (e.g., proteins). We show that even within a simplified charge-regulation model, the charge dissociation equilibrium results in different and notable properties. Consequences of the charge regulation include a positional dependence of the effective charge of the macro-ions, a non-monotonic dependence of the effective Debye screening length on the concentration of the monovalent salt, a modification of the electric double-layer structure, and buffering by the macro-ions of the background electrolyte.

  10. THE CULTURE AND ARTS ORGANIZATION: MACRO-SOCIOLOGICAL ASPECT

    Directory of Open Access Journals (Sweden)

    Margarita Rasimovna Pashaeva

    2013-11-01

    Full Text Available In this study we analyze the macro-sociological aspect of culture and arts organization. The subject of research is reputation policy and communication technologies in  macro-sociological aspect of culture and arts organization. The target is the research the effects of macro-sociological aspect in the activities of such organization. In the study were used such methods of research: theoretical study and  synthesis; quantative method of elicitation: questionnaire; information processing methods of primary analysis; interpretation. The results of research can be applied in the activities of different culture and arts organization. The research identified the negative and positive tendencies in the context of the macro-sociological aspect.DOI: http://dx.doi.org/10.12731/2218-7405-2013-8-49

  11. The strategy for the development of information society in Serbia by 2020: Information security and critical infrastructure

    Directory of Open Access Journals (Sweden)

    Danijela D. Protić

    2012-10-01

    Full Text Available The development of technology has changed the world economy and induced new political trends. The European Union (EU and many non-EU member states apply the strategies of information society development that raise the level of information security (IS. The Serbian Government (Government has adopted the Strategy for Information Society in Serbia by 2020 (Strategy, and pointed to the challenges for the development of a modern Serbian information society. This paper presents an overview of the open-ended questions about IS, critical infrastructures and protection of critical infrastructures. Based on publicly available data, some critical national infrastructures are listed. As a possible solution to the problem of IS, the Public Key Infrastructure (PKI-based Information security integrated information system (ISIIS is presented. The ISIIS provides modularity and interoperability of critical infrastructures both in Serbia and neighboring countries.

  12. Security leader insights for information protection lessons and strategies from leading security professionals

    CERN Document Server

    Fahy, Bob

    2014-01-01

    How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Information Protection, a collection of timeless leadership best practices featuring insights from some of the nation's most successful security practitioners, you can. This book can be used as a quick and effective resource to bring your security staff up to speed on security's role in information protection. I

  13. Flexibility and security for older workers: HRM-arrangements in four European countries

    NARCIS (Netherlands)

    Tros, F.

    2010-01-01

    National policies in the Netherlands, Denmark, Germany and Belgium show policy shifts towards active ageing and towards flexicurity to enhance flexibility and security in the labour market. The main question is about the practice and implementation of these macro policies on the workplace level.

  14. Three hitherto unreported macro-fungi from Kashmir Himalaya

    International Nuclear Information System (INIS)

    Pala, S.A.; Wana, A.H.; Boda, R.H.

    2012-01-01

    The Himalayan state, Jammu and Kashmir due to its climate ranging from tropical deciduous forests to temperate and coniferous forests provides congenial habitat for the growth of diverse macro fungal species which in turn gives it the status of 'hub' of macro-fungal species. The macro fungal species richness of the state is directly related to its expansive forest communities and diverse weather patterns, but all the regions of the state have not been extensively surveyed till now. In this backdrop, a systematic survey for exploration and inventorization of macro fungal species of Western Kashmir Himalaya was undertaken during the year 2009 and 2010, which in turn resulted identification of the three species viz., Thelephora caryophyllea (Schaeff.) Pers., Coltricia cinnamomea (Pers.) Murr., and Guepinia helvelloides Fr. as new reports from the Kashmir. These species were identified on the basis of macro and microscopic characters and also the aid of taxonomic keys, field manuals, mushroom herbaria and help from expert taxonomists in the related field was taken into account. (author)

  15. Macro-economic Impact Study for Bio-based Malaysia

    NARCIS (Netherlands)

    Meijl, van H.; Smeets, E.M.W.; Dijk, van M.; Powell, J.P.; Tabeau, A.A.

    2012-01-01

    This Macro-economic Impact Study (MES) provides quantitative insights into the macro-economic effects of introducing green, palmbased alternatives for electricity, fuels, chemicals and materials industries in Malaysia between now and 2030.

  16. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    accompany the drawing up of a new security strategy for the country. A step in the right direction would be if, after public debate, the Government submitted a new version of the country’s security strategy for consideration and approval to the Parliament as the supreme representative body. The new strategy would thus be assigned greater importance than that of 2003 which was adopted only by the Government and, as a result, was often denied the status of a binding document. A broader public debate over the new security strategy would help ensure that the extended concept of security is more fully implemented in practice.

  17. Macro-economic impact of loss of health; Macro-economische impact van gezondheidsverlies

    Energy Technology Data Exchange (ETDEWEB)

    Franchimon, F. [BAM Techniek, Capelle a/d IJssel (Netherlands); Ament, H.J.A. [Universiteit Maastricht, Maastricht (Netherlands); Knies, J.; Pernot, C.E.E. [Pernot Consulting, Heeze (Netherlands); Van Bronswijk, J.M.H. [Technische Universiteit Eindhoven TUE, Eindhoven (Netherlands)

    2010-11-15

    More healthy life years are achievable by dwelling improvements. This article computes the healthy life years that may be gained by increased ventilation rates. It concerns the diseases Asthma, COPD en lung cancer. Increased ventilation removes house dust mites and their allergens, as well as tobacco smoke, which are associated with these diseases. Costs and savings are computes and compared in order to test the macro-economical feasibility of increased ventilation in dwellings. [Dutch] Door verbetering van woningen zijn veel gezonde levensjaren te behalen. In dit artikel worden de gewonnen gezonde levensjaren uitgerekend door meer ventileren voor de ziekten astma, COPD en longkanker. Zowel huisstofmijtallergeen als tabaksrook zijn geassocieerd met astma, COPD en longkanker. De kosten en de opbrengsten van meer ventileren worden met elkaar vergeleken om de macro-economische haalbaarheid te toetsen.

  18. Servitization in a Security Business: Changing the Logic of Value Creation

    Directory of Open Access Journals (Sweden)

    Arto Rajala

    2013-08-01

    Full Text Available How can a firm change its value-creation logic from providing technology to selling technology-based services? This is a question many security companies face today when trying to apply a solutions-based business model in response to recent macro- and microeconomic trends. The fact that customers increasingly demand security as a service, rather than technical equipment, challenges the basis of a security firm's value provision and alters the logic of its operation. In this article, we investigate a technology- and product-oriented security business that is now rapidly transforming into a service business. We use data from a case study to propose a 4C model (conceptualization, calculation, communication, and co-creation of value that can help security providers to objectify their service offerings and succeed in the servitization of their security businesses.

  19. The House of Security: Stakeholder Perceptions of Security Assessment and Importance

    OpenAIRE

    Ang, Wee Horng; Deng, Vicki; Lee, Yang; Madnick, Stuart; Mistree, Dinsha; Siegel, Michael; Strong, Diane

    2007-01-01

    In this paper we introduce a methodology for analyzing differences regarding security perceptions within and between stakeholders, and the elements which affect these perceptions. We have designed the €܈ouse of Security€ݬ a security assessment model that provides the basic framework for considering eight different constructs of security: Vulnerability, Accessibility, Confidentiality, Technology Resources for Security, Financial Resources for Security, Business Strategy for Security, Secur...

  20. Center for Homeland Defense and Security Homeland Security Affairs Journal

    OpenAIRE

    2015-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  1. Measuring Impact of Uncertainty in a Stylized Macro-Economic Climate Model within a Dynamic Game Perspective

    NARCIS (Netherlands)

    Stienen, V.F.; Engwerda, Jacob

    2018-01-01

    In this paper we try to quantify/measure the main factors that influence the equilibrium outcome and pursued strategies in a simplistic model for the use of fossil versus green energy over time. The model is derived using the standard Solow macro-economic growth model in a two-country setting within

  2. Macro Dark Matter

    CERN Document Server

    Jacobs, David M; Lynn, Bryan W.

    2015-01-01

    Dark matter is a vital component of the current best model of our universe, $\\Lambda$CDM. There are leading candidates for what the dark matter could be (e.g. weakly-interacting massive particles, or axions), but no compelling observational or experimental evidence exists to support these particular candidates, nor any beyond-the-Standard-Model physics that might produce such candidates. This suggests that other dark matter candidates, including ones that might arise in the Standard Model, should receive increased attention. Here we consider a general class of dark matter candidates with characteristic masses and interaction cross-sections characterized in units of grams and cm$^2$, respectively -- we therefore dub these macroscopic objects as Macros. Such dark matter candidates could potentially be assembled out of Standard Model particles (quarks and leptons) in the early universe. A combination of earth-based, astrophysical, and cosmological observations constrain a portion of the Macro parameter space; ho...

  3. Construction Strategies of Social Security System for Wan-jiang Urban Belt’s Migrant Workers

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Theoretical debate and practice exploration on social security of migrant workers were introduced.The political direction and security layer on social security for migrant workers in Wan-jiang urban belt were analyzed:the first layer is to implement wage payment guarantee and employment injury insurance;the second layer is to emphasize serious disease insurance and endowment insurance;the third layer is unemployed insurance and social assistance.The primary strategy of building a social security system for migrant workers in Wan-jiang urban belt was put up:wage payment guarantee system that is united in certain regions should be promoted;employment injury insurance system that is undertaken by enterprises should be built;a social health care system for serious diseases should be set up;multi-layers endowment insurance system for migrant workers should be created;vocational training and training in how to start a business should be built as well as the unemployment insurance system;social assistant system based on the basic cost of living allowances should be set up.

  4. Securities and banking: bridges and walls

    Directory of Open Access Journals (Sweden)

    Tommaso Padoa-Schioppa

    2002-09-01

    Full Text Available The paper examines the relationship between banking and securities activities in the light of financial market developments (securitisation, institutionalization of investment, emergence of complex financial instruments, conglomeration and consolidation, with particular reference to Europe. The enhanced links between banking and securitiesbusinesses have generated increased and new risks to financial institutions. However, banks' stability remains crucial for the stability of the financial system as a whole, because of their unique role as provider of liquidity. The paper also addresses the implications of the banking-securities combination for regulatory and supervisory arrangements. The exporting of prudential requirements traditional in banking (such as capital ratios into the securities field, and the importing of securities regulation (such as transparency requirements into the banking sector, can be deemed mutually beneficial. As regards supervision, there is a need to monitor the continued effectiveness of the current framework. This entails strengthening co-operation both at the national level and on a cross-border basis among sectoral supervisors in the micro-prudential field, and between them and central banks in the macro-prudential field.

  5. Macro economic profitability of hourly measurements and binary communications

    International Nuclear Information System (INIS)

    Andersen, Christian; Lund, Arne-Christian

    2005-11-01

    There are several actors that are subject to hourly measurements and dynamic pricing. The effects are registered in several analyses. A typical division would be effects connected to power producers, power deliverers, network companies and end users. In a macro economic analysis the goal would be to identify alterations in total benefits and costs. The transition from studying isolated effects for single actors to a macro economic perspective produces several principal problems. When the analysis is based on the effects for various actors it would be important to identify transitions between various actors that in itself does not contribute to alterations in the macro economic profit. At the same time it will be important that effects to be valued are evaluated in a consistent an consequential way. In this context it may be beneficial to use a model for the actors adaptation to the power market where various effects may be used. This working paper describes utility and cost elements that is a basis for Norwegian and foreign analysis of hourly measurements and dynamic prices. The survey shows that it is a large agreement between different investigations with respect to principle effects to be emphasized. There is however, variation with respect to what effects actually are in operation and quantified. There may also be large deviances in the valuation of various utility and cost components. Some single effects are studied closer. An effort is made to compare certain figures from the literature. However, this comparison has been difficult because it is not always clear what conditions have lead to the figures in use. There are large variations between the various analysis estimates. There may be several reasons. The technical products to be priced may vary. It is also evident that the costs for changing measuring equipment may be dependent of the management strategy. The paper refers to newer theoretical literature about the effects of hourly measurements and dynamic

  6. New approaches in European governance? Perspectives of stakeholders in the Danube macro-region

    Directory of Open Access Journals (Sweden)

    Franziska Sielker

    2016-01-01

    Full Text Available Macro-regional cooperation in the EU are networks that use the horizontal and vertical dimension of the multilevel governance system to influence both strategic decision-making as well as implementation activities. Drawing on an analysis of expert interviews in the Danube Region the paper scrutinizes stakeholders’ shared views towards expectations, challenges and added values, and thereby seeks to explain why a trend towards macro-regions arises and for what reasons stakeholders are getting involved. The analysis of the drivers for stakeholders’ commitment in the EU Danube Region Strategy shows that new governance arrangements need to be adjustable to different contexts, allow for negotiation and new network creation whilst simultaneously offering the political ability to act. The evidence presented suggests that multilevel governance in the EU is becoming increasingly complex, embracing more and different types of cooperation, with soft characteristics as crucial elements.

  7. Clausewitz and the Theory of Military Strategy in Europe - Reflections Upon a Paradigm of Military Strategy Within the European Common Security and Defense Policy (ESDP)

    National Research Council Canada - National Science Library

    Hartmann, Uwe

    2001-01-01

    ... as a core element of the Common Security and Defense Policy of the EU, Based on the interpretation of Clausewitz's theory of war and strategy in Britain, France, and Germany, main commonalities...

  8. Airline Security and a Strategy for Change

    National Research Council Canada - National Science Library

    Welch, Timothy J

    2006-01-01

    .... Obligated to secure the Homeland the United States Government scrambled to develop measures that would uphold societal values while providing an in-depth defense capable of ensuring a more secure society...

  9. The Influence of Micro and Macro Environment Components on Trade Companies in Romania

    OpenAIRE

    Elena Pîndiche; Roxana Ionita

    2013-01-01

    This paper deals with the impact of micro and macro environment components on trade companies in Romania. Trade companies organize and operate under specific environmental conditions impact or both. In the activity of any companies the environment plays a key role in defining its strategies in seizing and using opportunities of development, being practically the support in achieving the objectives of growth, profitability or just survival. Trade companies should have the best possible percept...

  10. A Constructionist Approach for the Study of Strategy as Social Practice

    Directory of Open Access Journals (Sweden)

    Alfredo Rodrigues Leite da Silva

    2012-05-01

    Full Text Available The goal of this paper is to present an analytical perspective of strategy as social practice in organizations by thearticulation of proposals by Foucault, Certeau and Moscovici on social dynamics. To accomplish its intents itdiscusses the convergences and divergences between social dynamics in Foucault (1972, 1999, 2003a, 2003b,knowledge, power and subjectivities from Moscovici (1961, and Social Representation Theory (SRT asarticulated with the concept of everyday strategies and tactics by Certeau (1990. The paper presents the microand macro delineations in investigations involving strategy-making practices in organizations over time. Thestudies of strategy as social practices are focused only on the micro-social level of CEO practices inorganizations and don’t consider the involvement of these practices at the macro-social level. Thus, this paperaims at acknowledging the roles played by experimentation and by the researcher’s theoretical position, but alsoat offering the actors an opportunity to present the micro and macro aspects that involve their strategy practicesin a given organization. This way, a dynamic reference is obtained that allows for the comparison of empiricaldata in the analysis of strategy as a social practice.

  11. Dynamic Resource Partitioning for Downlink Femto-to-Macro-Cell Interference Avoidance

    Directory of Open Access Journals (Sweden)

    Zubin Bharucha

    2010-01-01

    Full Text Available Femto-cells consist of user-deployed Home Evolved NodeBs (HeNBs that promise substantial gains in system spectral efficiency, coverage, and data rates due to an enhanced reuse of radio resources. However, reusing radio resources in an uncoordinated, random fashion introduces potentially destructive interference to the system, both, in the femto and macro layers. An especially critical scenario is a closed-access femto-cell, cochannel deployed with a macro-cell, which imposes strong downlink interference to nearby macro user equipments (UEs that are not permitted to hand over to the femto-cell. In order to maintain reliable service of macro-cells, it is imperative to mitigate the destructive femto-cell to macro-cell interference. The contribution in this paper focuses on mitigating downlink femto-cell to macro-cell interference through dynamic resource partitioning, in the way that HeNBs are denied access to downlink resources that are assigned to macro UEs in their vicinity. By doing so, interference to the most vulnerable macro UEs is effectively controlled at the expense of a modest degradation in femto-cell capacity. The necessary signaling is conveyed through downlink high interference indicator (DL-HII messages over the wired backbone. Extensive system level simulations demonstrate that by using resource partitioning, for a sacrifice of 4% of overall femto downlink capacity, macro UEs exposed to high HeNB interference experience a tenfold boost in capacity.

  12. Intake of macro- and micronutrients in Danish vegans

    DEFF Research Database (Denmark)

    Kristensen, Nadja B; Madsen, Mia L; H Hansen, Tue

    2015-01-01

    Since information about macro- and micronutrient intake among vegans is limited we aimed to determine and evaluate their dietary and supplementary intake. Seventy 18-61 years old Danish vegans completed a four-day weighed food record from which their daily intake of macro- and micronutrients was ...

  13. SAS-macros for estimation and prediction in an model of the electricity consumption

    DEFF Research Database (Denmark)

    1998-01-01

    SAS-macros for estimation and prediction in an model of the electricity consumption'' is a large collection of SAS-macros for handling a model of the electricity consumption in the Eastern Denmark. The macros are installed at Elkraft, Ballerup.......SAS-macros for estimation and prediction in an model of the electricity consumption'' is a large collection of SAS-macros for handling a model of the electricity consumption in the Eastern Denmark. The macros are installed at Elkraft, Ballerup....

  14. Turkey’s Strategy towards Afghanistan: Security and Development Assistance

    Directory of Open Access Journals (Sweden)

    Altunay Ilgar Aliyeva

    2016-01-01

    Full Text Available Providing assistance to the least developed countries has remained one of the top priorities for leading international actors in the XXI century, and the Republic of Turkey is no exception in this regard. The Justice and Development Party's ascension to power in 2002 led to a drastic revision of the Turkish foreign policy and adoption of a novel approach to the least developed countries accounting for the complex interdependence between security and development. This approach was tested in Afghanistan where Turkey contributed to both post-conflict reconstruction of the country and to the activities of the International Security Assistance Force (ISAF. Since 2015 Turkey has been actively engaged in the new NATO 'Resolute Support' mission, while continuing its economic support to Afghanistan on bilateral and multilateral basis. This paper aims to unveil the particularities of the Turkey's Afghan strategy, which has yet escaped the Russian scholars' attention, with the help of the Turkish primary sources and academic works. It studies the specificity of bilateral relations and their determinants, including historic ties and religious and cultural proximity. It provides an in-depth analysis of the activities of both Turkish Cooperation and Development Agency (TIKA and the Turkish Provincial Reconstruction Team (PRT in Afghanistan and examines the challenges of Turkish troops' presence on the Afghan soil and the way how the Turkish elites and Turkey's NATO allies perceive it.

  15. Scaling up: Assessing social impacts at the macro-scale

    International Nuclear Information System (INIS)

    Schirmer, Jacki

    2011-01-01

    Social impacts occur at various scales, from the micro-scale of the individual to the macro-scale of the community. Identifying the macro-scale social changes that results from an impacting event is a common goal of social impact assessment (SIA), but is challenging as multiple factors simultaneously influence social trends at any given time, and there are usually only a small number of cases available for examination. While some methods have been proposed for establishing the contribution of an impacting event to macro-scale social change, they remain relatively untested. This paper critically reviews methods recommended to assess macro-scale social impacts, and proposes and demonstrates a new approach. The 'scaling up' method involves developing a chain of logic linking change at the individual/site scale to the community scale. It enables a more problematised assessment of the likely contribution of an impacting event to macro-scale social change than previous approaches. The use of this approach in a recent study of change in dairy farming in south east Australia is described.

  16. The International Atomic Energy Agency Nuclear Security Education Strategies

    International Nuclear Information System (INIS)

    BRAUNEGGER-GUELICH, A.; RUKHLO, V.; GREGORIC, M.; COLGAN, P.

    2011-01-01

    The threat of nuclear terrorism has not diminished. In response to the concerns of States, an international nuclear security framework has emerged through the establishment of a number of legally binding and non-binding international instruments which obligates or commits States to carry out a number of actions to protect against nuclear terrorism. In this context, the need for human resource development programmes in nuclear security was underscored at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors' Meetings. In the pursuit of this need, the IAEA provides a comprehensive nuclear security training programme to States on a regular basis, and has developed a concept that seeks to effectively pass ownership of nuclear security knowledge and skills to States through the establishment of a Nuclear Security Support Centre. In addition, the IAEA has developed a technical guidance titled IAEA Nuclear Security Series No. 12 - Educational Programme in Nuclear Security that consists of a model of a Master of Science (M.Sc.) and assists educational institutions to provide nuclear security education. The article sets out IAEA efforts in the area of nuclear security training and education, including the assistance to States for establishing a Nuclear Security Support Centre. It underlines the objective and content of the IAEA Nuclear Security Series No. 12, discusses different concepts on how to establish nuclear security at universities and, emphasizes on the IAEA efforts to assist educational and research institutions, and other stake holders to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. (author)

  17. Synthesis of securement device options and strategies

    Science.gov (United States)

    2002-03-01

    The Americans with Disabilities Act of 1990 (ADA) requires that public transit vehicles be equipped with securement location(s) and device(s) that are able to secure common wheelchairs," as defined in the ADA regulations. The definition and size spec...

  18. Evaluation of vitrification factors from DWPF's macro-batch 1

    International Nuclear Information System (INIS)

    Edwards, T.B.

    2000-01-01

    The Defense Waste Processing Facility (DWPF) is evaluating new sampling and analytical methods that may be used to support future Slurry Mix Evaporator (SME) batch acceptability decisions. This report uses data acquired during DWPF's processing of macro-batch 1 to determine a set of vitrification factors covering several SME and Melter Feed Tank (MFT) batches. Such values are needed for converting the cation measurements derived from the new methods to a ''glass'' basis. The available data from macro-batch 1 were used to examine the stability of these vitrification factors, to estimate their uncertainty over the course of a macro-batch, and to provide a recommendation on the use of a single factor for an entire macro-batch. The report is in response to Technical Task Request HLW/DWPF/TTR-980015

  19. Macro-institutional Complexity in Logistics

    DEFF Research Database (Denmark)

    Wessel, Frederic; Kinra, Aseem; Kotzab, Herbert

    2016-01-01

    structure and transactional costs, the concept of environmental complexity is applied to the logistics management perspective. Thereby, the impacts which a given framework on a macro-institutional level might have on the situation and leeway in decision-making at the firm (micro) or the supply chain (meso......In this paper, the interlink between the concept of macro-institutional complexity in logistics and the dynamics in the logistics practice of Eastern Europe will be examined. Referring to the importance of different authors having ascribed to the external environmental uncertainty on organizational......) levels will be analysed. Furthermore, a quantitative modelling approach will be presented and exemplified by using the case of logistics infrastructure in Eastern Europe....

  20. Security Management Strategies for Protecting Your Library's Network.

    Science.gov (United States)

    Ives, David J.

    1996-01-01

    Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…

  1. Improvement of aquaponic performance through micro- and macro-nutrient addition.

    Science.gov (United States)

    Ru, Dongyun; Liu, Jikai; Hu, Zhen; Zou, Yina; Jiang, Liping; Cheng, Xiaodian; Lv, Zhenting

    2017-07-01

    Aquaponics is one of the "zero waste" industry in the twenty-first century, and is considered to be one of the major trends for the future development of agriculture. However, the low nitrogen utilization efficiency (NUE) restricted its widely application. To date, many attempts have been conducted to improve its NUE. In the present study, effect of micro- and macro-nutrient addition on performance of tilapia-pak choi aquaponics was investigated. Results showed that the addition of micro- and macro-nutrients improved the growth of plant directly and facilitated fish physiology indirectly, which subsequently increased NUE of aquaponics from 40.42 to 50.64%. In addition, remarkable lower total phosphorus concentration was obtained in aquaponics with micro- and macro-nutrient addition, which was attributed to the formation of struvite. Most of the added micro-nutrients were enriched in plant root, while macro-nutrients mainly existed in water. Moreover, no enrichment of micro- and macro-nutrients in aquaponic products (i.e., fish and plant leaves) was observed, indicating that it had no influence on food safety. The findings here reported manifest that appropriate addition of micro- and macro-nutrients to aquaponics is necessary, and would improve its economic feasibility.

  2. Qualitative Characterization of the Facebook Information Security Strategies

    Directory of Open Access Journals (Sweden)

    LOPES, S. F.

    2015-12-01

    Full Text Available Hyperconnectivity due to online social networks exposed security issues on data stored in these systems. This article presents an analysis on how online social networks designers have been communicating information security aspects through these systems’ interfaces. This analysis was made using the Semiotic Inspection Method on Facebook since it is largely used in Brazil and all over the world. Results showed that there is major concern with security information properties. Nevertheless it was possible to identify interface problems that could compromise use and understanding of such security properties

  3. Multi-scale-nonlinear interactions among macro-MHD mode, micro-turbulence, and zonal flow

    International Nuclear Information System (INIS)

    Ishizawa, Akihiro; Nakajima, Noriyoshi

    2007-01-01

    This is the first numerical simulation demonstrating that macro-magnetohydrodynamic (macro-MHD) mode is exited as a result of multi-scale interaction in a quasi-steady equilibrium formed by a balance between zonal flow and micro-turbulence via reduced-two-fluid simulation. Only after obtaining the equilibrium which includes zonal flow and the turbulence caused by kinetic ballooning mode is this simulation of macro-MHD mode, double tearing mode, accomplished. In the quasi-steady equilibrium a macro-fluctuation which has the same helicity as that of double tearing mode is a part of the turbulence until it grows as a macro-MHD mode finally. When the macro-MHD grows it effectively utilize free energy of equilibrium current density gradient because of positive feedback loop between suppression of zonal flow and growth of the macro-fluctuation causing magnetic reconnection. Thus once the macro-MHD grows from the quasi-equilibrium, it does not go back. This simulation is more comparable with experimental observation of growing macro-fluctuation than traditional MHD simulation of linear instabilities in a static equilibrium. (author)

  4. Macro-Micro Simulation for Polymer Crystallization in Couette Flow

    Directory of Open Access Journals (Sweden)

    Chunlei Ruan

    2017-12-01

    Full Text Available Polymer crystallization in manufacturing is a process where quiescent crystallization and flow-induced crystallization coexists, and heat/mass transfer on a macroscopic level interacts with crystal morphology evolution on a microscopic level. Previous numerical studies on polymer crystallization are mostly concentrated at a single scale; they only calculate macroscale parameters, e.g., temperature and relative crystallinity, or they only predict microstructure details, e.g., crystal morphology and mean size of crystals. The multi-scale numerical works that overcome these disadvantages are unfortunately based on quiescent crystallization, in which flow effects are neglected. The objective of this work is to build up a macro-micro model and a macro-micro algorithm to consider both the thermal and flow effects on the crystallization. Our macro-micro model couples two parts: mass and heat transfer of polymeric flow at the macroscopic level, and nucleation and growth of spherulites and shish-kebabs at the microscopic level. Our macro-micro algorithm is a hybrid finite volume/Monte Carlo method, in which the finite volume method is used at the macroscopic level to calculate the flow and temperature fields, while the Monte Carlo method is used at the microscopic level to capture the development of spherulites and shish-kebabs. The macro-micro model and the macro-micro algorithm are applied to simulate polymer crystallization in Couette flow. The effects of shear rate, shear time, and wall temperature on the crystal morphology and crystallization kinetics are also discussed.

  5. The integrated evaluation of the macro environment of companies providing transport services

    Directory of Open Access Journals (Sweden)

    A. Žvirblis

    2008-09-01

    Full Text Available The article presents the main principles of the integrated evaluation of macro environment components and factors influencing the performance of transport companies as well as providing the validated quantitative evaluation models and results obtained in evaluating the macro environment of Lithuanian companies providing transport services. Since quantitative evaluation is growing in importance, the process of developing the principles and methods of business macro environment quantitative evaluation is becoming relevant from both theoretical and practical perspectives. The created methodology is based on the concept of macro environment as an integrated whole of components, formalization and the principle of three-stage quantitative evaluation. The methodology suggested involves the quantitative evaluation of primary factors and macro environment components as an integral dimension (expressed in points. On the basis of this principle, an integrated macro environment evaluation parameter is established as its level index. The methodology integrates the identification of significant factors, building scenarios, a primary analysis of factors, expert evaluation, the quantitative evaluation of macro environment components and their whole. The application of the multi-criteria Simple Additive Weighting (SAW method is validated. The integrated evaluation of the macro environment of Lithuanian freight transportation companies was conducted. As a result, the level indices of all components as well as the level index of macro environment considered as a whole of components were identified. The latter reflects the extent of deviation from an average level of a favourable macro environment. This is important for developing strategic marketing decisions and expanding a strategic area.

  6. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  7. Strategies to Address Identified Education Gaps in the Preparation of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report will discuss strategies available to address identified gaps and weaknesses in education efforts aimed at the preparation of a skilled and properly trained national security workforce.The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This is contributing to an inability to fill vacant positions at NNSA resulting from high personnel turnover from the large number of retirements. Further, many of the retirees are practically irreplaceable because they are Cold War scientists that have experience and expertise with nuclear weapons.

  8. The Generalist Model: Where do the Micro and Macro Converge?

    Directory of Open Access Journals (Sweden)

    Shari E. Miller

    2008-12-01

    Full Text Available Although macro issues are integral to social work, students continue to struggle with the acquisition of knowledge and skills pertaining to larger systems. Educators have developed innovative methods to integrate learning across systems of various sizes however it appears an imbalance persists. This challenge is supported by baccalaureate student responses to a social work program evaluation. Four years of data from 295 undergraduate students revealed that they felt less prepared to practice with larger, macro systems. Changes in curriculum to reflect collaboration and holism, and more research are needed to adequately provide macro learning and macro practice opportunities within the generalist model and in the context of the current socio-economic-political environment.

  9. Macro-elementwise preconditioning methods

    Czech Academy of Sciences Publication Activity Database

    Axelsson, Owe

    2012-01-01

    Roč. 82, č. 10 (2012), s. 1952-1963 ISSN 0378-4754 Institutional research plan: CEZ:AV0Z30860518 Keywords : heterogeniety * elementwise preconditioning * block matrix partitioning * macro-elements Subject RIV: BA - General Mathematics Impact factor: 0.836, year: 2012 http://www.sciencedirect.com/science/journal/03784754

  10. A National Security Strategy for a New Century: A Blueprint for Indiscriminate and Ineffectual Meddling in the Political Affairs of Other Nations

    National Research Council Canada - National Science Library

    1997-01-01

    The Clinton Administration's May 1997 monograph A National Security Strategy for a New Century was clearly the product of a committee A good strategy should be broad and inclusive and should reflect...

  11. Ordered macro-microporous metal-organic framework single crystals

    KAUST Repository

    Shen, Kui

    2018-01-16

    We constructed highly oriented and ordered macropores within metal-organic framework (MOF) single crystals, opening up the area of three-dimensional-ordered macro-microporous materials (that is, materials containing both macro- and micropores) in single-crystalline form. Our methodology relies on the strong shaping effects of a polystyrene nanosphere monolith template and a double-solvent-induced heterogeneous nucleation approach. This process synergistically enabled the in situ growth of MOFs within ordered voids, rendering a single crystal with oriented and ordered macro-microporous structure. The improved mass diffusion properties of such hierarchical frameworks, together with their robust single-crystalline nature, endow them with superior catalytic activity and recyclability for bulky-molecule reactions, as compared with conventional, polycrystalline hollow, and disordered macroporous ZIF-8.

  12. Ordered macro-microporous metal-organic framework single crystals

    Science.gov (United States)

    Shen, Kui; Zhang, Lei; Chen, Xiaodong; Liu, Lingmei; Zhang, Daliang; Han, Yu; Chen, Junying; Long, Jilan; Luque, Rafael; Li, Yingwei; Chen, Banglin

    2018-01-01

    We constructed highly oriented and ordered macropores within metal-organic framework (MOF) single crystals, opening up the area of three-dimensional–ordered macro-microporous materials (that is, materials containing both macro- and micropores) in single-crystalline form. Our methodology relies on the strong shaping effects of a polystyrene nanosphere monolith template and a double-solvent–induced heterogeneous nucleation approach. This process synergistically enabled the in situ growth of MOFs within ordered voids, rendering a single crystal with oriented and ordered macro-microporous structure. The improved mass diffusion properties of such hierarchical frameworks, together with their robust single-crystalline nature, endow them with superior catalytic activity and recyclability for bulky-molecule reactions, as compared with conventional, polycrystalline hollow, and disordered macroporous ZIF-8.

  13. Ordered macro-microporous metal-organic framework single crystals

    KAUST Repository

    Shen, Kui; Zhang, Lei; Chen, Xiaodong; Liu, Lingmei; Zhang, Daliang; Han, Yu; Chen, Junying; Long, Jilan; Luque, Rafael; Li, Yingwei; Chen, Banglin

    2018-01-01

    We constructed highly oriented and ordered macropores within metal-organic framework (MOF) single crystals, opening up the area of three-dimensional-ordered macro-microporous materials (that is, materials containing both macro- and micropores) in single-crystalline form. Our methodology relies on the strong shaping effects of a polystyrene nanosphere monolith template and a double-solvent-induced heterogeneous nucleation approach. This process synergistically enabled the in situ growth of MOFs within ordered voids, rendering a single crystal with oriented and ordered macro-microporous structure. The improved mass diffusion properties of such hierarchical frameworks, together with their robust single-crystalline nature, endow them with superior catalytic activity and recyclability for bulky-molecule reactions, as compared with conventional, polycrystalline hollow, and disordered macroporous ZIF-8.

  14. US Strategy for Cyberspace

    National Research Council Canada - National Science Library

    Veazie, Arnold

    2003-01-01

    .... This strategic research paper analyzes the President's National Strategy to Secure Cyberspace to determine whether it effectively provides solutions for securing cyberspace. It concludes by proposing an alternative strategy for securing cyberspace.

  15. Macro-Micro Interlocked Simulator

    International Nuclear Information System (INIS)

    Sato, Tetsuya

    2005-01-01

    Simulation Science is now standing on a turning point. After the appearance of the Earth Simulator, HEC is struggling with several severe difficulties due to the physical limit of LSI technologies and the so-called latency problem. In this paper I would like to propose one clever way to overcome these difficulties from the simulation algorithm viewpoint. Nature and artificial products are usually organized with several nearly autonomously working internal systems (organizations, or layers). The Earth Simulator has gifted us with a really useful scientific tool that can deal with the entire evolution of one internal system with a sufficient soundness. In order to make a leap jump of Simulation Science, therefore, it is desired to design an innovative simulator that enables us to deal with simultaneously and as consistently as possible a real system that evolves cooperatively with several internal autonomous systems. Three years experience of the Earth Simulator Project has stimulated to come up with one innovative simulation algorithm to get rid of the technological barrier standing in front of us, which I would like to call 'Macro-Micro Interlocked Algorithm', or 'Macro-Micro Multiplying Algorithm', and present a couple of such examples to validate the proposed algorithm. The first example is an aurora-arc formation as a result of the mutual interaction between the macroscopic magnetosphere-ionosphere system and the microscopic field-aligned electron and ion system. The second example is the local heavy rain fall resulting from the interaction between the global climate evolution and the microscopic raindrop growth process. Based on this innovative feasible algorithm, I came up with a Macro-Micro Multiplying Simulator

  16. The research of computer network security and protection strategy

    Science.gov (United States)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  17. DISTRIBUTIONAND DIVERSITY OF MACRO ALGAE COMMUNITIES IN THE AMBON BAY

    Directory of Open Access Journals (Sweden)

    Christina Litaay

    2014-11-01

    Full Text Available Water conditions affected by natural and anthropogenic parameters such as sedimentation and solid waste disposal can influence the growth and distribution of macro algae. Sustainable management efforts can reduce damage on the Gulf coast of Ambon due to human activities and land clearing. This study was conducted in October 2008 using the transect method with 3 replicates in five locations i.e., Tantui, Air Salobar, Hative Besar, Halong, and Lateri. The interior and exterior waters of Ambon Bay contained different habitat conditions due to  sedimentation processes. The purpose of this study was to determine the distribution and diversity of macro algae communities in the Ambon Bay. The results found 21 species of macro- algae consisting of 10 species of Rhodhophyceae, 6 species of Chlorophyceae, and 5 species of Phaeophyceae. The highest density value of seaweed in Tantui was 389.0 g/m² of Chlorophyceae of Halimeda genus. In Air Salobar and Halong, the highest density value was Rhodophyceae of Gracilaria genus of 172.0 g/m² and 155.0 g/m², respectively. For the other genus in the Tantui and Lateri regions were dominated by Ulva at 92.10 gr/m2 and Padina of 20.0 gr/m2, respectively. The highest dominance of macro algae in the Hative Besar was found Chlorophyceae of Halimeda genus of 2.93 %, in the Air Salobar of Phaeophyceae of Turbinaria genus of 1.43 %. The difference values in density and the dominance of macro algae indicated an influence of habitat and environment due to seasons, sediment, and solid waste disposal to the diversity of macro algae. Keywords: Diversity, macro algae, Ambon Bay.

  18. Secure energy supply in 2025: Indonesia's need for an energy policy strategy

    International Nuclear Information System (INIS)

    Mujiyanto, Sugeng; Tiess, Günter

    2013-01-01

    Indonesia as an emerging country with one of the fastest growing economies requires sufficient supply with energy for national development. Domestic energy production cannot satisfy the domestic demand, and the deficiency necessitates growing imports. The present energy mix consists of 96% from non-renewable sources, i.e. fossil fuels, less than 4% from renewables. Government Regulation 5/2006 aims at increasing the proportion of renewable sources to 17%. Two scenarios for the energy situation in 2025 have been elaborated and are discussed. An overall energy policy strategy and regulatory framework covering non-renewable and renewable resources are crucial for securing energy demand. - Highlights: • Indonesia aims at 17% renewable energy in energy mix 2025. • Population growth exceeds increase of energy production. • Investment incentives for new technologies, exploration and efficient production are necessary. • Clear and comprehensive energy policy strategy and regulatory framework are crucial

  19. El debate micro-macro: dilemas y contextos

    Directory of Open Access Journals (Sweden)

    Vania Salles

    2001-06-01

    Full Text Available This paper discusses the general terms of the sociological debate on the micro macro question. Not only the main trends organizing the debate are examined, but also some ways to solve the dichotomies present in some proposals. It is held that contemporary theoretical practice produces —after the classics and with different focuses— a reflexivecorpus and research practices rooted in the blurring of the micro macro as polar questions, by the way of offering integrating proposals and overcoming reducing positions.

  20. Social Security and Fighting Poverty in Tunisia

    Directory of Open Access Journals (Sweden)

    Hasna Khemili

    2018-02-01

    Full Text Available The objective of this study was to examine the role of social security in fighting poverty in Metlaoui, Tunisia, using survey data collected between July 2012 and January 2014, covering 200 poor households. We used questionnaire data, which gave a thorough analysis of the reactions, behavior, and strategies adopted by poor households as a result of various forms of risk. Social security has an effect on a number of different areas, including health, education, housing, and income. Our methodology explored both complete and partial risk-sharing, to investigate the impact of social security schemes on the strategies adopted by households to cope with economic shocks. The estimation results of different models showed that social security could help social security-covered households choose less costly strategies to cope with risks. However, the role of social security remains insufficient, given that covered households had less confidence in its services and they adopted strategies of self-insurance or income smoothing. Overall, the results showed that social security plays an important role in Metlaoui, but it remains insufficient, especially for households that are not covered by social security and are suffering from heavy health expenditures.

  1. Triple symmetric key cryptosystem for data security

    Science.gov (United States)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  2. Strategies for Human Capacity Development in Nuclear Safety and Security in the NNRA

    International Nuclear Information System (INIS)

    Akpanowo, M.; Iwuala, E.

    2016-01-01

    Full text: The Nigerian Nuclear Regulatory Authority (NNRA) is charged with the responsibility for nuclear safety and radiological protection regulation. With Nigeria as one of the nuclear power states, NNRA has since 2010 intensified efforts in developing capacity to license the first set of nuclear power plants in Nigeria. The NNRA has employed several strategies in developing building and strengthening the human capacity to fulfill its statutory functions. This paper describes available human capacity development programmes and the strategies for implementing them including, knowledge retention and management strategy. The strategy commences with the recruitment process, initial training and education and continuous training. As a technical support arm of the NNRA, the National Institute for Radiation Protection and Research offers postgraduate diploma and masters programmes in radiation protection, where many NNRA officers have been trained. The NNRA also leverages on its collaboration with different international organizations for the training of its manpower in the area of nuclear safety and security. NNRA Officers participate in various IAEA organized programmes including fellowship for postgraduate diploma and master programmes, training course, workshops, seminars, conferences, scientific visits and on-the-job-training (OJT). Collaborations with other international organizations are also presented. (author

  3. A zwitterionic macro-crosslinker for durable non-fouling coatings.

    Science.gov (United States)

    Wang, Wei; Lu, Yang; Xie, Jinbing; Zhu, Hui; Cao, Zhiqiang

    2016-03-28

    A novel zwitterionic macro-crosslinker was developed and applied to fabricate durable non-fouling coatings on a polyurethane substrate. The zwitterionic macro-crosslinker coating exhibited superior durability over the traditional brush polymer coating and was able to retain its non-fouling property even after weeks of shearing in flowing liquid.

  4. Macro-Finance Determinants of the Long-Run Stock-Bond Correlation

    DEFF Research Database (Denmark)

    Asgharian, Hossein; Christiansen, Charlotte; Hou, Ai Jun

    itself. Macro-finance variables and the lagged realized correlation are simultaneously significant in forecasting the long-run stock-bond correlation. The behavior of the long-run stock-bond correlation is very different when estimated taking the macro-finance variables into account. Supporting......We investigate the long-run stock-bond correlation using a novel model that combines the dynamic conditional correlation model with the mixed-data sampling approach. The long-run correlation is affected by both macro-finance variables (historical and forecasts) and the lagged realized correlation...

  5. Macro-economic impact of large-scale deployment of biomass resources for energy and materials on a national level—A combined approach for the Netherlands

    International Nuclear Information System (INIS)

    Hoefnagels, Ric; Banse, Martin; Dornburg, Veronika; Faaij, André

    2013-01-01

    Biomass is considered one of the most important options in the transition to a sustainable energy system with reduced greenhouse gas (GHG) emissions and increased security of enegry supply. In order to facilitate this transition with targeted policies and implementation strategies, it is of vital importance to understand the economic benefits, uncertainties and risks of this transition. This article presents a quantification of the economic impacts on value added, employment shares and the trade balance as well as required biomass and avoided primary energy and greenhouse gases related to large scale biomass deployment on a country level (the Netherlands) for different future scenarios to 2030. This is done by using the macro-economic computable general equilibrium (CGE) model LEITAP, capable of quantifying direct and indirect effects of a bio-based economy combined with a spread sheet tool to address underlying technological details. Although the combined approach has limitations, the results of the projections show that substitution of fossil energy carriers by biomass, could have positive economic effects, as well as reducing GHG emissions and fossil energy requirement. Key factors to achieve these targets are enhanced technological development and the import of sustainable biomass resources to the Netherlands. - Highlights: • We analyse large scale production of bioenergy and biochemicals in the Netherlands. • The scenarios include up to 30% substitution of fossil fuels by biomass in 2030. • Resulting in strong greenhouse gas savings and positive macro-economic effects. • Large amounts of imported biomass are required to meet the domestic demand. • This requires high rates of technological change and strict sustainability criteria

  6. The Dialectical Nature of Business Strategy

    DEFF Research Database (Denmark)

    Gjerding, Allan Næs; Rasmussen, Jørgen Gulddahl

    Based on a theoretical overview and empirical observations, the paper discusses a variety of concepts of strategy. The main argument is that even though the concepts of strategy mostly reflect the perception of science at the macro-sociological level, the research field of strategy seems keen on ...... on mixing paradigms. The paper arrives at the argument that contemporary scholarly activities may benefit from viewing strategy as a dialectical phenomenon in terms of a continuous transposition of managerial decision making situations....

  7. Insecurity of petroleum supplies and external effect: the case of security storage

    International Nuclear Information System (INIS)

    Sanchez, B.

    1997-01-01

    The public intervention in the domain of security of petroleum supplies is in general justified in the literature by the existence of external effects linked with the phenomenon of insecurity of supplies. This work proposes to analyse in detail the validity of this justification and its implication in terms of energy policy recommendations. The components of the insecurity cost is analyzed in the first part. Two components are retained: the macro-economical effects of insecurity and the monopsony cost. The study of the macro-economical component of insecurity uses a disequilibrium economy-type approach. On the basis of a modeling of the macro-economical effects of insecurity on a conventionalized economy, a relation is evidenced between rupture probability and level of usefulness. This model is applied to 4 European Union countries and the effects of supplies insecurity is measured for each of them. For the monopsony component of supplies insecurity, the additional cost generated by insecurity in relation with the monopsony situation is analyzed. A numerical analysis illustrates this analysis. Then, the relevance of the monopsony concept in the description of the situation of petroleum consuming economies is questioned. The analysis of the US case leads to reject the existence of a petroleum monopsony made of the USA alone and to favour the definition of a monopsony made of the IEA member countries. Then, the analysis of the insecurity cost is made using the external cost notion. This study allows to settle the status of the macro-economical component: there effectively exists a macro-economical cost of insecurity but this cost cannot be considered as external. This result is interesting because many analyses justify the public intervention using the external cost property of the macro-economical effects. On the contrary, the monopsony component can be unambiguously identified as being at the origin of a pecuniary external cost. The insecurity of supplies can be

  8. Nano/macro porous bioactive glass scaffold

    Science.gov (United States)

    Wang, Shaojie

    Bioactive glass (BG) and ceramics have been widely studied and developed as implants to replace hard tissues of the musculo-skeletal system, such as bones and teeth. Recently, instead of using bulk materials, which usually do not degrade rapidly enough and may remain in the human body for a long time, the idea of bioscaffold for tissue regeneration has generated much interest. An ideal bioscaffold is a porous material that would not only provide a three-dimensional structure for the regeneration of natural tissue, but also degrade gradually and, eventually be replaced by the natural tissue completely. Among various material choices the nano-macro dual porous BG appears as the most promising candidate for bioscaffold applications. Here macropores facilitate tissue growth while nanopores control degradation and enhance cell response. The surface area, which controls the degradation of scaffold can also be tuned by changing the nanopore size. However, fabrication of such 3D structure with desirable nano and macro pores has remained challenging. In this dissertation, sol-gel process combined with spinodal decomposition or polymer sponge replication method has been developed to fabricate the nano-macro porous BG scaffolds. Macropores up to 100microm are created by freezing polymer induced spinodal structure through sol-gel transition, while larger macropores (>200um) of predetermined size are obtained by the polymer sponge replication technique. The size of nanopores, which are inherent to the sol-gel method of glass fabrication, has been tailored using several approaches: Before gel point, small nanopores are generated using acid catalyst that leads to weakly-branched polymer-like network. On the other hand, larger nanopores are created with the base-catalyzed gel with highly-branched cluster-like structure. After the gel point, the nanostructure can be further modified by manipulating the sintering temperature and/or the ammonia concentration used in the solvent

  9. Macro-Finance Determinants of the Long-Run Stock-Bond Correlation

    DEFF Research Database (Denmark)

    Asgharian, Hossein; Christiansen, Charlotte; Hou, Ai Jun

    2016-01-01

    We investigate long-run stock–bond correlation using a model that combines the dynamic conditional correlation model with the mixed-data sampling approach and allows long-run correlation to be affected by macro-finance factors (historical and forecasts). We use macro-finance factors related...... to inflation and interest rates, illiquidity, state of the economy, and market uncertainty. Macro-finance factors, particularly their forecasts, are good at forecasting long-run stock–bond correlation. Supporting the flight-to-quality phenomenon, long-run correlation tends to be small and negative when...

  10. Time and Space Complexity of Inside-Out Macro Grammars

    NARCIS (Netherlands)

    Asveld, P.R.J.

    1980-01-01

    Starting form Fischer's IO Standard Form Theorem we show that for each inside-out (or IO-) macro language $L$ there exists a $\\lambda$-free IO macro grammar with the following property: for each $x$ in $L$ there is a derivation of $x$ of length at most linear in the length of $x$. Then we construct

  11. Development Of A Macro-Batch Qualification Strategy For The Hanford Tank Waste Treatment And Immobilization Plant

    International Nuclear Information System (INIS)

    Herman, Connie C.

    2013-01-01

    The Savannah River National Laboratory (SRNL) has evaluated the existing waste feed qualification strategy for the Hanford Tank Waste Treatment and Immobilization Plant (WTP) based on experience from the Savannah River Site (SRS) Defense Waste Processing Facility (DWPF) waste qualification program. The current waste qualification programs for each of the sites are discussed in the report to provide a baseline for comparison. Recommendations on strategies are then provided that could be implemented at Hanford based on the successful Macrobatch qualification strategy utilized at SRS to reduce the risk of processing upsets or the production of a staged waste campaign that does not meet the processing requirements of the WTP. Considerations included the baseline WTP process, as well as options involving Direct High Level Waste (HLW) and Low Activity Waste (LAW) processing, and the potential use of a Tank Waste Characterization and Staging Facility (TWCSF). The main objectives of the Hanford waste feed qualification program are to demonstrate compliance with the Waste Acceptance Criteria (WAC), determine waste processability, and demonstrate unit operations at a laboratory scale. Risks to acceptability and successful implementation of this program, as compared to the DWPF Macro-Batch qualification strategy, include: Limitations of mixing/blending capability of the Hanford Tank Farm; The complexity of unit operations (i.e., multiple chemical and mechanical separations processes) involved in the WTP pretreatment qualification process; The need to account for effects of blending of LAW and HLW streams, as well as a recycle stream, within the PT unit operations; and The reliance on only a single set of unit operations demonstrations with the radioactive qualification sample. This later limitation is further complicated because of the 180-day completion requirement for all of the necessary waste feed qualification steps. The primary recommendations/changes include the

  12. Political Strategies and Language Policies: The European Union Lisbon Strategy and Its Implications for the EU's Language and Multilingualism Policy

    Science.gov (United States)

    Krzyzanowski, Michal; Wodak, Ruth

    2011-01-01

    This paper explores the interplay between the politics and policies of multilingualism by looking at the role of political macro-strategies in shaping language and multilingualism policies within the European Union. The paper focuses on the relationship between the European Union's 2000-2010 Lisbon Strategy on the European Knowledge-Based Economy…

  13. Estimating Dynamic Equilibrium Models using Macro and Financial Data

    DEFF Research Database (Denmark)

    Christensen, Bent Jesper; Posch, Olaf; van der Wel, Michel

    We show that including financial market data at daily frequency, along with macro series at standard lower frequency, facilitates statistical inference on structural parameters in dynamic equilibrium models. Our continuous-time formulation conveniently accounts for the difference in observation...... of the estimators and estimate the model using 20 years of U.S. macro and financial data....

  14. Probing strategy-project alignment: The case of the South African Social Security Agency

    Directory of Open Access Journals (Sweden)

    Gerrit Van Der Waldt

    2016-12-01

    Full Text Available Public institutions, such as the South African Social Security Agency (SASSA increasingly function in multi-project environments to translate strategies successfully into service-delivery initiatives. However, this ‘projectification’ often causes projects to be designed and executed haphazardly. This can lead to budget and schedule overruns, and the general wastage of an organisation’s resources. Project failures often occur where organisations do not ensure that specific projects are aligned with their core strategies. The purpose of this article is to combine the theories and principles of organisation, management, strategic management, and project management in an effort to pinpoint core determinants that can help establish the extent to which an organisation manages the alignment of its strategic projects. In the present study, the author applied the principles of interdisciplinarity, systems thinking, and organisational integration. The combined core determinants that were uncovered were then used in an empirical investigation of SASSA. The purpose of this investigation is to identify particular challenges the organisation faces in aligning their strategies and projects successfully. Thereafter, a number of recommendations follow to address these challenges.

  15. Institutional diagnostics for African food security

    NARCIS (Netherlands)

    Schouten, Greetje; Vink, Martinus; Vellema, Sietze

    2018-01-01

    Securing access to affordable and nutritious food is an urgent topic on the agenda for development strategies in Africa. Intervention strategies targeting food security triggered a long lasting debate whether science and technology driven interventions could be the panacea for hunger eradication.

  16. Characteristics of soil water retention curve at macro-scale

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Scale adaptable hydrological models have attracted more and more attentions in the hydrological modeling research community, and the constitutive relationship at the macro-scale is one of the most important issues, upon which there are not enough research activities yet. Taking the constitutive relationships of soil water movement--soil water retention curve (SWRC) as an example, this study extends the definition of SWRC at the micro-scale to that at the macro-scale, and aided by Monte Carlo method we demonstrate that soil property and the spatial distribution of soil moisture will affect the features of SWRC greatly. Furthermore, we assume that the spatial distribution of soil moisture is the result of self-organization of climate, soil, ground water and soil water movement under the specific boundary conditions, and we also carry out numerical experiments of soil water movement at the vertical direction in order to explore the relationship between SWRC at the macro-scale and the combinations of climate, soil, and groundwater. The results show that SWRCs at the macro-scale and micro-scale presents totally different features, e.g., the essential hysteresis phenomenon which is exaggerated with increasing aridity index and rising groundwater table. Soil property plays an important role in the shape of SWRC which will even lead to a rectangular shape under drier conditions, and power function form of SWRC widely adopted in hydrological model might be revised for most situations at the macro-scale.

  17. Energy scope of handoff strategies in macro-femtocell environments

    KAUST Repository

    Leon, Jaime

    2012-06-01

    Energy consumption in downlink mode is becoming an important topic as cellular communications grow into a large scale enterprise. The search for high rates keeping energy constraints low has put forward the idea that cells with smaller size may improve not only the capacity of the network, but also reduce the amount of energy that is needed to achieve such capacities. When using heterogeneous networks, users can be encouraged to handoff to a femtocell, that offers better capacity per unit energy spent, by means of different handoff strategies. These strategies may also improve the energy use of the network if the handoff priority is given to both, capacity, and energy use. © 2012 IEEE.

  18. Micro and Macro Segregation in Alloys Solidifying with Equiaxed Morphology

    Science.gov (United States)

    Stefanescu, Doru M.; Curreri, Peter A.; Leon-Torres, Jose; Sen, Subhayu

    1996-01-01

    To understand macro segregation formation in Al-Cu alloys, experiments were run under terrestrial gravity (1g) and under low gravity during parabolic flights (10(exp -2) g). Alloys of two different compositions (2% and 5% Cu) were solidified at two different cooling rates. Systematic microscopic and SEM observations produced microstructural and segregation maps for all samples. These maps may be used as benchmark experiments for validation of microstructure evolution and segregation models. As expected, the macro segregation maps are very complex. When segregation was measured along the central axis of the sample, the highest macro segregation for samples solidified at 1g was obtained for the lowest cooling rate. This behavior is attributed to the longer time available for natural convection and shrinkage flow to affect solute redistribution. In samples solidified under low-g, the highest macro-segregation was obtained at the highest cooling rate. In general, low-gravity solidification resulted in less segregation. To explain the experimental findings, an analytical (Flemings-Nereo) and a numerical model were used. For the numerical model, the continuum formulation was employed to describe the macroscopic transports of mass, energy, and momentum, associated with the microscopic transport phenomena, for a two-phase system. The model proposed considers that liquid flow is driven by thermal and solutal buoyancy, and by solidification shrinkage. The Flemings-Nereo model explains well macro segregation in the initial stages of low-gravity segregation. The numerical model can describe the complex macro segregation pattern and the differences between low- and high-gravity solidification.

  19. A SAS-macro for estimation of the cumulative incidence using Poisson regression

    DEFF Research Database (Denmark)

    Waltoft, Berit Lindum

    2009-01-01

    the hazard rates, and the hazard rates are often estimated by the Cox regression. This procedure may not be suitable for large studies due to limited computer resources. Instead one uses Poisson regression, which approximates the Cox regression. Rosthøj et al. presented a SAS-macro for the estimation...... of the cumulative incidences based on the Cox regression. I present the functional form of the probabilities and variances when using piecewise constant hazard rates and a SAS-macro for the estimation using Poisson regression. The use of the macro is demonstrated through examples and compared to the macro presented...

  20. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  1. Infrastructure to support trading strategies against the occurrence of extraordinary events: Secure area of the equipment storage

    International Nuclear Information System (INIS)

    Blas Gordo, A. de; Asensio Vega, J.; Fernandez Morales, E. J.; Font Hadinger, I.

    2013-01-01

    Compliance with the requirements specified in the Technical Instructions ITC and ITC-1-2, issued by the Nuclear Safety Council (CSN), is conducting exhaustive analyzes on coping in Nuclear Power Plants emergencies due to the occurrence extraordinary events. As part of the necessary infrastructure, a secure area for parking and storage of projects teams involved in the development of various operational strategies. The design of it ensures compliance with all regulatory and practical requirements, ensuring minimization strategies and time functionality in the application of the same.

  2. Investigation of porous concrete through macro and meso-scale testing

    NARCIS (Netherlands)

    Agar Ozbek, A.S.; Weerheijm, J.; Schlangen, H.E.J.G.

    2010-01-01

    In designing a porous concrete, containing a high volume of air pores, the effects of its mesoscale phases on its macro level properties have to be known. For this purpose, porous concretes having different aggregate gradings and cement paste compositions were investigated through macro-scale

  3. Search for stellar collapse with the MACRO detector at Gran Sasso

    International Nuclear Information System (INIS)

    1989-01-01

    The first MACRO supermodule commenced data taking in February 1989. Two complementary trigger and readout systems have been used to monitor the horizontal scintillation counters, which contain 42 tonnes (∼1 ktonne for the full MACRO detector) of liquid scintillator, for bursts of low energy anti-neutrinos from gravitational stellar collapses. This paper reports on an initial search and discusses the present as well as ultimate sensitivity of MACRO to this class of events. 4 figs

  4. US National Security Strategy and preemption; Le concept de preemption dans la strategie de securite nationale des Etats-Unis

    Energy Technology Data Exchange (ETDEWEB)

    Kristensen, H.M. [Federation of American Scientists, Washington, D.C. (United States)

    2006-07-15

    According to a US National Security Strategy analysis conducted in 2006, preemption has evolved from concept into doctrine. The concept plan for Global Strike (CONPLAN 8022-02) will be maintained by the Joint Functional Component Command for Space and Global Strike (JFCC-SGS), which is planned to be fully operational from the autumn of 2006. The aim of CONPLAN 8022 is to be able to destroy by nuclear weapons those targets that cannot be destroyed by other means. Should deterrence fail, weapons must be ready to be put to use, be they nuclear or conventional. (author)

  5. Injection moulding for macro and micro products

    DEFF Research Database (Denmark)

    Islam, Mohammad Aminul

    used for macro products but with the ages it is going deep into the micro areas having machine and process improvements. Extensive research work on injection moulding is going on all over the world. New ideas are flowing into the machines, materials and processes. The technology has made significant......The purpose of the literature survey is to investigate the injection moulding technology in the macro and micro areas from the basic to the state-of-the-art recent technology. Injection moulding is a versatile production process for the manufacturing of plastic parts and the process is extensively...

  6. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  7. Considerations to Enhance the Florida Domestic Security Strategic Plan

    Science.gov (United States)

    2011-03-01

    security strategies. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION ...Thank you all. xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION A. PROBLEM STATEMENT After the terrorist attacks of September 11, 2001...State Homeland Security Strategy (Nebraska Emergency Mangement Agency, 2009) • Vermont Homeland Security Strategy (Vermont Department of Public

  8. Macro-Elements and Trace Elements in Cereal Grains Cultivated in Latvia

    Directory of Open Access Journals (Sweden)

    Jākobsone Ida

    2015-09-01

    Full Text Available Cereal-based foods have great importance in the compensation of micro- and trace element deficiency, because 50% of the foods produced worldwide are made up of cereal grains. The aim of the research was to determine the concentration of macro-elements and trace elements in different cereals cultivated in Latvia. Various cereals were used in the research: rye (n = 45, barley (n = 54, spring wheat (n = 27, winter wheat (n = 53, triticale (n = 45 and oats (n = 42. Thirteen macro- and trace elements (Cd, Pb, Ni, Cr, Al, Cu, K, Na, Mn, Fe, Zn, Mg, Ca were determined in cereal grain samples (n = 266. Macro-elements and trace elements varied significantly (p < 0.01 or p < 0.001. The highest concentrations of macro- and trace elements were found in oats and the lowest in rye. The obtained data will expand the opportunity for food and nutrition scientists to evaluate content of the examined elements in grain products, and dietary consumption (bioavailability of the examined macro-elements and trace elements.

  9. TableMaker: An Excel Macro for Publication-Quality Tables

    Directory of Open Access Journals (Sweden)

    Marek Hlavac

    2016-04-01

    Full Text Available This article introduces TableMaker, a Microsoft Excel macro that produces publicationquality tables and includes them as new sheets in workbooks. The macro provides an intuitive graphical user interface that allows for the full customization of all table features. It also allows users to save and load table templates, and thus allows layouts to be both reproducible and transferable. It is distributed in a single computer file. As such, the macro is easy to share, as well as accessible to even beginning and casual users of Excel. Since it allows for the quick creation of reproducible and fully customizable tables, TableMaker can be very useful to academics, policy-makers and businesses by making the presentation and formatting of results faster and more efficient.

  10. Deficit irrigation and sustainable water-resource strategies in agriculture for China’s food security

    Science.gov (United States)

    Du, Taisheng; Kang, Shaozhong; Zhang, Jianhua; Davies, William J.

    2015-01-01

    More than 70% of fresh water is used in agriculture in many parts of the world, but competition for domestic and industrial water use is intense. For future global food security, water use in agriculture must become sustainable. Agricultural water-use efficiency and water productivity can be improved at different points from the stomatal to the regional scale. A promising approach is the use of deficit irrigation, which can both save water and induce plant physiological regulations such as stomatal opening and reproductive and vegetative growth. At the scales of the irrigation district, the catchment, and the region, there can be many other components to a sustainable water-resources strategy. There is much interest in whether crop water use can be regulated as a function of understanding of physiological responses. If this is the case, then agricultural water resources can be reallocated to the benefit of the broader community. We summarize the extent of use and impact of deficit irrigation within China. A sustainable strategy for allocation of agricultural water resources for food security is proposed. Our intention is to build an integrative system to control crop water use during different cropping stages and actively regulate the plant’s growth, productivity, and development based on physiological responses. This is done with a view to improving the allocation of limited agricultural water resources. PMID:25873664

  11. The National Security Strategy of the United Kingdom: Security in an Interdependent World

    Science.gov (United States)

    2008-03-01

    security architecture has yet to adapt satisfactorily to the new landscape. The UN Security Council has failed to adapt to the rise of new powers. Across...including cinemas , theatres, pubs, nightclubs, restaurants, hotels and commercial centres, hospitals, schools and places of worship); work with architects...and export control regimes, and improving the international monitoring architecture . Countering the threat of nuclear weapons and other weapons of

  12. Intake of macro- and micronutrients in Danish vegans.

    Science.gov (United States)

    Kristensen, Nadja B; Madsen, Mia L; Hansen, Tue H; Allin, Kristine H; Hoppe, Camilla; Fagt, Sisse; Lausten, Mia S; Gøbel, Rikke J; Vestergaard, Henrik; Hansen, Torben; Pedersen, Oluf

    2015-10-30

    Since information about macro- and micronutrient intake among vegans is limited we aimed to determine and evaluate their dietary and supplementary intake. Seventy 18-61 years old Danish vegans completed a four-day weighed food record from which their daily intake of macro- and micronutrients was assessed and subsequently compared to an age-range-matched group of 1,257 omnivorous individuals from the general Danish population. Moreover, the vegan dietary and supplementary intake was compared to the 2012 Nordic Nutrition Recommendations (NNR). Dietary intake differed significantly between vegans and the general Danish population in all measured macro- and micronutrients (p vegans the intake of macro- and micronutrients (including supplements) did not reach the NNR for protein, vitamin D, iodine and selenium. Among vegan women vitamin A intake also failed to reach the recommendations. With reference to the NNR, the dietary content of added sugar, sodium and fatty acids, including the ratio of PUFA to SFA, was more favorable among vegans. At the macronutrient level, the diet of Danish vegans is in better accordance with the NNR than the diet of the general Danish population. At the micronutrient level, considering both diet and supplements, the vegan diet falls short in certain nutrients, suggesting a need for greater attention toward ensuring recommended daily intake of specific vitamins and minerals.

  13. Information Security Risk Assessment in Hospitals.

    Science.gov (United States)

    Ayatollahi, Haleh; Shagerdi, Ghazal

    2017-01-01

    To date, many efforts have been made to classify information security threats, especially in the healthcare area. However, there are still many unknown risks which may threat the security of health information and their resources especially in the hospitals. The aim of this study was to assess the risks threatening information security in the hospitals located in one of the northwest cities of Iran. This study was completed in 2014. The participants were information technology managers who worked in the hospitals (n=27). The research instrument was a questionnaire composed of a number of open and closed questions. The content validity of the questionnaire was confirmed, and the reliability of the closed questions was measured by using the test-retest method (r =0.78). The results showed that among the information security risks, fire found to be a high probability/high impact risk factor. Human and physical/environmental threats were among the low probability risk factors. Regarding the information security safeguards used in the hospitals, the results showed that the use of the technical safeguards was the most frequent one (n =22, 91.7%) compared to the administrative (n =21, 87.5%) and the physical safeguards (n =16, 66.7%). The high probability risk factors require quick corrective actions to be taken. Therefore, the underlying causes of such threats should be identified and controlled before experiencing adverse effects. It is also important to note that information security in health care systems needs to be considered at a macro level with respect to the national interests and policies.

  14. Soil dehydrogenase activity of natural macro aggregates in a toposequence of forest soil

    Directory of Open Access Journals (Sweden)

    Maira Kussainova

    2013-01-01

    Full Text Available The main objective of this study was to determine changes in soil dehydrogenase activity in natural macro aggregates development along a slope in forest soils. This study was carried out in Kocadag, Samsun, Turkey. Four landscape positions i.e., summit, shoulder backslope and footslope, were selected. For each landseape position, soil macro aggregates were separated into six aggregate size classes using a dry sieving method and then dehydrogenase activity was analyzed. In this research, topography influenced the macroaggregate size and dehydrogenase activity within the aggregates. At all landscape positions, the contents of macro aggregates (especially > 6.3 mm and 2.00–4.75 mm in all soil samples were higher than other macro aggregate contents. In footslope position, the soils had generally the higher dehydrogenase activity than the other positions at all landscape positions. In all positions, except for shoulder, dehydrogenase activity was greater macro aggregates of <1 mm than in the other macro aggregate size.

  15. Comprehensive comparison of macro-strain mode and displacement mode based on different sensing technologies

    Science.gov (United States)

    Hong, Wan; Zhang, Jian; Wu, Gang; Wu, Zhishen

    2015-01-01

    A comprehensive comparison of macro-strain mode and displacement mode obtained from distributed macro-strain sensing and high-density point sensing (such as accelerometers) technologies is presented in this paper. Theoretical derivation reveals that displacement mode shape from accelerometers and modal macro-strain from distributed macro-strain sensors can be converted into each other. However, it is realized that displacement mode shape as global behavior of a structure can still be calculated with high-precision from modal macro-strain considering measurement errors in practical monitoring, whereas modal macro-strain can hardly be accurately achieved from displacement mode shape when signals are corrupted with noise in practical monitoring. Simulation and experiment results show that the calculated displacement mode shapes are very close to the actual ones even if the noise level reaches 5%. Meanwhile, damage index using measured modal macro-strain is still effective when the measurements are corrupted with 5% noise which is reliable for damage detection in practical monitoring. Calculating modal macro-strain from noise-polluted displacement mode shape will cause an unacceptable error if the noise level reaches only 0.5%, which has been verified in the simulation.

  16. Green paper: towards a European strategy for the security of energy supply

    International Nuclear Information System (INIS)

    2001-04-01

    The Green Paper ''Towards a European strategy for the security of energy supply in Europe'', published in 2002, gives a clear priority to energy efficiency and renewable. Although it is not a legislative document, it is accepted by the main actors as a reference for all energy related actions. Energie-Cites welcomes the Green Paper. This document gives a clear review of the energy context in Europe and raises fundamental questions, in particular, the place given to energy demand management, presented as the priority policy to ensure security of supply and compliance with the European Union international commitments. However, they precise three important points. It is indispensable that potential energy savings be quantified so as to emphasize the importance of a resource that has always been underestimated. By the same token, the ''demand management'' option presented in the Green Paper would gain in credibility if several alternative scenarios were proposed, the impact and the conditions for the success of such a policy being then more clearly apparent. A policy with a stronger focus on demand management and renewable energy requires one to redirect attention towards a different set of players. (A.L.B.)

  17. Immunopositivity for histone macroH2A1 isoforms marks steatosis-associated hepatocellular carcinoma.

    Directory of Open Access Journals (Sweden)

    Francesca Rappa

    Full Text Available Hepatocellular carcinoma (HCC is one of the most common cancers worldwide. Prevention and risk reduction are important and the identification of specific biomarkers for early diagnosis of HCC represents an active field of research. Increasing evidence indicates that fat accumulation in the liver, defined as hepatosteatosis, is an independent and strong risk factor for developing an HCC. MacroH2A1, a histone protein generally associated with the repressed regions of chromosomes, is involved in hepatic lipid metabolism and is present in two alternative spliced isoforms, macroH2A1.1 and macroH2A1.2. These isoforms have been shown to predict lung and colon cancer recurrence but to our knowledge, their role in fatty-liver associated HCC has not been investigated previously.We examined macroH2A1.1 and macroH2A1.2 protein expression levels in the liver of two murine models of fat-associated HCC, the high fat diet/diethylnistrosamine (DEN and the phosphatase and tensin homolog (PTEN liver specific knock-out (KO mouse, and in human liver samples of subjects with steatosis or HCC, using immunoblotting and immunohistochemistry.Protein levels for both macroH2A1 isoforms were massively upregulated in HCC, whereas macroH2A1.2 was specifically upregulated in steatosis. In addition, examination of human liver samples showed a significant difference (p<0.01 in number of positive nuclei in HCC (100% of tumor cells positive for either macroH2A1.1 or macroH2A1.2, when compared to steatosis (<2% of hepatocytes positive for either isoform. The steatotic areas flanking the tumors were highly immunopositive for macroH2A1.1 and macroH2A1.2.These data obtained in mice and humans suggest that both macroH2A1 isoforms may play a role in HCC pathogenesis and moreover may be considered as novel diagnostic markers for human HCC.

  18. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  19. The asymmetric effect of coal price on the China's macro economy using NARDL model

    Science.gov (United States)

    Hou, J. C.; Yang, M. C.

    2016-08-01

    The present work endeavors to explore the asymmetric effect of coal price on the China's macro economy by applying nonlinear autoregressive distributed lag (NARDL) model for the period of January 2005 to June 2015. The obtained results indicate that the coal price has a strong asymmetric effect on China's macro economy in the long-run. Namely one percent increase in coal price leads to 0.6194 percent of the China's macro economy increase; and while the coal price is reduces by 1 percent, the China's macro economy will decrease by 0.008 percent. These data indicate that when coal price rises, the effect on China's macro economy is far greater than the price decline. In the short-run, coal price fluctuation has a positive effect on the China's macro economy.

  20. Multi-State Initiatives---Agriculture Security Preparedness

    National Research Council Canada - National Science Library

    Gordon, Ellen

    2004-01-01

    ... to protect the nation's food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism including the struggle to secure the agriculture industry from potentially devastating attack...

  1. High macro rubber band ligature

    Directory of Open Access Journals (Sweden)

    José A. Reis Neto

    2013-07-01

    Full Text Available Purpose: The goal of a rubber band ligature is to promote fibrosis of the submucosa with subsequent fixation of the anal epithelium to the underlying sphincter. Following this principle, a new technique of ligature was developed based on two aspects: 1. macro banding: to have a better fibrosis and fixation by banding a bigger volume of mucosa and 2. higher ligature: to have this fixation at the origin of the hemorrhoidal cushion displacement. Methods: 1634 patients with internal hemorrhoidal disease grade II or III were treated by the technique called high macro rubber band. There was no distinction as to age, gender or race. To perform this technique a new hemorrhoidal device was specially designed with a larger diameter and a bigger capacity for mucosal volume aspiration. It is recommended to utilize a longer and wider anoscope to obtain a better view of the anal canal, which will facilitate the injection of submucosa higher in the anal canal and the insertion of the rubber band device. The hemorrhoidal cushion must be banded higher in the anal canal (4 cm above the pectinate line. It is preferable to treat all the hemorrhoids in one single session (maximum of three areas banded. Results: The analysis was retrospective without any comparison with conventional banding. The period of evaluation extended from one to twelve years. The analysis of the results showed perianal edema in 1.6% of the patients, immediate tenesmus in 0.8%, intense pain (need for parenteral analgesia in 1.6%, urinary retention in 0.1% of the patients and a symptomatic recurrence rate of 4.2%. All patients with symptomatic recurrence were treated with a new session of macro rubber banding. None of the patients developed anal or rectal sepsis. Small post-ligature bleeding was observed only in 0.8% of the patients. Conclusions: The high macro rubber banding technique represents an alternative method for the treatment of hemorrhoidal disease grades II or III, with good

  2. Households and food security: lessons from food secure households in East Africa.

    NARCIS (Netherlands)

    Silvestri, Silvia; Douxchamps, Sabine; Kristjanson, Patti; Förch, Wiebke; Radeny, Maren; Mutie, Lanetta; Quiros, F.C.; Herrero, M.; Ndungu, Anthony; Claessens, L.F.G.

    2015-01-01

    Background
    What are the key factors that contribute to household-level food security? What lessons can we learn from food secure households? What agricultural options and management strategies are likely to benefit female-headed households in particular? This paper addresses these questions

  3. Improving the Security of the U.S. Aeronautical Domain: Adopting an Intelligence-Led, Risk-Based Strategy and Partnership

    Science.gov (United States)

    2010-12-01

    a fingerprint -based criminal history records check (CHRC) for individuals seeking unescorted access to secure areas of an airport (§ 1542.209...What needs to be reduced? • What needs to be created? 111 With this information answered, a strategy canvas was then created to convey the

  4. [Challenges to decentralization and local participation within the health rights protection framework: Experience of the SUSALUD Northern Macro-regional Intendance].

    Science.gov (United States)

    Rebaza-Iparraguirre, Henry; Vela-López, Miguel; Villegas-Ortega, José; Lozada-Urbano, Michelle; Munares-García, Oscar

    2016-01-01

    In Peru, health protection rights and the National Health Authority (SUSALUD) coexist with the aim to ensure that every Peruvian may exercise his/her rights. According to the L.D. (Spanish: Decreto legislativo) N° 1158, strategies must be deployed to ensure effective decentralization and ensure compliance with user rights. As a result, the Northern Macro-regional Intendance (IMRN) was created, with headquarters in the city of Chiclayo, and a coverage area including Lambayeque, Tumbes, Piura, Cajamarca, La Libertad, and Amazonas. The northern macro-region promotes information dissemination, coordination, and local participation in health activities, with an emphasis on handling complaints and claims as well as implementation and operation support of user boards (JUS). After 6 months, implementation of the IMRN experience is undergoing consolidation.

  5. Ethical Hacking in Information Security Curricula

    Science.gov (United States)

    Trabelsi, Zouheir; McCoey, Margaret

    2016-01-01

    Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…

  6. Deficit irrigation and sustainable water-resource strategies in agriculture for China's food security.

    Science.gov (United States)

    Du, Taisheng; Kang, Shaozhong; Zhang, Jianhua; Davies, William J

    2015-04-01

    More than 70% of fresh water is used in agriculture in many parts of the world, but competition for domestic and industrial water use is intense. For future global food security, water use in agriculture must become sustainable. Agricultural water-use efficiency and water productivity can be improved at different points from the stomatal to the regional scale. A promising approach is the use of deficit irrigation, which can both save water and induce plant physiological regulations such as stomatal opening and reproductive and vegetative growth. At the scales of the irrigation district, the catchment, and the region, there can be many other components to a sustainable water-resources strategy. There is much interest in whether crop water use can be regulated as a function of understanding of physiological responses. If this is the case, then agricultural water resources can be reallocated to the benefit of the broader community. We summarize the extent of use and impact of deficit irrigation within China. A sustainable strategy for allocation of agricultural water resources for food security is proposed. Our intention is to build an integrative system to control crop water use during different cropping stages and actively regulate the plant's growth, productivity, and development based on physiological responses. This is done with a view to improving the allocation of limited agricultural water resources. © The Author 2015. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  7. Simplified Threshold RSA with Adaptive and Proactive Security

    DEFF Research Database (Denmark)

    Almansa Guerra, Jesus Fernando; Damgård, Ivan Bjerre; Nielsen, Jesper Buus

    2006-01-01

    We present the currently simplest, most efficient, optimally resilient, adaptively secure, and proactive threshold RSA scheme. A main technical contribution is a new rewinding strategy for analysing threshold signature schemes. This new rewinding strategy allows to prove adaptive security...... of a proactive threshold signature scheme which was previously assumed to be only statically secure. As a separate contribution we prove that our protocol is secure in the UC framework....

  8. Expression, purification and crystallization of the SARS-CoV macro domain

    International Nuclear Information System (INIS)

    Malet, Hélène; Dalle, Karen; Brémond, Nicolas; Tocque, Fabienne; Blangy, Stéphanie; Campanacci, Valérie; Coutard, Bruno; Grisel, Sacha; Lichière, Julie; Lantez, Violaine; Cambillau, Christian; Canard, Bruno; Egloff, Marie-Pierre

    2006-01-01

    The SARS-CoV macro domain was expressed, purified and crystallized. Selenomethionine-labelled crystals diffracted to 1.8 Å resolution. Macro domains or X domains are found as modules of multidomain proteins, but can also constitute a protein on their own. Recently, biochemical and structural studies of cellular macro domains have been performed, showing that they are active as ADP-ribose-1′′-phosphatases. Macro domains are also present in a number of positive-stranded RNA viruses, but their precise function in viral replication is still unknown. The major human pathogen severe acute respiratory syndrome coronavirus (SARS-CoV) encodes 16 non-structural proteins (nsps), one of which (nsp3) encompasses a macro domain. The SARS-CoV nsp3 gene region corresponding to amino acids 182–355 has been cloned, expressed in Escherichia coli, purified and crystallized. The crystals belong to space group P2 1 , with unit-cell parameters a = 37.5, b = 55.6, c = 108.9 Å, β = 91.4°, and the asymmetric unit contains either two or three molecules. Both native and selenomethionine-labelled crystals diffract to 1.8 Å

  9. Plasma membrane partitioning: from macro-domains to new views on plasmodesmata

    Directory of Open Access Journals (Sweden)

    Yohann eBoutté

    2014-04-01

    Full Text Available Compartmentalization of cellular functions relies on partitioning of domains of diverse sizes within the plasma membrane (PM. Macro-domains measure several micrometers and contain specific proteins concentrated to specific sides (apical, basal and lateral of the PM conferring a polarity to the cell. Cell polarity is one of the driving forces in tissue and growth patterning. To maintain macro-domains within the PM, eukaryotic cells exert diverse mechanisms to counteract the free lateral diffusion of proteins. Protein activation/inactivation, endocytosis, PM recycling of transmembrane proteins and the role of diffusion barriers in macro-domains partitioning at PM will be discussed. Moreover, as plasmodesmata (PDs are domains inserted within the PM which also mediate tissue and growth patterning, it is essential to understand how segregation of specific set of proteins is maintained at PDs while PDs domains are smaller in size compared to macro-domains. Here, we will present mechanisms allowing restriction of proteins at PM macrodomains, but for which molecular components have been found in PDs proteome. We will explore the hypothesis that partitioning of macro-domains and PDs may be ruled by similar mechanisms.

  10. Expression, purification and crystallization of the SARS-CoV macro domain

    Energy Technology Data Exchange (ETDEWEB)

    Malet, Hélène; Dalle, Karen; Brémond, Nicolas; Tocque, Fabienne; Blangy, Stéphanie; Campanacci, Valérie; Coutard, Bruno; Grisel, Sacha; Lichière, Julie; Lantez, Violaine; Cambillau, Christian; Canard, Bruno; Egloff, Marie-Pierre, E-mail: marie-pierre.egloff@afmb.univ-mrs.fr [Centre National de la Recherche Scientifique and Universités d’Aix-Marseille I et II, UMR 6098, Architecture et Fonction des Macromolécules Biologiques, UMR 6098-Case 932, 163 Avenue de Luminy, 13288 Marseille CEDEX 9 (France)

    2006-04-01

    The SARS-CoV macro domain was expressed, purified and crystallized. Selenomethionine-labelled crystals diffracted to 1.8 Å resolution. Macro domains or X domains are found as modules of multidomain proteins, but can also constitute a protein on their own. Recently, biochemical and structural studies of cellular macro domains have been performed, showing that they are active as ADP-ribose-1′′-phosphatases. Macro domains are also present in a number of positive-stranded RNA viruses, but their precise function in viral replication is still unknown. The major human pathogen severe acute respiratory syndrome coronavirus (SARS-CoV) encodes 16 non-structural proteins (nsps), one of which (nsp3) encompasses a macro domain. The SARS-CoV nsp3 gene region corresponding to amino acids 182–355 has been cloned, expressed in Escherichia coli, purified and crystallized. The crystals belong to space group P2{sub 1}, with unit-cell parameters a = 37.5, b = 55.6, c = 108.9 Å, β = 91.4°, and the asymmetric unit contains either two or three molecules. Both native and selenomethionine-labelled crystals diffract to 1.8 Å.

  11. The histone variant macroH2A is an epigenetic regulator of key developmental genes

    DEFF Research Database (Denmark)

    Buschbeck, Marcus; Uribesalgo, Iris; Wibowo, Indra

    2009-01-01

    The histone variants macroH2A1 and macroH2A2 are associated with X chromosome inactivation in female mammals. However, the physiological function of macroH2A proteins on autosomes is poorly understood. Microarray-based analysis in human male pluripotent cells uncovered occupancy of both macroH2A ...

  12. Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy

    Directory of Open Access Journals (Sweden)

    Audrey Guinchard

    2011-01-01

    Full Text Available Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked in the debate on cyber security. A UKreport on the cost of cyber crime illustrates this approach. Its authors chose to exclude from their analysis the costs in anticipation of cyber crime, such as insurance costs and the costs of purchasing anti-virus software on the basis that "these are likely to be factored into normal day-to-day expenditures for the Government, businesses, and individuals. This article contends if these costs had been quantified and integrated into the cost of cyber crime, then the analysis would have revealed that what matters is not so much cyber crime, but the fertile terrain of vulnerabilities that unleash a range of possibilities to whomever wishes to exploit them. By downplaying the vulnerabilities, the threats represented by cyber war, cyber terrorism, and cyber crime are conversely inflated. Therefore, reassessing risk as a strategy for security in cyberspace must include acknowledgment of understated vulnerabilities, as well as a better distributed knowledge about the nature and character of the overhyped threats of cyber crime, cyber terrorism, and cyber war.

  13. Strategic Management for IT Services on Outsourcing Security Company

    Directory of Open Access Journals (Sweden)

    Lydia Wijaya

    2018-04-01

    Full Text Available Information Technology (IT is used by many organizations to enhance competitive advantage, but many outsource security firms have not used IT in their business processes. In this research, we will design Strategic Management for IT Services for outsourcing security company. We use an outsourcing security company as a case study of IT Strategy Management for IT Services development. The purpose of this study is to create an IT services strategy for security outsourcing companies. The framework used is the ITIL (Information Technology Infrastructure Library framework service strategy in strategy management for IT services process. There are several steps taken in the making of the strategy: (a Strategic assessment stage to analyzed internal and external factors of the company. (b Strategy generation by creating the strategic plan. (c Strategy execution to determine the tactical plan. And (d strategy measurement and evaluation. This study produced the proposed IT service system that suits the needs of the company in the form of strategic, tactical plans and strategy measurement. This result can be used as the foundations of IT service development in outsourcing security company. In the process of this study, we work closely with stakeholders; every work product has been verified and validated by stakeholders.

  14. Collaboration potentials in micro and macro politics of audience creativity

    DEFF Research Database (Denmark)

    Brites, Maria José; Chimirri, Niklas Alexander; Amaral, Inês

    2017-01-01

    In our stakeholder consultation following up on trends concerning the micro and macropolitics of audience action, we explore the potential impact of audiences’ micro-participation and connection to macro-actions. We address this issue taking into consideration intrinsic continuities and discontin...... and discontinuities between academia and the stakeholders’ perspectives. Our findings continue to emphasise the • (dis)connections between micro and macro actions • a technological appeal for action • collaboration potentials between academia and other stakeholders.......In our stakeholder consultation following up on trends concerning the micro and macropolitics of audience action, we explore the potential impact of audiences’ micro-participation and connection to macro-actions. We address this issue taking into consideration intrinsic continuities...

  15. PETRO.CALC.PLOT, Microsoft Excel macros to aid petrologic interpretation

    Science.gov (United States)

    Sidder, G.B.

    1994-01-01

    PETRO.CALC.PLOT is a package of macros which normalizes whole-rock oxide data to 100%, calculates the cation percentages and molecular proportions used for normative mineral calculations, computes the apices for ternary diagrams, determines sums and ratios of specific elements of petrologic interest, and plots 33 X-Y graphs and five ternary diagrams. PETRO.CALC.PLOT also may be used to create other diagrams as desired by the user. The macros run in Microsoft Excel 3.0 and 4.0 for Macintosh computers and in Microsoft Excel 3.0 and 4.0 for Windows. Macros provided in PETRO.CALC.PLOT minimize repetition and time required to recalculate and plot whole-rock oxide data for petrologic analysis. ?? 1994.

  16. Evolutionary modelling of the macro-economic impacts of catastrophic flood events

    NARCIS (Netherlands)

    Safarzynska, K.E.; Brouwer, R.; Hofkes, M.

    2013-01-01

    This paper examines the possible contribution of evolutionary economics to macro-economic modelling of flood impacts to provide guidance for future economic risk modelling. Most macro-economic models start from a neoclassical economic perspective and focus on equilibrium outcomes, either in a static

  17. MALAYSIA'S POST-9/11 SECURITY STRATEGY: WINNING "HEARTS AND MINDS" OR LEGITIMISING THE POLITICAL STATUS QUO?

    Directory of Open Access Journals (Sweden)

    Andrew Humphreys

    2010-01-01

    Full Text Available Since the Emergency, the Malaysian government has maintained a security policy which somewhat paradoxically combines the use ofcoercive, repressive legislation with a "hearts and minds" ideology.Following 9/11, I argue that the government has adapted this "heartsand minds" approach to the so-called War on Terror. The BarisanNasional governments of Mahathir Mohamad and Abdullah Badawi bothformulated ideological strategies designed to undermine the ideological strength of al-Qaeda and establish Malaysia as a leader of the Muslim world. Mahathir and Abdullah hinged their ideological approach on a state-constructed form of Islam and sought to portray Malaysia as a tolerant and moderate Muslim country. However, it will be shown that the use of ideology in Malaysia is often calibrated to ensure regime security rather than national security. The Malaysian government has used its ideology to promote elite interests and limit the discursive space for alternative and opposing viewpoints. Significantly, ideology has been used to justify crackdowns against genuine political opponents and to legitimise the political status quo.

  18. Teaching RFID Information Systems Security

    Science.gov (United States)

    Thompson, Dale R.; Di, Jia; Daugherty, Michael K.

    2014-01-01

    The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…

  19. Learning to Solve Problems by Searching for Macro-Operators

    Science.gov (United States)

    1983-07-01

    executing generalized robot plans. Aritificial Intelligence 3:25 1-288, 1972. [Frey 821 Frey, Alexander Ii. Jr., and David Singmaster. Handbook of Cubik...and that searching for macros may be a useful general learning paradigm. 1.1. Introduction One view of die die field of artificial intelligence is that... intelligence literature [Schofield 67, Gaschnig 79, Ericsson 761 and provides one of the simplest examples of the operation of the Macro Problem Solver. It

  20. Homeland Security Affairs Journal (press release)

    OpenAIRE

    Naval Postgraduate School (U.S.); Center for Homeland Defense and Security

    2013-01-01

    Homeland Security Affairs (HSA) is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  1. A esportivização do skate (1960-1990: relações entre o macro e o micro La deportivización del skate (1960-1990: relaciones entre lo macro y micro The sportivization of skateboarding (1960-1990: relations between the macro and the micro

    Directory of Open Access Journals (Sweden)

    Tony Honorato

    2013-03-01

    Full Text Available O objetivo deste estudo foi apresentar elementos da esportivização da prática cultural skate (1960-1990, como conhecimento para o entendimento da relação entre o micro e o macro processo sócio-histórico do skate. Como fonte de pesquisa histórica para a esportivização do skate no Brasil, dimensão macro, utilizamos a Revista Tribo Skate e para a de Piracicaba/SP, dimensão micro, entrevistamos dois colaboradores a partir do método da história oral. Os resultados evidenciaram que o skate surgiu para gerar fortes tensões agradáveis, suas formas de lazer precedem as formas esportivas e, guardadas as particularidades, os seus processos macro e micro-históricos são interdependentes.El objetivo del estudio fue presentar elementos de la deportivización de la práctica cultural skate (1960-1990, como conocimiento para el entendimiento de la relación entre el micro y macro proceso socio-histórico del mismo. Como fuente de investigación histórica para la deportivización del skate en Brasil, dimensión macro, utilizamos la Revista Tribo Skate y para la de Piracicaba/SP, dimensión micro, entrevistamos dos colaboradores a partir del método de historia oral. Los resultados evidenciaron que el skate surgió para generar fuertes tensiones agradables, sus formas de ocio preceden a sus formas deportivas y, salvando las particularidades, los procesos macro y micro-históricos son interdependientes.The objective of this study is to present the elements of the sportivization of the cultural practice of skateboarding (1960-1990, as knowledge for the understanding of the relation between the micro and the macro social and historical processes of skateboarding. We used the magazine Revista Tribo Skate as source of historical research for the sportivization of skateboarding in Brazil, the macro dimension, and for the micro dimension, the city of Piracicaba/SP, where we interviewed two collaborators based on the method of oral history. The results

  2. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  3. Micro-Macro Paradoxes of Entrepreneurship

    DEFF Research Database (Denmark)

    Søgaard, Villy

    2008-01-01

    Artiklen tager afsæt i det såkaldte micro-macro paradox fra Aids-Efficiency litteraturen og argumenterer for, at en tilsvarende problemstilling bør inddrages i vurderingen af f.eks. de beskæftigelsesmæssige konsekvenser af entrepreneuriel virksomhed. Den påviser også i en gennemgang af litteratur...

  4. MORTRAN-2, FORTRAN Language Extension with User-Supplied Macros

    International Nuclear Information System (INIS)

    Cook, A. James; Shustek, L.J.

    1980-01-01

    1 - Description of problem or function: MORTRAN2 is a FORTRAN language extension that permits a relatively easy transition from FORTRAN to a more convenient and structured language. Its features include free-field format; alphanumeric statement labels; flexible comment convention; nested block structure; for-by-to, do, while, until, loop, if-then-else, if-else, exit, and next statements; multiple assignment statements; conditional compilation; and automatic listing indentation. The language is implemented by a macro-based pre-processor and is further extensible by user-defined macros. 2 - Method of solution: The MORTRAN2 pre-processor may be regarded as a compiler whose object code is ANSI Standard FORTRAN. The MORTRAN2 language is dynamically defined by macros which are input at each use of the pre-processor. 3 - Restrictions on the complexity of the problem: The pre-processor output must be accepted by a FORTRAN compiler

  5. The practical engineer-fine-tuning memory macros using variable internal delays

    CERN Document Server

    Gray, K

    1999-01-01

    Embedded memory blocks are extremely common in application-specific IC (ASIC) chips. In this era of design reuse, it is critical that these memory macros, as they are also called, should be as versatile as possible. Their $9 performance should be optimal, with adequate sense amplifier signal over the full manufacturing process range of the chip. Fortunately, several simple techniques exist for adapting memory macros to different applications running at $9 different speeds. The key is to design in delays that are variable and/or programmable. The approach is also helpful in debugging initial hardware where a memory macro is refusing to function because its timing is too fast and there $9 is insufficient internal delay for proper circuit operation. The techniques can also eliminate the process of redesigning and refabricating the initial hardware just to characterize it. A memory macro is made to function by internal $9 pulses, generated in the correct number, sequence and relationship by the internal timing ch...

  6. Sustainable development strategy formation for business corporations

    Directory of Open Access Journals (Sweden)

    L. A. Zaporozhtseva

    2016-01-01

    Full Text Available The article explains the concept of the company sustainable development strategy based on its economic security level, which includes the economic security concept loss threat control; and the concept of company sustainable development based on the fact, that the company in a developed market should not only "defend", but also ensure its development. After it implementation of decomposition is applied to the system of strategic economic security through a balanced scorecard, which allows translating the mission and vision into a set of operational goals and targets. The main components of strategic economic security provision are: business processes, finance, contractors and staff; based on the state which economic security level is determined as: high, normal, low or critical. After that, the strategic prospects are set, i.e. transition from the lowest to the highest economic security level takes place, passing the economic security fields. In order to do this, certain company development strategy is selected, the mechanism for its implementation is being worked out. At the same time, company sustainable development strategy is identified in the case of a growth strategy use, which implies a transition from endogenous development strategy to introductive or introspective development strategy with further access to multi-integral development strategy. If there is inverse relationship, one can not speak of any sustainable development strategy. Besides, development, implementation and use of monitoring for the design process of the company's development strategy taking into account its economic security level acquires great importance.

  7. Revolutionary Transformation in the Macro-Regional Modernities

    Czech Academy of Sciences Publication Activity Database

    Hrubec, Marek

    2015-01-01

    Roč. 11, č. 6 (2015), s. 79-91 ISSN 1841-0464 Institutional support: RVO:67985955 Keywords : macro-regional * modernities * revolutionary transformations * intercultural * global Subject RIV: AA - Philosophy ; Religion

  8. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  9. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  10. Macro factors in oil futures returns

    International Nuclear Information System (INIS)

    Le Pen, Yannick; Sevi, Benoit

    2012-01-01

    We investigate the macro factors that can explain the monthly oil futures return for the NYMEX WTI futures contract for the time period 1993:11 to 2010:03. We build a new database of 187 real and nominal macro-economic variables from developed and emerging countries and resort to the large factor approximate model to extract 9 factors from this dataset. We then regress crude oil return on several combinations of these factors. Our best model explains around 38% of the variability of oil futures return. More interestingly, the factor which has the largest influence on crude oil price is related to real variables from emerging countries. This result confirms the latest finding in the literature that the recent evolution in oil price is attributable to change in supply and demand conditions and not to the large increase in trading activity from speculators. (authors)

  11. Modeling air concentration over macro roughness conditions by Artificial Intelligence techniques

    Science.gov (United States)

    Roshni, T.; Pagliara, S.

    2018-05-01

    Aeration is improved in rivers by the turbulence created in the flow over macro and intermediate roughness conditions. Macro and intermediate roughness flow conditions are generated by flows over block ramps or rock chutes. The measurements are taken in uniform flow region. Efficacy of soft computing methods in modeling hydraulic parameters are not common so far. In this study, modeling efficiencies of MPMR model and FFNN model are found for estimating the air concentration over block ramps under macro roughness conditions. The experimental data are used for training and testing phases. Potential capability of MPMR and FFNN model in estimating air concentration are proved through this study.

  12. Response of tropical peat swamp forest tree species seedlings to macro nutrients

    Directory of Open Access Journals (Sweden)

    Tri Wira Yuwati

    2015-10-01

    Full Text Available Abstract Efforts of restoration of degraded tropical peat swamp forest were facing constraints due to the low available nutrient level of peat. The transplanted peat swamp forest species seedlings experienced low survival rate and poor growth performance. This study aimed to demonstrate the response of ten tropical peat swamp forest species seedlings whether climax and pioneer species to macro-nutrients addition in the nursery. The growth performance of climax and pioneer tropical peat swamp species seedlings was recorded following addition of macro nutrients of Nitrogen (N, Phosphorus(P, Potassium(K and Dolomitic limestone (CaMg. The result showed that Alstonia spatulata and Parartocarpus venenosus showed positive growth response following macro nutrients addition. This study concluded that tropical peat swamp pioneer species has lower necessity for macro-nutrients addition than tropical peat swamp climax species.

  13. On the relationship between micro and macro correlations in nuclear measurement uncertainties

    International Nuclear Information System (INIS)

    Smith, D.L.

    1987-01-01

    Consideration is given to the propagation of micro correlations between the component experimental errors (corresponding to diverse attributes of the measurement process) through to the macro correlations between the total errors in the final derived experimental values. Whenever certain micro correlations cannot be precisely specified, the macro correlations must also be uncertain. However, on the basis of fundamental principles from mathematical statistics, it is shown that these uncertainties in the macro correlations can be substantially smaller than the individual uncertainties for specific micro correlations, provided that the number of distinct attributes contributing to the total experimental error is reasonably large. Furthermore, the resulting macro correlations are shown to be approximately normally distributed regardless of teh distributions assumed for the micro correlations. Examples are provided to demonstrate these concepts and to illustrate their relevance to experimental nuclear research. (orig.)

  14. Socio-Hydrological Observatory for Water Security (SHOWS): Examples of Adaptation Strategies With Next Challenges from Brazilian Risk Areas

    Science.gov (United States)

    Souza, F. A. A. D.; Mendiondo, E. M.; Taffarello, D.; Guzmán-Arias, D.; Fava, M. C.; Abreu, F.; Freitas, C. C.; de Macedo, M. B.; Estrada, C. R.; do Lago, C. A.

    2017-12-01

    In Brazil, more than 40,000 hot-spot areas, with vulnerable human settlements with ca. 120 million inhabitants and responsible of 60% of Brazilian Gross Net Product, are threatened by hydrological-driven disaster risks. In these areas, local resilient actions and adaptation strategies do integrate the current Brazilian Act and Regulation of Laws of urban waters, climate change and civil protection. However, these initiatives are still under slow progress, especially to cope with floods, landslides, droughts, progressive biodiversity losses and energy burnouts. Here we address these hot-spots through the concept of Socio-Hydrological Observatory for Water Security (SHOWS), with a mix of adaptation strategies, open-source, big data analysis and societal feedbacks. On the one hand, SHOWS merges strategies like the dynamic framework of water security (Srinivasan et al, 2017), drought risk mapping (Rossato et al, 2017) and water securitization under varying water demand and climate change until year 2100 (Mohor & Mendiondo, 2017; Guzmán-Arias et al, 2017). SHOWS acknowledges different perspectives of water insecurity, several spatiotemporal scales and regime shifts in socio-hydrologic systems. On the one hand, SHOWS links field monitoring during water insecurity hazards (Taffarello et al, 2016), ecosystem-based adaptation networks, and decision-making and big data sources to disaster management (Horita et al, 2017). By using selected examples from two Brazilian running interdisciplinary research aliances, i.e. CAPES-ProAlertas CEMADEN-CEPED/USP and the CNPq/FAPESP National Institute of Science & Technology on Climate Change-II Water Security, we also face the limits, the pros and cons of SHOWS' assumptions. Through real-cases paradoxes, (i.e. 2013/2014 drought), water dashboards and coevolution trends (i.e. impacts on river basin committees from scenarios until 2050, 2100 in NE & SE Brazil), SHOWS helps on guiding decisionmaking for next societal steps of water

  15. An efficient macro-cell placement algorithm

    NARCIS (Netherlands)

    Aarts, E.H.L.; Bont, de F.M.J.; Korst, J.H.M.; Rongen, J.M.J.

    1991-01-01

    A new approximation algorithm is presented for the efficient handling of large macro-cell placement problems. The algorithm combines simulated annealing with new features based on a hierarchical approach and a divide-and-conquer technique. Numerical results show that these features can lead to a

  16. Description and performances of MACRO TRD

    International Nuclear Information System (INIS)

    Bellotti, R.; Barbarito, E.; Cafagna, F.; Castellano, M.; De Cataldo, G.; De Marzo, C.; Favuzzi, C.; Fusco, P.; Giglietto, N.; Mazziotta, M.N.; Perchiazzi, M.; Raino', A.; Sacchetti, A.; Spinelli, P.

    1995-01-01

    We discuss the applications of a transition radiation detector (TRD) to measure the residual energy of cosmic rays muons in underground laboratories and present the first MACRO TRD module. Results from prototypes operated in a test beam at CERN PS are also given. (orig.)

  17. Homeland Security - Can It be Done?

    Science.gov (United States)

    2003-04-07

    and get past the shenanigans in Congress and implement homeland security strategies.ř The new DHS is scheduled to move 22 federal agencies and...uniform laws to license and regulate certain financial services, since terrorists exploit such services. The strategy also takes care with definitions...initiative from organizations interested in the security of sensitive information, such as financial services, healthcare, and government. 47Joseph R. Barnes

  18. Studying neighborhood crime across different macro spatial scales: The case of robbery in 4 cities.

    Science.gov (United States)

    Hipp, John R; Wo, James C; Kim, Young-An

    2017-11-01

    Whereas there is a burgeoning literature focusing on the spatial distribution of crime events across neighborhoods or micro-geographic units in a specific city, the present study expands this line of research by selecting four cities that vary across two macro-spatial dimensions: population in the micro-environment, and population in the broader macro-environment. We assess the relationship between measures constructed at different spatial scales and robbery rates in blocks in four cities: 1) San Francisco (high in micro- and macro-environment population); 2) Honolulu (high in micro- but low in macro-environment population); 3) Los Angeles (low in micro- but high in macro-environment population); 4) Sacramento (low in micro- and macro-environment population). Whereas the socio-demographic characteristics of residents further than ½ mile away do not impact robbery rates, the number of people up to 2.5 miles away are related to robbery rates, especially in the two cities with smaller micro-environment population, implying a larger spatial scale than is often considered. The results show that coefficient estimates differ somewhat more between cities differing in micro-environment population compared to those differing based on macro-environment population. It is therefore necessary to consider the broader macro-environment even when focusing on the level of crime across neighborhoods or micro-geographic units within an area. Copyright © 2017 Elsevier Inc. All rights reserved.

  19. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  20. Gender as a Macro Economic Variable

    NARCIS (Netherlands)

    I.P. van Staveren (Irene)

    2014-01-01

    markdownabstract__Abstract__ This chapter will analyse how gender can be used in a meaningful way in macroeconomic analysis. The challenge is that gender cannot be measured easily at the macro level. This is either because current gender variables are one-dimensional and miss out much gender

  1. Gender as a Macro Economic Variable

    NARCIS (Netherlands)

    I.P. van Staveren (Irene)

    2013-01-01

    markdownabstract__Abstract__ This chapter will analyse how gender can be used in a meaningful way in macroeconomic analysis. The challenge is that gender cannot be measured easily at the macro level. This is either because current gender variables are one-dimensional and miss out much gender

  2. Study on Cyber-security Strategy and National Cyberspace Sovereignty%论网络安全战略与国家网络主权

    Institute of Scientific and Technical Information of China (English)

    邹鹏; 朱诗兵; 邹红霞

    2017-01-01

    While national interests increasingly extending with the development of cyberspace, cyberspace sovereignty and its guarantee have drawn wide attention from international communities and major countries have developed space-security strategy to safeguard their national cyberspace sovereignty.This paper analyzes the relationship between the cyberspace sovereignty and cyber-security as well as summarizes the characteristics of existing cyber-security strategies in the world.In view of protecting our national cyberspace sovereignty, it points out the issues we should pay more attention to in the formulation and implementation of cyber-security strategy which include taking national security as the starting point, taking cyberspace sovereignty as the fundament, perfecting relevant law and regulation systems, improving relevant systems, mechanisms and the support systems, accelerating the development of core technologies in cyber-security and strengthening the cyber-security training.%随着网络空间承载的国家利益日益广泛,网络主权及其保障问题引起了国际社会的高度重视,世界主要国家纷纷通过制定网络安全战略来维护本国网络主权.分析了世界各国对网络主权保护的态度及网络主权与网络安全的关系,综述了世界各国现有网络安全战略的特点.从保护我国国家网络主权的实际需求出发,指出了我国在网络安全战略的制定和实施中应当重点关注的问题,即以总体国家安全观为根本出发点、以网络主权为基本依据、健全相关法律法规体系、健全体制机制和保障力量体系、加快推进网络安全核心技术发展以及加强网络安全人才培养.

  3. From micro-correlations to macro-correlations

    International Nuclear Information System (INIS)

    Eliazar, Iddo

    2016-01-01

    Random vectors with a symmetric correlation structure share a common value of pair-wise correlation between their different components. The symmetric correlation structure appears in a multitude of settings, e.g. mixture models. In a mixture model the components of the random vector are drawn independently from a general probability distribution that is determined by an underlying parameter, and the parameter itself is randomized. In this paper we study the overall correlation of high-dimensional random vectors with a symmetric correlation structure. Considering such a random vector, and terming its pair-wise correlation “micro-correlation”, we use an asymptotic analysis to derive the random vector’s “macro-correlation” : a score that takes values in the unit interval, and that quantifies the random vector’s overall correlation. The method of obtaining macro-correlations from micro-correlations is then applied to a diverse collection of frameworks that demonstrate the method’s wide applicability.

  4. WinBUGSio: A SAS Macro for the Remote Execution of WinBUGS

    Directory of Open Access Journals (Sweden)

    Michael K. Smith

    2007-09-01

    Full Text Available This is a macro which facilitates remote execution of WinBUGS from within SAS. The macro pre-processes data for WinBUGS, writes the WinBUGS batch-script, executes this script and reads in output statistics from the WinBUGS log-file back into SAS native format. The user specifies the input and output file names and directory path as well as the statistics to be monitored in WinBUGS. The code works best for a model that has already been set up and checked for convergence diagnostics within WinBUGS. An obvious extension of the use of this macro is for running simulations where the input and output files all have the same name but all that differs between simulation iterations is the input dataset. The functionality and syntax of the macro call are described in this paper and illustrated using a simple linear regression model.

  5. Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers

    OpenAIRE

    2012-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Te...

  6. Enhanced stopping of macro-particles in particle-in-cell simulations

    International Nuclear Information System (INIS)

    May, J.; Tonge, J.; Ellis, I.; Mori, W. B.; Fiuza, F.; Fonseca, R. A.; Silva, L. O.; Ren, C.

    2014-01-01

    We derive an equation for energy transfer from relativistic charged particles to a cold background plasma appropriate for finite-size particles that are used in particle-in-cell simulation codes. Expressions for one-, two-, and three-dimensional particles are presented, with special attention given to the two-dimensional case. This energy transfer is due to the electric field of the wake set up in the background plasma by the relativistic particle. The enhanced stopping is dependent on the q 2 /m, where q is the charge and m is the mass of the relativistic particle, and therefore simulation macro-particles with large charge but identical q/m will stop more rapidly. The stopping power also depends on the effective particle shape of the macro-particle. These conclusions are verified in particle-in-cell simulations. We present 2D simulations of test particles, relaxation of high-energy tails, and integrated fast ignition simulations showing that the enhanced drag on macro-particles may adversely affect the results of these simulations in a wide range of high-energy density plasma scenarios. We also describe a particle splitting algorithm which can potentially overcome this problem and show its effect in controlling the stopping of macro-particles

  7. Strategy to Enhance International Supply Chain Security

    National Research Council Canada - National Science Library

    2007-01-01

    .... at 1901, 1903, October 13, 2006) which require the development of a strategic plan to enhance the security of the international supply chain, including protocols for the expeditious resumption of the flow of trade following...

  8. Development of Hollow Steel Ball Macro-Encapsulated PCM for Thermal Energy Storage Concrete

    Directory of Open Access Journals (Sweden)

    Zhijun Dong

    2016-01-01

    Full Text Available The application of thermal energy storage with phase change materials (PCMs for energy efficiency of buildings grew rapidly in the last few years. In this research, octadecane paraffin was served as a PCM, and a structural concrete with the function of indoor temperature control was developed by using a macro-encapsulated PCM hollow steel ball (HSB. The macro-encapsulated PCM-HSB was prepared by incorporation of octadecane into HSBs through vacuum impregnation. Test results showed that the maximum percentage of octadecane carried by HSBs was 80.3% by mass. The macro-encapsulated PCM-HSB has a latent heat storage capacity as high as 200.5 J/g. The compressive strength of concrete with macro-encapsulated PCM-HSB at 28 days ranged from 22 to 40 MPa. The indoor thermal performance test revealed that concrete with macro-encapsulated octadecane-HSB was capable of reducing the peak indoor air temperature and the fluctuation of indoor temperature. It can be very effective in transferring the heating and cooling loads away from the peak demand times.

  9. Development of Hollow Steel Ball Macro-Encapsulated PCM for Thermal Energy Storage Concrete.

    Science.gov (United States)

    Dong, Zhijun; Cui, Hongzhi; Tang, Waiching; Chen, Dazhu; Wen, Haibo

    2016-01-19

    The application of thermal energy storage with phase change materials (PCMs) for energy efficiency of buildings grew rapidly in the last few years. In this research, octadecane paraffin was served as a PCM, and a structural concrete with the function of indoor temperature control was developed by using a macro-encapsulated PCM hollow steel ball (HSB). The macro-encapsulated PCM-HSB was prepared by incorporation of octadecane into HSBs through vacuum impregnation. Test results showed that the maximum percentage of octadecane carried by HSBs was 80.3% by mass. The macro-encapsulated PCM-HSB has a latent heat storage capacity as high as 200.5 J/g. The compressive strength of concrete with macro-encapsulated PCM-HSB at 28 days ranged from 22 to 40 MPa. The indoor thermal performance test revealed that concrete with macro-encapsulated octadecane-HSB was capable of reducing the peak indoor air temperature and the fluctuation of indoor temperature. It can be very effective in transferring the heating and cooling loads away from the peak demand times.

  10. Development of Hollow Steel Ball Macro-Encapsulated PCM for Thermal Energy Storage Concrete

    Science.gov (United States)

    Dong, Zhijun; Cui, Hongzhi; Tang, Waiching; Chen, Dazhu; Wen, Haibo

    2016-01-01

    The application of thermal energy storage with phase change materials (PCMs) for energy efficiency of buildings grew rapidly in the last few years. In this research, octadecane paraffin was served as a PCM, and a structural concrete with the function of indoor temperature control was developed by using a macro-encapsulated PCM hollow steel ball (HSB). The macro-encapsulated PCM-HSB was prepared by incorporation of octadecane into HSBs through vacuum impregnation. Test results showed that the maximum percentage of octadecane carried by HSBs was 80.3% by mass. The macro-encapsulated PCM-HSB has a latent heat storage capacity as high as 200.5 J/g. The compressive strength of concrete with macro-encapsulated PCM-HSB at 28 days ranged from 22 to 40 MPa. The indoor thermal performance test revealed that concrete with macro-encapsulated octadecane-HSB was capable of reducing the peak indoor air temperature and the fluctuation of indoor temperature. It can be very effective in transferring the heating and cooling loads away from the peak demand times. PMID:28787859

  11. Practice to Policy: Clinical psychologists' experiences of macro-level work

    OpenAIRE

    Browne, N.

    2017-01-01

    Many clinical psychologists are venturing beyond their traditional therapeutic roles to undertake macro-level work, engaging with social change, policy and public health. However, no research has systematically examined clinical psychologists’ roles in policy work and the implications for the profession. Part 1 of the thesis is a literature review of one area of macro-level policy aimed at improving the social determinants of mental health. It reviews nine intervention studies of housing impr...

  12. Potential of dynamic spectrum allocation in LTE macro networks

    Science.gov (United States)

    Hoffmann, H.; Ramachandra, P.; Kovács, I. Z.; Jorguseski, L.; Gunnarsson, F.; Kürner, T.

    2015-11-01

    In recent years Mobile Network Operators (MNOs) worldwide are extensively deploying LTE networks in different spectrum bands and utilising different bandwidth configurations. Initially, the deployment is coverage oriented with macro cells using the lower LTE spectrum bands. As the offered traffic (i.e. the requested traffic from the users) increases the LTE deployment evolves with macro cells expanded with additional capacity boosting LTE carriers in higher frequency bands complemented with micro or small cells in traffic hotspot areas. For MNOs it is crucial to use the LTE spectrum assets, as well as the installed network infrastructure, in the most cost efficient way. The dynamic spectrum allocation (DSA) aims at (de)activating the available LTE frequency carriers according to the temporal and spatial traffic variations in order to increase the overall LTE system performance in terms of total network capacity by reducing the interference. This paper evaluates the DSA potential of achieving the envisaged performance improvement and identifying in which system and traffic conditions the DSA should be deployed. A self-optimised network (SON) DSA algorithm is also proposed and evaluated. The evaluations have been carried out in a hexagonal and a realistic site-specific urban macro layout assuming a central traffic hotspot area surrounded with an area of lower traffic with a total size of approximately 8 × 8 km2. The results show that up to 47 % and up to 40 % possible DSA gains are achievable with regards to the carried system load (i.e. used resources) for homogenous traffic distribution with hexagonal layout and for realistic site-specific urban macro layout, respectively. The SON DSA algorithm evaluation in a realistic site-specific urban macro cell deployment scenario including realistic non-uniform spatial traffic distribution shows insignificant cell throughput (i.e. served traffic) performance gains. Nevertheless, in the SON DSA investigations, a gain of up

  13. Interdependent Risk and Cyber Security: An Analysis of Security Investment and Cyber Insurance

    Science.gov (United States)

    Shim, Woohyun

    2010-01-01

    An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…

  14. Macro scale models for freight railroad terminals.

    Science.gov (United States)

    2016-03-02

    The project has developed a yard capacity model for macro-level analysis. The study considers the detailed sequence and scheduling in classification yards and their impacts on yard capacities simulate typical freight railroad terminals, and statistic...

  15. Titoli e attività bancaria: ponti e mura (Securities and Banking: Bridges and Walls

    Directory of Open Access Journals (Sweden)

    Tommaso Padoa-Schioppa

    2002-12-01

    Full Text Available The paper examines the relationship between banking and securities activities in the light of financial market developments (securitisation, institutionalization of investment, emergence of complex financial instruments, conglomeration and consolidation, with particular reference to Europe. The enhanced links between banking and securities businesses have generated increased and new risks to financial institutions. However, banks' stability remains crucial for the stability of the financial system as a whole, because of their unique role as provider of liquidity. The paper also addresses the implications of the banking-securities combination for regulatory and supervisory arrangements. The exporting of prudential requirements traditional in banking (such as capital ratios into the securities field, and the importing of securities regulation (such as transparency requirements into the banking sector, can be deemed mutually beneficial. As regards supervision, there is a need to monitor the continued effectiveness of the current framework. This entails strengthening co-operation both at the national level and on a cross-border basis among sectoral supervisors in the micro-prudential field, and between them and central banks in the macro-prudential field.

  16. The green paper 'towards a European strategy for the security of energy supply'

    International Nuclear Information System (INIS)

    Laponche, B.; Tillerson, K.

    2001-01-01

    The Green Paper, 'Towards a European Strategy for the Security of Energy Supply' was adopted by the European Commission on the 20. of November, 2000 (COM(2000)769 final). At this occasion, the Commission launched a public debate on this strategic document. On the 21. of June 2001, a Public Hearing on Security of energy supply in Europe, on the basis of the Green Paper, was organised by the Committee on Industry, External Trade, Research and Energy of the European Parliament. Bernard Laponche was among the six experts participating to the Hearing and presented the following paper, prepared with Kenya Tillerson. This presentation is organised in three chapters: I - Comments on the Green Paper; II - Energy efficiency potentials; III - Conclusions and Recommendations. Chapter I shows that under the heading of the security of supply, the Green paper elaborates and proposes a global energy strategy taking into account environmental and internal market issues and constraints. This leads to recommendations for a common energy policy for Europe based, as first priority, on a demand policy, i.e. energy efficiency on the demand side. If the necessity of such a policy is clearly stated, the Green paper remains weak on the quantitative objectives, due to the lack of contrasted energy forecast scenarios, as well as on the means of a vigorous energy efficiency policy at European Level. The issue of energy efficiency potentials at European Union level is examined in Chapter II, in the light of the poor information which can be extracted from the energy scenarios presented by the European Commission in various publications. A comparison of energy consumption indicators in France and the European Union leads to a rough estimate of a potential for energy demand efficiency by 2020 of the order of 280 Mtoe on final energy consumption, for the European Union. Chapter III underlines the merits of the Green Paper which are a clear-sighted analysis and a well defined main recommendation

  17. A Learning-Based Approach to Reactive Security

    Science.gov (United States)

    Barth, Adam; Rubinstein, Benjamin I. P.; Sundararajan, Mukund; Mitchell, John C.; Song, Dawn; Bartlett, Peter L.

    Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the reactive defender learns from past attacks instead of myopically overreacting to the last attack. Our game-theoretic model follows common practice in the security literature by making worst-case assumptions about the attacker: we grant the attacker complete knowledge of the defender's strategy and do not require the attacker to act rationally. In this model, we bound the competitive ratio between a reactive defense algorithm (which is inspired by online learning theory) and the best fixed proactive defense. Additionally, we show that, unlike proactive defenses, this reactive strategy is robust to a lack of information about the attacker's incentives and knowledge.

  18. Climate change and macro-economic cycles in pre-industrial europe.

    Science.gov (United States)

    Pei, Qing; Zhang, David D; Lee, Harry F; Li, Guodong

    2014-01-01

    Climate change has been proven to be the ultimate cause of social crisis in pre-industrial Europe at a large scale. However, detailed analyses on climate change and macro-economic cycles in the pre-industrial era remain lacking, especially within different temporal scales. Therefore, fine-grained, paleo-climate, and economic data were employed with statistical methods to quantitatively assess the relations between climate change and agrarian economy in Europe during AD 1500 to 1800. In the study, the Butterworth filter was adopted to filter the data series into a long-term trend (low-frequency) and short-term fluctuations (high-frequency). Granger Causality Analysis was conducted to scrutinize the associations between climate change and macro-economic cycle at different frequency bands. Based on quantitative results, climate change can only show significant effects on the macro-economic cycle within the long-term. In terms of the short-term effects, society can relieve the influences from climate variations by social adaptation methods and self-adjustment mechanism. On a large spatial scale, temperature holds higher importance for the European agrarian economy than precipitation. By examining the supply-demand mechanism in the grain market, population during the study period acted as the producer in the long term, whereas as the consumer in the short term. These findings merely reflect the general interactions between climate change and macro-economic cycles at the large spatial region with a long-term study period. The findings neither illustrate individual incidents that can temporarily distort the agrarian economy nor explain some specific cases. In the study, the scale thinking in the analysis is raised as an essential methodological issue for the first time to interpret the associations between climatic impact and macro-economy in the past agrarian society within different temporal scales.

  19. 一种分布式互联网彩票安全策略%A distributed security strategy for internet lottery

    Institute of Scientific and Technical Information of China (English)

    梅颖

    2017-01-01

    This paper proposes a distributed security strategy for internet lottery;it builds a distributed public ledger based on the blockchain technology to record all lottery transactions and provides the specific details of the strategy and the prototype architecture,analyzes the security characteristics of the strategy about anonymity,non-repudiation,tamper-resistant,transparency,which proves that the strategy can effectively solve the problems caused by the traditional centralization technology,that make operation is opaque,easy to be artificially controlled,lottery transactions in the entire process cannot be perceived by the user,so as to provide an effective solution for the construction of a secure internet lottery system.%提出了一种分布式互联网彩票安全策略,该策略基于区块链技术建立一个分布式公共账本,记录所有的彩票交易记录.详细阐述了该策略的具体细节和原型体系结构,并通过对该策略的匿名性、抗抵赖性、防篡改、透明性等安全特性进行分析,证明该策略能有效解决传统的基于中心化技术所导致运营不透明、容易被人为控制、彩票交易的整个流程中也不能被用户察觉等问题,为构建安全的互联网彩票系统提供有效的解决方案.

  20. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  1. The relationship between venture capital investment and macro economic variables via statistical computation method

    Science.gov (United States)

    Aygunes, Gunes

    2017-07-01

    The objective of this paper is to survey and determine the macroeconomic factors affecting the level of venture capital (VC) investments in a country. The literary depends on venture capitalists' quality and countries' venture capital investments. The aim of this paper is to give relationship between venture capital investment and macro economic variables via statistical computation method. We investigate the countries and macro economic variables. By using statistical computation method, we derive correlation between venture capital investments and macro economic variables. According to method of logistic regression model (logit regression or logit model), macro economic variables are correlated with each other in three group. Venture capitalists regard correlations as a indicator. Finally, we give correlation matrix of our results.

  2. Determinants of The Application of Macro Prudential Instruments

    Directory of Open Access Journals (Sweden)

    Zakaria Firano

    2017-09-01

    Full Text Available The use of macro prudential instruments today gives rise to a major debate within the walls of central banks and other authorities in charge of financial stability. Contrary to micro prudential instruments, whose effects remain limited, macro prudential instruments are different in nature and can affect the stability of the financial system. By influencing the financial cycle and the financial structure of financial institutions, the use of such instruments should be conducted with great vigilance as well as macroeconomic and financial expertise. But the experiences of central banks in this area are sketchy, and only some emerging countries have experience using these types of instruments in different ways. This paper presents an analysis of instruments of macro prudential policy and attempts to empirically demonstrate that these instruments should be used only in specific economic and financial situations. Indeed, the results obtained, using modeling bivariate panel, confirm that these instruments are more effective when used to mitigate the euphoria of financial and economic cycles. In this sense, the output gap, describing the economic cycle, and the Z-score are the intermediate variables for the activation of capital instruments. Moreover, the liquidity ratio and changes in bank profitability are the two early warning indicators for activation of liquidity instruments.

  3. Automated a complex computer aided design concept generated using macros programming

    Science.gov (United States)

    Rizal Ramly, Mohammad; Asrokin, Azharrudin; Abd Rahman, Safura; Zulkifly, Nurul Ain Md

    2013-12-01

    Changing a complex Computer Aided design profile such as car and aircraft surfaces has always been difficult and challenging. The capability of CAD software such as AutoCAD and CATIA show that a simple configuration of a CAD design can be easily modified without hassle, but it is not the case with complex design configuration. Design changes help users to test and explore various configurations of the design concept before the production of a model. The purpose of this study is to look into macros programming as parametric method of the commercial aircraft design. Macros programming is a method where the configurations of the design are done by recording a script of commands, editing the data value and adding a certain new command line to create an element of parametric design. The steps and the procedure to create a macro programming are discussed, besides looking into some difficulties during the process of creation and advantage of its usage. Generally, the advantages of macros programming as a method of parametric design are; allowing flexibility for design exploration, increasing the usability of the design solution, allowing proper contained by the model while restricting others and real time feedback changes.

  4. Automated a complex computer aided design concept generated using macros programming

    International Nuclear Information System (INIS)

    Ramly, Mohammad Rizal; Asrokin, Azharrudin; Rahman, Safura Abd; Zulkifly, Nurul Ain Md

    2013-01-01

    Changing a complex Computer Aided design profile such as car and aircraft surfaces has always been difficult and challenging. The capability of CAD software such as AutoCAD and CATIA show that a simple configuration of a CAD design can be easily modified without hassle, but it is not the case with complex design configuration. Design changes help users to test and explore various configurations of the design concept before the production of a model. The purpose of this study is to look into macros programming as parametric method of the commercial aircraft design. Macros programming is a method where the configurations of the design are done by recording a script of commands, editing the data value and adding a certain new command line to create an element of parametric design. The steps and the procedure to create a macro programming are discussed, besides looking into some difficulties during the process of creation and advantage of its usage. Generally, the advantages of macros programming as a method of parametric design are; allowing flexibility for design exploration, increasing the usability of the design solution, allowing proper contained by the model while restricting others and real time feedback changes

  5. %HPGLIMMIX: A High-Performance SAS Macro for GLMM Estimation

    Directory of Open Access Journals (Sweden)

    Liang Xie

    2014-06-01

    Full Text Available Generalized linear mixed models (GLMMs comprise a class of widely used statistical tools for data analysis with fixed and random effects when the response variable has a conditional distribution in the exponential family. GLMM analysis also has a close relationship with actuarial credibility theory. While readily available programs such as the GLIMMIX procedure in SAS and the lme4 package in R are powerful tools for using this class of models, these progarms are not able to handle models with thousands of levels of fixed and random effects. By using sparse-matrix and other high performance techniques, procedures such as HPMIXED in SAS can easily fit models with thousands of factor levels, but only for normally distributed response variables. In this paper, we present the %HPGLIMMIX SAS macro that fits GLMMs with large number of sparsely populated design matrices using the doubly-iterative linearization (pseudo-likelihood method, in which the sparse-matrix-based HPMIXED is used for the inner iterations with the pseudo-variable constructed from the inverse-link function and the chosen model. Although the macro does not have the full functionality of the GLIMMIX procedure, time and memory savings can be large with the new macro. In applications in which design matrices contain many zeros and there are hundreds or thousands of factor levels, models can be fitted without exhausting computer memory, and 90% or better reduction in running time can be observed. Examples with a Poisson, binomial, and gamma conditional distribution are presented to demonstrate the usage and efficiency of this macro.

  6. An Integrated Intranet and Dynamic Database Application for the Security Manager at Naval Postgraduate School

    Science.gov (United States)

    2002-09-01

    Basic for Applications ( VBA ) 6.0 as macros may not be supported in 8 future versions of Access. Access 2000 offers Internet- related features for...security features from Microsoft’s SQL Server. [1] 3. System Requirements Access 2000 is a resource-intensive application as are all Office 2000...1] • Modules – Functions and procedures written in the Visual Basic for Applications ( VBA ) programming language. The capabilities of modules

  7. Titoli e attività bancaria: ponti e mura (Securities and Banking: Bridges and Walls

    Directory of Open Access Journals (Sweden)

    Tommaso Padoa-Schioppa

    2012-04-01

    Full Text Available The paper examines the relationship between banking and securities activities in the light of financial market developments (securitisation, institutionalization of investment, emergence of complex financial instruments, conglomeration and consolidation, with particular reference to Europe. The enhanced links between banking and securities businesses have generated increased and new risks to financial institutions. However, banks' stability remains crucial for the stability of the financial system as a whole, because of their unique role as provider of liquidity. The paper also addresses the implications of the banking-securities combination for regulatory and supervisory arrangements. The exporting of prudential requirements traditional in banking (such as capital ratios into the securities field, and the importing of securities regulation (such as transparency requirements into the banking sector, can be deemed mutually beneficial. As regards supervision, there is a need to monitor the continued effectiveness of the current framework. This entails strengthening co-operation both at the national level and on a cross-border basis among sectoral supervisors in the micro-prudential field, and between them and central banks in the macro-prudential field.  JEL Codes: G21, G28, G10Keywords: Bank, Banking, Financial Institution, Financial Market, Securities

  8. Multidisciplinary acute care research organization (MACRO): if you build it, they will come.

    Science.gov (United States)

    Early, Barbara J; Huang, David T; Callaway, Clifton W; Zenati, Mazen; Angus, Derek C; Gunn, Scott R; Yealy, Donald M; Unikel, Daniel; Billiar, Timothy R; Peitzman, Andrew B; Sperry, Jason L

    2013-07-01

    Clinical research will increasingly play a core role in the evolution and growth of acute care surgery program development across the country. What constitutes an efficient and effective clinical research infrastructure in the current fiscal and academic environment remains obscure. We sought to characterize the effects of implementation of a multidisciplinary acute care research organization (MACRO) at a busy tertiary referral university setting. In 2008, to minimize redundancy and cost as well as to maximize existing resources promoting acute care research, MACRO was created, unifying clinical research infrastructure among the Departments of Critical Care Medicine, Emergency Medicine, and Surgery. During the periods 2008 to 2012, we performed a retrospective analysis and determined volume of clinical studies, patient enrollment for both observational and interventional trials, and staff growth since MACRO's origination and characterized changes over time. From 2008 to 2011, the volume of patients enrolled in clinical studies, which MACRO facilitates has significantly increased more than 300%. The percentage of interventional/observational trials has remained stable during the same period (50-60%). Staff has increased from 6 coordinators to 10, with an additional 15 research associates allowing 24/7 service. With this significant growth, MACRO has become financially self-sufficient, and additional outside departments now seek MACRO's services. Appropriate organization of acute care clinical research infrastructure minimizes redundancy and can promote sustainable, efficient growth in the current academic environment. Further studies are required to determine if similar models can be successful at other acute care surgery programs.

  9. Cyber security in digitalized nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, Kwang Young; Yi, Woo June [KoRTS Co., Ltd., Daejeon (Korea, Republic of)

    2008-10-15

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully.

  10. Cyber security in digitalized nuclear power plants

    International Nuclear Information System (INIS)

    Sohn, Kwang Young; Yi, Woo June

    2008-01-01

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully

  11. Competing policy packages and the complexity of energy security

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Saunders, Harry

    2014-01-01

    To underscore both the diversity and severity of energy security tradeoffs, this study examines five different energy security policy packages—five distinct strategies aimed at reducing oil dependence, enhancing energy affordability, expanding access to modern energy services, responding to climate change, and minimizing the water intensity of energy production. It identifies both compelling synergies and conflicts between each of the five strategies. The central value of the study is that it turns on its head the widely accepted notion of a “portfolio approach” or “all of the above” strategy to energy policymaking. To make this case, the article begins by elucidating the complexity and multidimensionality of energy security as a concept. It then introduces our five energy security policy packages to illustrate how some energy security objectives complement each other whereas others counteract each other. It concludes by noting that energy security is not an absolute state, and that achieving it only “works” by prioritizing some dimensions, or policy goals and packages, more than others. - Highlights: • Energy security is a complex, multidimensional concept. • Policy packages aimed at achieving energy security often conflict with each other. • Energy security only “works” by prioritizing some dimensions more than others

  12. THE FRAMEWORK STRATEGY RELATED TO SECURITY IN SOUTH-EASTERN EUROPE

    Directory of Open Access Journals (Sweden)

    Valentin-Bogdan DĂNILĂ

    2012-06-01

    Full Text Available When discussing the current strategic environment, there is the "when" of the Cold War and the first half of the '90s, and the "now" of today. The changing demography and migration patterns, ethnic and religious tensions, environmental degradation, instability coming from states that are likely to decline or have already fallen, and growing proliferation of weapons are just some of the problems that have exacerbated the differences between security "then" and "now", such as the transnational terrorist attacks after September 11, 2001. The concept of security was much disputed, as seen from a study of the United Nations in 1986, developed by a group of experts on the concept of security, resulting in the existence of a limited conceptual similarity between them Mankind has always been concerned with building or rebuilding peace and security During the Cold War, Central and Eastern European countries were not talking about a national security concept in the Western sense of the word, but about a military doctrine of the Warsaw Pact and, in some cases, as was that of Romania, about a national military doctrine. After the fall of the Iron Curtain, those countries have gradually chosen to use the concept of national security, a term that takes into account all types of threats to national interests, and also the whole range of ways to counter them, the military not having the leading role any longer.

  13. MACRO-PUBLIC RELATIONS: CRISIS COMMUNICATION IN THE AGE OF INTERNET

    OpenAIRE

    Zhongxuan Lin; Yujuan Guo; Yingying Chen

    2013-01-01

    In order to study the crisis communication in the age of Internet, the study takes the battle between two Internet companies, Tencent and Qihoo, as a case study, but focuses more on their huge public audiences, which may be defined as a “macro-public” crowd. The study employs multiple research methods including survey, focus groups interviews and content analysis to explore their “macro-public relations” which may be driven by the spiral of silence and crowd psychology. This dynamic undergrou...

  14. Macro creatine kinases: results of isoenzyme electrophoresis and differentiation of the immunoglobulin-bound type by radioassay

    International Nuclear Information System (INIS)

    Bohner, J.; Stein, W.; Steinhart, R.; Wurzburg, U.; Eggstein, M.

    1982-01-01

    In 2.9% of sera from 1253 unselected patients we detected two different types of macromolecular creatine kinases (CK;EC 2.7.3.2). One macro type was represented by immunoglobulin-linked CK; in sera containing macro CK-BB isoenzyme, 125 I-labeled CK-BB was bound with high affinity to the immunoglobulin fraction. Furthermore, during electrophoresis, macro CK-BB mostly migrated between CK-MB and CK-MM, and was fixed to Protein A from Staphlococcus aureus. We therefore propose radioelectrophoresis as a specific, highly sensitive, and simple method for detecting this type of macro CK. This form occurs predominantly in elderly women, is not correlated to any specific disease, and persists in blood over a long period of time. In contrast, a second type (macro-CK type 2) never bound radiolabeled CK isoenzymes, and was not adsorbed to protein A. Electrophoretic migration of this macro-CK type 2 was generally cathodic to CK-MM. We observed this type in severely ill patients, frequently those suffering from malignant tumors. Clinical observations and biochemical data suggest that macro-CK type 2 is of mitochondrial origin

  15. A Macro-Micro-Symbolic Teaching to Promote Relational Understanding of Chemical Reactions

    Science.gov (United States)

    Jaber, Lama Ziad; Boujaoude, Saouma

    2012-01-01

    The purpose of this research is threefold: (1) to identify the difficulties that Grade 10 students in a Lebanese school have that hinder their conceptual understanding at the micro-macro-symbolic interface in chemistry, (2) to investigate the effect of a macro-micro-symbolic teaching approach on students' relational understanding of chemical…

  16. Per-energy capacity and handoff strategies in macro-femto cells environment

    KAUST Repository

    Leon, Jaime; Bader, Faouzi; Alouini, Mohamed-Slim

    2012-01-01

    The effect of smaller cells being placed in a heterogenous network can improve the way energy is spent in a system. Handoff strategies, bandwidth allocation and path loss calculations in different scenarios show how this is possible as the size of the cell is decreased. As a result, users can experience the same or better capacities while maximising the capacity per unit energy spent. The per-energy capacity metric is introduced as a suitable handoff strategy that considers the energy spent as an important criterion. © 2012 IEEE.

  17. Per-energy capacity and handoff strategies in macro-femto cells environment

    KAUST Repository

    Leon, Jaime

    2012-04-01

    The effect of smaller cells being placed in a heterogenous network can improve the way energy is spent in a system. Handoff strategies, bandwidth allocation and path loss calculations in different scenarios show how this is possible as the size of the cell is decreased. As a result, users can experience the same or better capacities while maximising the capacity per unit energy spent. The per-energy capacity metric is introduced as a suitable handoff strategy that considers the energy spent as an important criterion. © 2012 IEEE.

  18. Literature Review on Cyber Security Investment Decisions

    OpenAIRE

    ŞENTÜRK, Hakan; ÇİL, Celal Zaim; SAĞIROĞLU, Şeref

    2016-01-01

    Severe financial losses incurred by cyber security attacks with increasing complexity and frequency, as well as booming cyber security sector offering variety of products as investment options have led the focus of the research in the field to the economic dimension of cyber security. The need for determination of methods to be used when making cyber security investment decisions under budget constraints have become prominent. In five sections as the cyber security investment strategies, risk...

  19. The Water Security Hydra

    Science.gov (United States)

    Lall, U.

    2017-12-01

    As the editor of a new journal on water security, I have been pondering what it can mean theoretically and practically. At one level, it is pretty aobvious that it refers to the ability to affordably and reliably access water of appropriate quality, and to be protected from the water related ravages of nature, such as floods, droughts and water borne disease. The concept of water security can apply to a family, a company, a state or globally. Of course, since we value the environment, water security embraces the needs of the environment. Where, we consider economic development or energy production, water security also emerges as a critical factor. So, in short it touches almost all things about water that pertain to our lives. New stresses are created by a changing climate, growing populations and an ever changing society, economic activity and environment. Thus, if assuring water security is a goal at any of the scales of interest, many factors need to be considered, and what can really be assured, where and for how long emerges as an interesting question. Local (place, time, individuals, politics) as well as global (climate, economics, hydrology) factors interact to determine outcomes, not all of which are readily mapped in our mathematical or cognitive models to a functional notion of what constitutes security in the face of changing conditions and actors. Further, assurance implies going beyond characterization to developing actions, responses to stressors and risk mitigation strategies. How these perform in the short and long run, and what are the outcomes and strategies for impact mitigation in the event of failure then determines water security. Recognizing that providing assurance of water security has always been the goal of water management, regulation and development, perhaps the challenge is to understand what this means from the perspective of not just the "water managers" but the individuals who are the unwitting beneficiaries, or the instruments for

  20. Comparing the photocatalytic activity of TiO2 at macro- and microscopic scales

    DEFF Research Database (Denmark)

    Torras-Rosell, Antoni; Johannsen, Sabrina Rostgaard; Dirscherl, Kai

    2016-01-01

    . The photocatalytic properties of TiO2 at macro- and microscopic scales are investigated by comparing photocatalytic degradation of acetone and electrochemical experiments to Kelvin probe force microscopy. The good agreement between the macro- and microscopic experiments suggests that Kelvin probe force microscopy...

  1. MacroH2A1.1 regulates mitochondrial respiration by limiting nuclear NAD+ consumption.

    Science.gov (United States)

    Posavec Marjanović, Melanija; Hurtado-Bagès, Sarah; Lassi, Maximilian; Valero, Vanesa; Malinverni, Roberto; Delage, Hélène; Navarro, Miriam; Corujo, David; Guberovic, Iva; Douet, Julien; Gama-Perez, Pau; Garcia-Roves, Pablo M; Ahel, Ivan; Ladurner, Andreas G; Yanes, Oscar; Bouvet, Philippe; Suelves, Mònica; Teperino, Raffaele; Pospisilik, J Andrew; Buschbeck, Marcus

    2017-11-01

    Histone variants are structural components of eukaryotic chromatin that can replace replication-coupled histones in the nucleosome. The histone variant macroH2A1.1 contains a macrodomain capable of binding NAD + -derived metabolites. Here we report that macroH2A1.1 is rapidly induced during myogenic differentiation through a switch in alternative splicing, and that myotubes that lack macroH2A1.1 have a defect in mitochondrial respiratory capacity. We found that the metabolite-binding macrodomain was essential for sustained optimal mitochondrial function but dispensable for gene regulation. Through direct binding, macroH2A1.1 inhibits basal poly-ADP ribose polymerase 1 (PARP-1) activity and thus reduces nuclear NAD + consumption. The resultant accumulation of the NAD + precursor NMN allows for maintenance of mitochondrial NAD + pools that are critical for respiration. Our data indicate that macroH2A1.1-containing chromatin regulates mitochondrial respiration by limiting nuclear NAD + consumption and establishing a buffer of NAD + precursors in differentiated cells.

  2. The importance of the Danube strategy for tourism and culture development of the Croatian Danube region

    Directory of Open Access Journals (Sweden)

    Demonja Damir

    2012-01-01

    Full Text Available The Danube Region consists of various countries that are determined by geographic, economic, cultural and socio-demographic characteristics. Certain regions show different trends of development with increasing regional differences. Regarding that the importance gets newly formed EU Strategy for the Danube Region, the Danube Strategy, which represents a new approach to the European Union's macro-regions, and is focused on four main directions of cooperation in the Danube Region: linking macro-regions, environmental protection, building prosperity and strengthening macro-region. Croatia, as a Danube country, accepted the idea of creating a unified European international space, as suggested in the Danube Strategy, and it is actively engaged in the process. The Croatian Danube Region includes two easternmost counties, Osijek-Baranja and Vukovar-Srijem. The rich cultural and natu­ral heritage of the two counties can be further exploited in the improved tourist offer, advocated by the Strategy. Croatian Danube Region has tourism potentials and with the appropriate measures and incentives this region could become one of the leading regions in continental tourism in Croatia. This article presents and analyzes the Danube Strategy and its importance for Croatia, the tourist and cultural potentials of the Croatian Danube Region with regard to their greater recognition and utilization as crucial for sustainable development of this, in terms of tourism, still insufficiently developed parts of Croatia, and the possibilities of tourism and culture in the Croatian Danube Region within the framework of the Danube Strategy.

  3. Security Problems of Communicative Strategies

    Directory of Open Access Journals (Sweden)

    Elena B. Perelygina

    2011-01-01

    Full Text Available The main directions of safety formation in communication strategies are connected with their adaptation to the conditions of social and psychological variability. Building up a communicative strategy is a versatile process, in which it is necessary to consider a wide spectrum of social and psychological parameters, especially topical in the modern period of social development. Forms of social interactions in schematic formats of contemporary social and economic revolution are reduced, social and functional potentials are depleted, mass society is further differentiating, the pace of historic changes is growing, all this determines the necessity to prepare changes in personality structures to the dynamics of social and fluidity.

  4. [A global view of population health in Colombia: role of social macro-determinants].

    Science.gov (United States)

    Idrovo, Alvaro J; Ruiz-Rodríguez, Myriam

    2007-09-01

    The social environment is an important determinant of population and individual health. However, its impact is often not considered in national health policies and generally its attributes are considered as constants. For this reason, contemporary health policies place greater emphasis on individual risk factors. Colombias position in the world ranking is described with respect to several social macro-determinants of health, previously characterized as components of class/welfare regime model. The exploratory study included all countries with comparable data including the following: (1) economic development [gross domestic product per capita adjusted for purchasing power parity], (2) income inequality [Gini coefficient], (3) social capital corruption perceptions index and generalized trust, and (4) political regime index of freedom. First, correlations between these macro-determinants were estimated, and second, the relationship between them and life expectancy at birth was explored. Finally, the position of Colombia in global context was determined. Important correlations occurred among the macro-determinants. Colombia tended to have intermediate to low positions in the global context in all macro-determinants, with the exception of gross domestic product per capita adjusted for purchasing power parity. The macro-determinant of population health with the highest potential of effecting improvement in health conditions is to modify income inequality.

  5. Low carbon national strategy. A macro-economical assessment

    International Nuclear Information System (INIS)

    Baiz, Adam; Monnoyer-Smith, Laurence; Callonnec, Gael

    2016-11-01

    This publication briefly reports the use of the Three-ME model (Multi-sector Macroeconomic Model for the Evaluation of Environmental and Energy) to assess the combined effect of the several instruments mobilised for the transition towards a low carbon economy within the French National Low Carbon Strategy (SNBC). It first presents the Three-ME model which has been developed since 2008 by the OFCE and the Ademe, is a neo-Keynesian and hybrid model, and which comprises 14.000 equations and 70.000 parameters dealing with prices, interest rates, investments, salaries, foreign trade, State policy, a production function, and a consumption function. Some characteristics of the SNBC scenario are indicated, as well as those of a reference trend-based scenario. Obtained results are then briefly commented in terms of positive ecological and economic impacts of a carbon tax and of sector-based measures defined within the SNBC

  6. Macro-economic and energy scenarios for Japan through the long-term

    International Nuclear Information System (INIS)

    Mankin, Shuichi

    1986-03-01

    As one of studies and systems analyses on the role of VHTR and process heat utilization in future energy systems, long-term macro economic and energy scenarios of Japan until the year 2030 have been generated. This paper presents,; 1) the outline of the long-term macro econometric model and the energy system dynamics model by which these scenarios were generated, 2) back grounds and prospects on future societies of Japan and exogeneous assumptions for calculations, and 3) macro energy and economic scenarios generated. Reflecting the present economic prospects, these scenarios are seemed to be of extremely low-growth type, however, the role of VHTR and its energy systems could be prospected clealy to play a large and important role within these scenario regions. Basic philosophies of scenario generations are also mentioned in this paper. (author)

  7. Impact of heavy metals on macro-invertebrate fauna of the thaddo stream

    International Nuclear Information System (INIS)

    Nazneen, S.; Begum, F.; Sharmeen, R.; Ahmed, Z.

    2003-01-01

    Impact of some heavy metals like zinc, lead, copper, chromium and cadmium were studied at four spots on the macro-invertebrate fauna of the Thaddo stream, a tributary of Malir River. This was in correlation with an earlier study on the physico-chemical aspects of water which showed a severe pollution in this stream. Present data for the qualitative and quantitative analyses of macro-invertebrates and the ranges of heavy metals (Zn 0.5-3.5, Pb 0.90-1.42, Cu 0.35-0.93, Cr 0.0-0.08 and Cd 0.003-0.01 ppm) in the water samples also indicate high level of pollution in the stream. Macro-invertebrate fauna comprises only of aquatic insects which include larvae of Chironomus spp., adults of the Notonectus sp., and nymphs of Gomphus sp. (dragon fly) belonging to the order Diptera , Hemiptera and Odonata, respectively. Quantitatively Notonectus sp. predominated and followed by Chironomus larvae. The maximum concentrations of all heavy metals were recorded at spot 3. A general trend of increase was observed from up stream to down stream regions particularly in the level of zinc. However, a reverse trend was observed in the abundance of macro-invertebrates with a great reduction at spot 4. The statistical analysis of the data generally indicates a negative correlation between the values of the studied heavy metals and the abundance of macro-invertebrates throughout this study. (author)

  8. Gender, Conflict and Human Security in Nigeria: Challenges and ...

    African Journals Online (AJOL)

    ... buttress the inadequacies of human security in Nigeria; strategies were proffered to tackle these challenges. The paper concluded that once the strategies are critically looked into and steps are taken to implement them, certain prospects will accrue to gender human security network in Nigeria. Gender and Behaviour Vol.

  9. SPSS Macros for Assessing the Reliability and Agreement of Student Evaluations of Teaching

    Science.gov (United States)

    Morley, Donald D.

    2009-01-01

    This article reports and demonstrates two SPSS macros for calculating Krippendorff's alpha and intraclass reliability coefficients in repetitive situations where numerous coefficients are needed. Specifically, the reported SPSS macros were used to evaluate the interrater agreement and reliability of student evaluations of teaching in thousands of…

  10. Finite Macro-Element Mesh Deformation in a Structured Multi-Block Navier-Stokes Code

    Science.gov (United States)

    Bartels, Robert E.

    2005-01-01

    A mesh deformation scheme is developed for a structured multi-block Navier-Stokes code consisting of two steps. The first step is a finite element solution of either user defined or automatically generated macro-elements. Macro-elements are hexagonal finite elements created from a subset of points from the full mesh. When assembled, the finite element system spans the complete flow domain. Macro-element moduli vary according to the distance to the nearest surface, resulting in extremely stiff elements near a moving surface and very pliable elements away from boundaries. Solution of the finite element system for the imposed boundary deflections generally produces smoothly varying nodal deflections. The manner in which distance to the nearest surface has been found to critically influence the quality of the element deformation. The second step is a transfinite interpolation which distributes the macro-element nodal deflections to the remaining fluid mesh points. The scheme is demonstrated for several two-dimensional applications.

  11. STRATEGI PENINGKATAN MUTU PENDIDIKAN ISLAM

    Directory of Open Access Journals (Sweden)

    M. Asep Fathur Rozi

    2016-11-01

    Pengembangan sumberdaya manusia dipengaruhi kualitas lembaga pendidikan. Kualitas lembaga pendidikan dipengaruhi oleh visi dan misi lembaga tersebut. Perumusan visi dan misi lembaga melibatkan stakeholder yang sudah di tentukan oleh lembaga. Faktor yang meny ebabkan mutu pendidikan kurang berhasil antara lain, strategi pendidikan yang bersifat input oriented dan pengelolaan pendidikan selama ini lebih bersifat macro-oriented. Setelah penyusunan visi dan misi, lembaga merumuskan rencana strategis. Strategi merupakan kebijakan penting dari lembaga sebagai patokan dalam pembuatan program kelembagaan. Usaha yang bisa dilakukan oleh lembaga pendidikan untuk meningkatkan mutu institusi, antara lain: menyiapkan pemimpin yang berkualitas, merumuskan visi dan misi dengan ciri khas yang hanya dimiliki oleh intitusi, merumuskan strategi dalam rangka mewujudkan tujuan institusi, meningkatkan kemampuan sumberdaya manusia, melakukan survei pasar, melengkapi sarana dan prasarana, manajemen keuangan, menjalin kerjasama dengan stakeholder, merawat konsistensi mutu.

  12. At the Crossroads: Counterproliferation and National Security Strategy

    National Research Council Canada - National Science Library

    2004-01-01

    .... national security and an enormous challenge for the entire international community. In the hands of rogue states, failing states, or substate terrorist groups, these weapons threaten not only U.S...

  13. ONTOLOGICAL MODEL OF STRATEGIC ECONOMIC SECURITY OF ENTERPRISE

    Directory of Open Access Journals (Sweden)

    L. A. Zaporozhtseva

    2014-01-01

    Full Text Available Article explains the necessity the application of the ontological approach to modeling the strategic economic security in the formalization of the basic categories of domain company recognized its benefits. Among the advantages of the model distinguishes its versatility and ability to describe various aspects of strategic security - the system strategies and goals of the organization and business processes; possibility of its use at different levels of detail - from the top-level description of the basic categories of management, to design-level analytic applications; as well as the adaptability of the model, with depth on particular aspects determined by practical necessity and not regulated methodology. The model integrates various aspects of the concept of enterprise architecture and organizes conceptual apparatus. Ontological model easy to understand and adjust as business architects and specialists in designing systems of economic security and offers many categories of verbal representation of the domain of the enterprise. Proved the feasibility of using process-functional approach in providing strategic economic security, according to which the components of such a security company proposed as business processes, finance, staff and contractors. The article presents the author's ontological model of strategic economic security, including endangered sites, the presence of factors that threaten the security of the object and the subject of providing security. Further, it is proved that in the subjects of security impact on the object using the tools, measures and activities within the strategy formed the mechanism is implemented managerial decisions to strengthen the strategic economic security. The process of diagnosis, detection, identification of threats of economic security, and the development of enterprise development strategies, taking into account its level of economic security must be under the constant supervision of the process of

  14. Development Strategy for Slovak society

    International Nuclear Information System (INIS)

    Sikula, V.

    2010-01-01

    In this book authors analyse the present state of economy as well as strategy of perspectives of development of Slovak society. A key issue in the next 5 to 10 years in the energy sector will mainly address energy security, diversification of energy sources, renewable energy sources and energy savings. The strategic goal is to transform energy into a form that will ensure long competition-capable and reliable supply of all forms of energy, taking into account sustainable development, security of supply and technical security. The strategy of energy security of Slovakia in 2030 is to achieve a competitive energy industry, ensuring safe, reliable and efficient supply of all forms of energy at affordable prices with regard to consumer protection, environmental protection, sustainable development, security of supply and technical security.

  15. Computer Security: Introduction to information and computer security (1/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Aix-en-Provence and Haute Ecole de Gestion in Geneva in 2010. His professional interests include software and network security, distributed systems, and Web and mobile technologies. With the prevalence of modern information te...

  16. A 4-kbit low-cost antifuse one-time programmable memory macro for embedded applications

    International Nuclear Information System (INIS)

    Li Xian; Zhong Huicai; Jia Cheng; Li Xin

    2014-01-01

    A 4-kbit low-cost one-time programmable (OTP) memory macro for embedded applications is designed and implemented in a 0.18-μm standard CMOS process. The area of the proposed 1.5 transistor (1.5T) OTP cell is 2.13 μm 2 , which is a 49.3% size reduction compared to the previously reported cells. The 1.5T cell is fabricated and measured and shows a large programming window without any disturbance. A novel high voltage switch (HVSW) circuit is also proposed to make sure the OTP macro, implemented in a standard CMOS process, works reliably with the high program voltage. The OTP macro is embedded in negative radio frequency identification (RFID) tags. The full chip size, including the analog front-end, digital controller and the 4-kbit OTP macro, is 600 × 600 μm 2 . The 4-kbit OTP macro only consumes 200 × 260 μm 2 . The measurement shows a 100% program yield by adjusting the program time and has obvious advantages in the core area and power consumption compared to the reported 3T and 2T OTP cores. (semiconductor integrated circuits)

  17. Search for GUT magnetic monopoles and nuclearites with the MACRO experiment

    CERN Document Server

    Ambrosio, M; Auriemma, G; Bakari, D; Baldini, A; Barbarino, G C; Barish, B C; Battistoni, G; Becherini, Y; Bellotti, R; Bemporad, C; Bernardini, P; Bilokon, H; Bloise, C; Bower, C; Brigida, M; Bussino, S; Cafagna, F; Calicchio, M; Campana, D; Carboni, M; Caruso, R; Cecchini, S; Cei, F; Chiarella, V; Chiarusi, T; Choudhary, B C; Coutu, S; Cozzi, M; De Cataldo, G; De Marzo, C; De Mitri, I; De Vincenzi, M; Dekhissi, H; Derkaoui, J; Di Credico, A; Erriquez, O; Favuzzi, C; Forti, C; Fusco, P; Giacomelli, G; Giannini, G; Giglietto, N; Giorgini, M; Grassi, M; Grillo, A; Guarino, F; Gustavino, C; Habig, A; Hanson, K; Heinz, R; Katsavounidis, E; Katsavounidis, I; Kearns, E; Kim, H; Kumar, A; Kyriazopoulou, S; Lamanna, E; Lane, C; Larocci, E; Levin, D S; Lipari, P; Longley, N P; Longo, M J; Loparco, F; Maarou, F; Mancarella, G; Mandrioli, G; Manzoor, S; Margiotta, A; Marini, A; Martello, D; Marzari-Chiesa, A; Matteuzzi, D; Mazziotta, M N; Michael, D G; Monacelli, P; Montaruli, T; Monteno, M; Mufson, S; Musser, J; Nicolò, D; Nolty, R; Orth, C; Osteria, G; Palamara, O; Patera, V; Patrizii, L; Pazzi, R; Peck, C W; Perrone, L; Petrera, S; Pistilli, P; Popa, V; Rainó, A; Reynoldson, J; Ronga, F; Rrhioua, A; Satriano, C; Scapparone, E; Scholberg, K; Sciubba, A; Serra, P; Sioli, M; Sirri, G; Sitta, M; Spinelli, P; Spinetti, M; Spurio, M; Steinberg, R; Stone, J L; Sulak, L R; Surdo, A; Tarle, G; Togo, V; Vakili, M; Walter, C W; Webb, R; 10.1016/S1350-4487(03)00140-9

    2003-01-01

    We present the final results obtained by the MACRO experiment in the search for GUT magnetic monopoles and nuclearites. Several searches were performed with different subdetectors, i.e. scintillation counters, limited streamer tubes and nuclear track detectors. No magnetic monopole or nuclearite candidates were found. The MACRO upper limit to the local flux of GUT magnetic monopoles is at the level of 1.4*10/sup -16/ cm/sup -2/s/sup -1/sr/sup -1/.

  18. Impact of Macro-economic Factors on Deposit Formation by Ukrainian Population

    Directory of Open Access Journals (Sweden)

    Shevaldina Valentyna H.

    2014-01-01

    Full Text Available The goal of the article is detection of interconnections between the common economic processes and formation of bank deposits by population. The article builds a correlation and regression model of complex assessment of interconnection between macro-economic factors, savings behaviour of population and level of deposits of population in banks for two hour horizons: short-term, which is characterised with deployment of crisis phenomena both in global economy and in Ukrainian economy and the medium-term one. The article characterises the most significant common macro-economic factors. In the result of the study the article establishes that Ukrainian population is oriented at short-term horizon when forming savings due to the uncertainty in future. In the medium-term prospective, savings of the population are formed basically under influence of macro-economic factors, while formation of deposits by Ukrainian population is mostly influenced by socio-psychological factors.

  19. Permeability of Granite Including Macro-Fracture Naturally Filled with Fine-Grained Minerals

    Science.gov (United States)

    Nara, Yoshitaka; Kato, Masaji; Niri, Ryuhei; Kohno, Masanori; Sato, Toshinori; Fukuda, Daisuke; Sato, Tsutomu; Takahashi, Manabu

    2018-03-01

    Information on the permeability of rock is essential for various geoengineering projects, such as geological disposal of radioactive wastes, hydrocarbon extraction, and natural hazard risk mitigation. It is especially important to investigate how fractures and pores influence the physical and transport properties of rock. Infiltration of groundwater through the damage zone fills fractures in granite with fine-grained minerals. However, the permeability of rock possessing a fracture naturally filled with fine-grained mineral grains has yet to be investigated. In this study, the permeabilities of granite samples, including a macro-fracture filled with clay and a mineral vein, are investigated. The permeability of granite with a fine-grained mineral vein agrees well with that of the intact sample, whereas the permeability of granite possessing a macro-fracture filled with clay is lower than that of the macro-fractured sample. The decrease in the permeability is due to the filling of fine-grained minerals and clay in the macro-fracture. It is concluded that the permeability of granite increases due to the existence of the fractures, but decreases upon filling them with fine-grained minerals.

  20. Macro Cell Muting Coordination for Non-Uniform Topologies in LTE-A HetNets

    DEFF Research Database (Denmark)

    Soret, Beatriz; Pedersen, Klaus I.

    2013-01-01

    irregular scenarios is how to operate eICIC, and especially how to coordinate macro-cell muting. Our analysis shows that for eICIC to provide gain in such scenarios, it is recommended to use fully time aligned traditional Almost Blank Subframes (ABS) in the macro-cells with picos, while first tier...

  1. Macro News, Riskfree Rates, and the Intermediary

    NARCIS (Netherlands)

    Menkveld, Albert J.; Sarkar, Asani; Wel, van der Michel

    2007-01-01

    Signed customer order flow correlates with permanent price changes in equity and nonequity markets. We exploit macro news events in the 30Y treasury futures market to identify causality from customer flow to riskfree rates. We remove the positive feedback trading part and establish that, in the 15

  2. Updating energy security and environmental policy: Energy security theories revisited.

    Science.gov (United States)

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  3. Pure National Security Strategy

    Science.gov (United States)

    2011-06-01

    gd1ne997g1lu3p7d&size=largest Berlin, Isaiah . Four Essays on Liberty. New York, NY: Oxford University Press, 1970. Bijker, Wiebe E., Thomas P. Hughes and...of the first scientists to formalize what has long been known to kings and emperors is American economist Thomas C. Schelling. In his influential...Robert Pape simplifies the mechanism where coercion affects 45 Schelling, Thomas C. The Strategy of

  4. Monetary Policy Strategy: Lessons from the Crisis

    OpenAIRE

    Frederic S. Mishkin

    2011-01-01

    This paper examines what we have learned and how we should change our thinking about monetary policy strategy in the aftermath of the 2007-2009 financial crisis. It starts with a discussion of where the science of monetary policy was before the crisis and how central banks viewed monetary policy strategy. It will then examine how the crisis has changed the thinking of both macro/monetary economists and central bankers. Finally, it looks how much of the science of monetary policy needs to be a...

  5. Macro-assembler technique for generating control words for a micro-programmed processor

    International Nuclear Information System (INIS)

    Lesny, D.D.; Wray, J.J.

    1981-01-01

    To produce microcode for an experimental system, such as FASTBUS interfaces, with wide control words and many micro-fields, one needs a micro-assembler which (1) allows wide flexibility in defining defaults for microcode fields, (2) does a significant amount of error checking to prevent multiple or inconsistant definitions of fields, (3) allows macro expansions which define several microcode words for frequently used sequences, and (4) is easily modified as hardware definitions are refined. Using MACRO-11 on DEC PDP-11 computers, a library of macros has been created, which can be used to generate the 80-bit microcode words needed for a Unibus to FASTBUS micro-programmed interface and which meets the above requirements. The same technique could easily be used to develop libraries appropriate for other microcoded devices

  6. A SAS IML Macro for Loglinear Smoothing

    Science.gov (United States)

    Moses, Tim; von Davier, Alina

    2011-01-01

    Polynomial loglinear models for one-, two-, and higher-way contingency tables have important applications to measurement and assessment. They are essentially regarded as a smoothing technique, which is commonly referred to as loglinear smoothing. A SAS IML (SAS Institute, 2002a) macro was created to implement loglinear smoothing according to…

  7. Wireless Network Security Vulnerabilities and Concerns

    Science.gov (United States)

    Mushtaq, Ahmad

    The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet's expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other's defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.

  8. 基于Android系统的手机信息安全分析及策略改进%The Information Security Analysis and Strategy Improvement of AndroidMobile Phone

    Institute of Scientific and Technical Information of China (English)

    贾能

    2016-01-01

    随着移动互联网的发展,Android智能手机在市场上占据着很大的份额。文章首先分析了Android现有的安全机制沙箱模型和数字证书,然后提出Android系统存在的安全问题,最后从系统开发者和用户2个角度设计安全策略来对现有的安全策略进行改进。%With the development of mobile Internet, mobile phones using Androidsystem occupy a large share in the market. First of all, this paper analyzes sandbox model and digital certiifcate which are the existing security mechanisms of Androidsystem. Secondly, security problems in the Androidsystem have been put forward. Finally, security strategies are designed from two angles of system developers and users to improve the existing security strategy.

  9. Development of the Macro Command Editing Executive System for Factory Workers-Oriented Programless Visual Inspection System

    Science.gov (United States)

    Anezaki, Takashi; Wakitani, Kouichi; Nakamura, Masatoshi; Kubo, Hiroyasu

    Because visual inspection systems are difficult to tune, they create many problems for the kaizen process. This results in increased development costs and time to assure that the inspection systems function properly. In order to improve inspection system development, we designed an easy-tuning system called a “Program-less” visual inspection system. The ROI macro command which consisted of eight kinds of shape recognition macro commands and decision, operation, control commands was built. Furthermore, the macro command editing executive system was developed by the operation of only the GUI without editing source program. The validity of the ROI macro command was proved by the application of 488 places.

  10. Clinimetrics and clinical psychometrics: macro- and micro-analysis.

    Science.gov (United States)

    Tomba, Elena; Bech, Per

    2012-01-01

    Clinimetrics was introduced three decades ago to specify the domain of clinical markers in clinical medicine (indexes or rating scales). In this perspective, clinical validity is the platform for selecting the various indexes or rating scales (macro-analysis). Psychometric validation of these indexes or rating scales is the measuring aspect (micro-analysis). Clinical judgment analysis by experienced psychiatrists is included in the macro-analysis and the item response theory models are especially preferred in the micro-analysis when using the total score as a sufficient statistic. Clinical assessment tools covering severity of illness scales, prognostic measures, issues of co-morbidity, longitudinal assessments, recovery, stressors, lifestyle, psychological well-being, and illness behavior have been identified. The constructive dialogue in clinimetrics between clinical judgment and psychometric validation procedures is outlined for generating developments of clinical practice in psychiatry. Copyright © 2012 S. Karger AG, Basel.

  11. Concepts and Practices of Cooperative Security

    DEFF Research Database (Denmark)

    Keating, Vincent; Wheeler, Nicholas J

    2013-01-01

    This chapter considers how the security dilemma can be overcome in ways that promote cooperation and even trust, mitigating or transcending the international uncertainty that can otherwise inhibit interstate cooperation. It argues that there are two mechanisms to create the trust necessary...... for the development of a security community, Charles Osgood's GRIT strategy and a unilateral 'leap of trust.' Both of these, however, initially require elites to develop security dilemma sensibility. The long-term stability of security communities is fundamentally linked to the presence of embedded trust among...

  12. Macro-SICM: A Scanning Ion Conductance Microscope for Large-Range Imaging.

    Science.gov (United States)

    Schierbaum, Nicolas; Hack, Martin; Betz, Oliver; Schäffer, Tilman E

    2018-04-17

    The scanning ion conductance microscope (SICM) is a versatile, high-resolution imaging technique that uses an electrolyte-filled nanopipet as a probe. Its noncontact imaging principle makes the SICM uniquely suited for the investigation of soft and delicate surface structures in a liquid environment. The SICM has found an ever-increasing number of applications in chemistry, physics, and biology. However, a drawback of conventional SICMs is their relatively small scan range (typically 100 μm × 100 μm in the lateral and 10 μm in the vertical direction). We have developed a Macro-SICM with an exceedingly large scan range of 25 mm × 25 mm in the lateral and 0.25 mm in the vertical direction. We demonstrate the high versatility of the Macro-SICM by imaging at different length scales: from centimeters (fingerprint, coin) to millimeters (bovine tongue tissue, insect wing) to micrometers (cellular extensions). We applied the Macro-SICM to the study of collective cell migration in epithelial wound healing.

  13. Diurnal variations in milk macro-mineral concentrations in Holstein dairy cows in Urmia, Iran

    Directory of Open Access Journals (Sweden)

    Shahram Nozad

    2012-12-01

    Full Text Available Milk samples from high and low milk producer Holstein cows, were obtained during the morning and afternoon milking over a one week period. Overall, 1064 samples were tested within 14 times sampling in Urmia, Iran. Milk macro-mineral concentrations in the morning milking and in low producers were greater than in the afternoon and in high producers. The highest and lowest concentrations were observed in Na+ and Mg++, respectively. Mean milk values between low and high producers in the morning, afternoon and daily milking times were different (p < 0.05. The individual comparison of milk parameters between both groups in the different milking times were also different (p < 0.05. The results of correlation among macro-minerals in the morning, afternoon and overall milking showed significant and positive correlations among all macro-minerals except for Na+ and K+, in which there was a significant negative correlation (p < 0.05. The highest and lowest correlations were found between Ca++ and inorganic phosphorus (IP (r=0.37, p < 0.05 and Na+ and IP (r=0.10, p < 0.05, respectively. It is concluded that the concentration of macro-minerals in different producers varied between milking times. The sodium concentration was the highest while Mg++ was the lowest among macro-minerals. The correlation between Ca++/ IP was the highest, while Na+/K+ revealed a negative correlation. Therefore, by organizing the appropriate macro-minerals in the ration, it would be possible to achieve an optimal purpose from animal husbandry.

  14. Effects of macro nutrient concentration on biological N2 fixation by Azotobacter vinelandii ATCC 12837

    International Nuclear Information System (INIS)

    Liew Pauline Woan Ying; Nazalan Najimudin; Jong Bor Chyan; Latiffah Noordin; Khairuddin Abdul Rahim; Amir Hamzah Ahmad Ghazali

    2010-01-01

    The dynamic changes of biological N 2 fixation by Azotobacter vinelandii ATCC 12837 under the influence of various macro nutrients, specifically phosphorus (P) and potassium (K), was investigated. In this attempt, Oryza sativa L. var. MR 219 was used as the model plant. Results obtained showed changes in the biological N 2 fixation activities with different macro nutrient(s) manipulations. The research activity enables optimisation of macro nutrients concentration for optimal/ enhanced biological N 2 fixation by A. vinelandii ATCC 12837. (author)

  15. Railway infrastructure security

    CERN Document Server

    Sforza, Antonio; Vittorini, Valeria; Pragliola, Concetta

    2015-01-01

    This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railway infrastructure security. Based on analyses by academics, technology providers, and railway operators, it explains how to assess terrorist and criminal threats, design countermeasures, and implement effective security strategies. In so doing, it draws upon a range of experiences from different countries in Europe and beyond. The book is the first to be devoted entirely to this subject. It will serve as a timely reminder of the attractiveness of the railway infrastructure system as a target for criminals and terrorists and, more importantly, as a valuable resource for stakeholders and professionals in the railway security field aiming to develop effective security based on a mix of methodological, technological, and organizational tools. Besides researchers and decision makers in the field, the book will appeal to students interested in critical infrastructur...

  16. Impacto dos fatores macro e microeconômicos nas relações comerciais: o caso da Argentina e do Brasil Impact of macro and microeconomic factors in the comercial relations: the case of Argentina and Brazil

    Directory of Open Access Journals (Sweden)

    Marta Bekerman

    2009-04-01

    Full Text Available O trabalho analisa os fatores macro e microeconômicos que impulsionaram as recentes mudanças profundas registradas na relação comercial entre o Brasil e a Argentina, caracterizadas por um déficit argentino crescente. Conclui-se, do ponto de vista macro, que os comportamentos dos níveis de atividade econômica e do tipo de câmbio bilateral não são suficientes para explicar as transformações indicadas. São analisados, então, os fatores microeconômicos vinculados com um aprofundamento dos saldos negativos do intercâmbio bilateral de manufaturas de origem industrial, e uma diminuição dos saldos positivos dos demais itens (produtos primários, manufaturas de origem agropecuária e combustíveis para a Argentina. As conclusões indicam que a evolução da relação comercial bilateral está fortemente vinculda com mudanças na esfera produtiva sofridas por ambas as nações. Isto, longe de sugerir uma situação fechada ou concluída, enfatiza a necessidade de coordenar futuras estratégias regionais para fortalecer um comércio do tipo intraindustrial que consolide a situação competitiva do Mercosul em relação a terceiros mercados.This work analizes the macro and microeconomic factors that led to recent transformations in the trade relations between Argentina and Brazil. The conclusions are that those transformations were strongly linked with the changes in the productive field that took place in each of both countries. But far from being a final situation, this work enphazises the necesity to coordinate futures strategies to strenghen an intraindustrial type of trade that could help to consolidate the competitive position of Mercosur in relation to third markets.

  17. Green paper - towards a European strategy for the security of energy supply, technical document

    International Nuclear Information System (INIS)

    2005-01-01

    The Green Paper sets forth a series of questions regarding the security of energy in Europe. It addresses the issue of increased consumption and dependence on oil, and sketches out possible strategies for broadening the energy supply and slowing global warming. It draws an alarming picture of the EU energy situation. If no action is taken, it predicts that the EU energy dependency will climb from 50% in 2000 to 70% in 2030. The particular situation for the main imported fossil fuels is described. This technical paper is particularly devoted to the context, the energy sources, the supply disruption, the energy demand, the fuel balance, the energy technology and the transport of fuel in the EU (transit). (A.L.B.)

  18. Macro-habitat preferences by the African manatee and crocodiles – ecological and conservation implications

    Directory of Open Access Journals (Sweden)

    L. Luiselli

    2012-07-01

    Full Text Available African manatees (Trichechus senegalensis and crocodiles are threatened species in parts of their range. In West Africa, crocodiles may constitute the main predators for manatees apart from humans. Here, we explore the macro-habitat selection of manatees and two species of crocodiles (West African crocodiles Crocodylus suchus and dwarf crocodile Osteolaemus tetraspis in the Niger Delta (Nigeria, testing the hypotheses that (i manatees may avoid crocodiles in order to minimize risks of predation, and (ii the two crocodile species do compete. The study was carried out between 1994 and 2010 with a suite of different field techniques. We observed that the main macro-habitat types were freshwater rivers and coastal lagoons for manatees, mangroves for West African crocodiles, and rivers and creeks for dwarf crocodiles, with (i the three species differing significantly in terms of their macro-habitat type selection, and (ii significant seasonal influence on habitat selection of each species. Null models for niche overlap showed a significantly lower overlap in macro-habitat type use between manatee and crocodiles, whereas the two crocodiles were relatively similar. Null model analyses did not indicate any competitive interactions between crocodiles. On the other hand, manatees avoided macro-habitats where crocodiles, and especially West African crocodiles, are abundant.

  19. Efficient radiologic reading environment by using an open-source macro program as connection software.

    Science.gov (United States)

    Lee, Young Han

    2012-01-01

    The objectives are (1) to introduce an easy open-source macro program as connection software and (2) to illustrate the practical usages in radiologic reading environment by simulating the radiologic reading process. The simulation is a set of radiologic reading process to do a practical task in the radiologic reading room. The principal processes are: (1) to view radiologic images on the Picture Archiving and Communicating System (PACS), (2) to connect the HIS/EMR (Hospital Information System/Electronic Medical Record) system, (3) to make an automatic radiologic reporting system, and (4) to record and recall information of interesting cases. This simulation environment was designed by using open-source macro program as connection software. The simulation performed well on the Window-based PACS workstation. Radiologists practiced the steps of the simulation comfortably by utilizing the macro-powered radiologic environment. This macro program could automate several manual cumbersome steps in the radiologic reading process. This program successfully acts as connection software for the PACS software, EMR/HIS, spreadsheet, and other various input devices in the radiologic reading environment. A user-friendly efficient radiologic reading environment could be established by utilizing open-source macro program as connection software. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  20. Efficient radiologic reading environment by using an open-source macro program as connection software

    International Nuclear Information System (INIS)

    Lee, Young Han

    2012-01-01

    Purpose: The objectives are (1) to introduce an easy open-source macro program as connection software and (2) to illustrate the practical usages in radiologic reading environment by simulating the radiologic reading process. Materials and methods: The simulation is a set of radiologic reading process to do a practical task in the radiologic reading room. The principal processes are: (1) to view radiologic images on the Picture Archiving and Communicating System (PACS), (2) to connect the HIS/EMR (Hospital Information System/Electronic Medical Record) system, (3) to make an automatic radiologic reporting system, and (4) to record and recall information of interesting cases. This simulation environment was designed by using open-source macro program as connection software. Results: The simulation performed well on the Window-based PACS workstation. Radiologists practiced the steps of the simulation comfortably by utilizing the macro-powered radiologic environment. This macro program could automate several manual cumbersome steps in the radiologic reading process. This program successfully acts as connection software for the PACS software, EMR/HIS, spreadsheet, and other various input devices in the radiologic reading environment. Conclusion: A user-friendly efficient radiologic reading environment could be established by utilizing open-source macro program as connection software.

  1. Private Military and Security Companies - Counterinsurgency and Nation Building Strategy

    Science.gov (United States)

    2013-04-25

    cans, and bought war bonds is long gone. One advantage that the private sector brings to public wars is capacity. Companies like Kellogg and Brown...1 Anne-Marie Buzatu, and Benjamin S . Buckland, “Private Military & Security Companies : Future Challenges in...From  -­‐  To)   September 2012 - April 2013 4.  TITLE  AND  SUBTITLE   Private Military and Security Companies - Counterinsurgency and

  2. Security in cloud computing

    OpenAIRE

    Moreno Martín, Oriol

    2016-01-01

    Security in Cloud Computing is becoming a challenge for next generation Data Centers. This project will focus on investigating new security strategies for Cloud Computing systems. Cloud Computingisarecent paradigmto deliver services over Internet. Businesses grow drastically because of it. Researchers focus their work on it. The rapid access to exible and low cost IT resources on an on-demand fashion, allows the users to avoid planning ahead for provisioning, and enterprises to save money ...

  3. Design for manufacturability of macro and micro products: a case study of heat exchanger design

    DEFF Research Database (Denmark)

    Omidvarnia, F.; Weng Feng, L.; Hansen, H. N.

    2018-01-01

    In this paper, a novel methodology in designing a micro heat exchanger is proposed by modifying a conventional design methodology for macro products with the considerations of differences between design of a micro and a macro product. The methodology starts with the identification of differences...... for fabricating micro heat exchangers are ranked based on the defined criteria. Following the design methodology, primary design ideas for micro heat exchangers are generated according to the heat transfer principles for macro heat exchangers. Taking micro design considerations into account, the designs from next...... iteration are created. Finally, the performances of the designs for micro heat exchangers are compared with their macro counterparts. The most appropriate designs for micro heat exchangers are finalized. The micro specific design guidelines obtained by the designer through evaluating the modeling results...

  4. The Era of Mobile Internet Mobile Phone Information Security Strategy of Shallow Research%移动互联网时代手机信息安全策略

    Institute of Scientific and Technical Information of China (English)

    黄赛

    2015-01-01

    Articles focus on mobile Internet hand on behalf of the smartphone security issues, from the communication network selection strategy, the mobile terminal selection strategy, the use of mobile phones security policy, social information security environment to create four latitude on smartphone security strategy for full range analysis, introduce, strive for ordinary readers fully understand the safety problem of the intelligent mobile phone and application in the reality of life and learning, so that everyone's smartphone safer and more at ease.%文章聚焦于移动互联网手代智能手机安全问题,从通信网络选择策略、手机终端选择策略、手机使用安全策略、社会信息安全环境营造四个纬度对智能手机安全策略进行全方位的分析、介绍,力求让普通读者全面了解掌握智能手机安全问题,并应用于现实生活学习中,从而使大家的智能手机更安全、使用更放心。

  5. Variation in composition of macro-benthic invertebrates as an ...

    African Journals Online (AJOL)

    Mo

    1 Makerere University Institute of Environment & Natural Resources, P.O. Box 7062 Kampala-Uganda ... benthic macro-invertebrates communities were evaluated using GIS techniques along an ...... Kendall Hunt Publishing Company, Iowa.

  6. Water security evaluation in Yellow River basin

    Science.gov (United States)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  7. Nano- and Macro-wear of Bio-carbo-nitrided AISI 8620 Steel Surfaces

    Science.gov (United States)

    Arthur, Emmanuel Kwesi; Ampaw, Edward; Zebaze Kana, M. G.; Adetunji, A. R.; Olusunle, S. O. O.; Adewoye, O. O.; Soboyejo, W. O.

    2015-12-01

    This paper presents the results of an experimental study of nano- and macro-scale wear in a carbo-nitrided AISI 8620 steel. Carbo-nitriding is carried out using a novel method that involves the use of dried, cyanide-containing cassava leaves, as sources of carbon and nitrogen. These are used in a pack cementation that is used to diffuse carbon and nitrogen into case layers at intermediate temperatures [673.15 K, 723.15 K, 773.15 K, and 823.15 K (400 °C, 450 °C, 500 °C, and 550 °C)]. Nano- and macro-scale wear properties are studied in the case-hardened surfaces, using a combination of nano-scratch and pin-on-disk experiments. The measured wear volumes (at both nano- and macro-length scales) are shown to increase with decreasing pack cyaniding temperature. The nano- and macro-wear resistances are also shown to be enhanced by the in situ diffusion of carbon and nitrogen from cyanide-containing bio-processed waste. The underlying wear mechanisms are also elucidated via atomic force microscopy and scanning electron microscopy observations of the wear tracks. The implications of the results are discussed for the design of hardened carbo-nitrided steel surfaces with improved wear resistance.

  8. Design of refrigeration system using refrigerant R134a for macro compartment

    Science.gov (United States)

    Rani, M. F. H.; Razlan, Z. M.; Shahriman, A. B.; Yong, C. K.; Harun, A.; Hashim, M. S. M.; Faizi, M. K.; Ibrahim, I.; Kamarrudin, N. S.; Saad, M. A. M.; Zunaidi, I.; Wan, W. K.; Desa, H.

    2017-10-01

    The main objective of this study is to analyse and design an optimum cooling system for macro compartment. Current product of the refrigerator is not specified for single function and not compact in size. Hence, a refrigeration system using refrigerant R134a is aimed to provide instant cooling in a macro compartment with sizing about 150 × 150 × 250 mm. The macro compartment is purposely designed to fit a bottle or drink can, which is then cooled to a desired drinking temperature of about 8°C within a period of 1 minute. The study is not only concerned with analysing of heat load of the macro compartment containing drink can, but also focused on determining suitable heat exchanger volume for both evaporator and condenser, calculating compressor displacement value and computing suitable resistance value of the expansion valve. Method of optimization is used to obtain the best solution of the problem. Mollier diagram is necessary in the process of developing the refrigeration system. Selection of blower is made properly to allow air circulation and to increase the flow rate for higher heat transfer rate. Property data are taken precisely from thermodynamic property tables. As the main four components, namely condenser, compressor, evaporator and expansion valve are fully developed, the refrigeration system is complete.

  9. Structural vibration control of micro/macro-manipulator using feedforward and feedback approaches

    International Nuclear Information System (INIS)

    Lew, J.Y.; Cannon, D.W.; Magee, D.P.; Book, W.J.

    1995-09-01

    Pacific Northwest Laboratory (PDL) researchers investigated the combined use of two control approaches to minimize micro/macro-manipulator structural vibration: (1) modified input shaping and (2) inertial force active damping control. Modified input shaping (MIS) is used as a feedforward controller to modify reference input by canceling the vibratory motion. Inertial force active damping (IFAD) is applied as a feedback controller to increase the system damping and robustness to unexpected disturbances. Researchers implemented both control schemes in the PNL micro/macro flexible-link manipulator testbed collaborating with Georgia Institute of Technology. The experiments successfully demonstrated the effectiveness of two control approaches in reducing structural vibration. Based on the results of the experiments, the combined use of two controllers is recommended for a micro/macro manipulator to achieve the fastest response to commands while canceling disturbances from unexpected forces

  10. Adsorption of copper onto char derived macro alga, Undaria pinnatifida

    International Nuclear Information System (INIS)

    Cho, Hye Jung; Ko, Jeong Huy; Heo, Hyeon Su; Park, Hye Jin; BAe, Yoon Ju; Kim, Jung Hwan; Park, Young-Kwon

    2010-01-01

    Full text: A release of heavy metals into the environment by industrial activities raises much environmental problems because they tend to remain indefinitely, circulating and eventually accumulating throughout the food chain. Copper is essential to human life and health but, like all heavy metals, is potentially toxic as well. The excessive intakes of copper result in its accumulation in the liver and produce gastrointestinal problems, kidney damage, anemia, and continued inhalation of copper-containing sprays is linked with an increase in lung cancer among exposed people. Consequently, we need to eliminate the copper in drinking water. Also, growth rates of marine macro algae far exceed those of terrestrial biomass, without water limitations, so annual primary production rates are higher for the major marine macro algae than for most terrestrial biomass. According to these reasons, we try to use the macro alga, Undaria pinnatifida. Adsorption of heavy metals is one of the possible technologies involved in the removal of toxic metals from industrial waste streams and mining waste water using low-cost adsorbents. In recent years, many low-cost adsorbents such as seaweeds, activated carbon, etc. have been investigated, but the char by macro alga, Undaria pinnatifida, have not proven to be the most effective and promising substrates. The aim of this study is to remove copper from its aqueous solution by Undaria pinnatifida char for various parameters like pH, contact time, and Cu(II) concentration. The adsorption capacity of Cu(II) by Undaria pinnatifida char was investigated as a function of pH, contact time, and Cu(II) concentration at room temperature. And it was verified using equilibrium studies. (author)

  11. Teaching Macro Principles "after" the Financial Crisis

    Science.gov (United States)

    Blinder, Alan

    2010-01-01

    Recent events should force everyone who teaches macroeconomics (or finance, for that matter) to reconsider their curriculums. In this short article, the author shares his thoughts about what should and should not be changed in the way economists teach macro principles to beginning students. Two tradeoffs are paramount and must be faced by every…

  12. Role of Ceratophyllum demersum in recycling macro elements from ...

    African Journals Online (AJOL)

    Michael Horsfall

    Role of Ceratophyllum demersum in recycling macro elements from wastewater ... wastewater and could be the best biosorption method for protecting the water pollution in the environment. .... Calcium concentration in plants: Analysis.

  13. Dental Implant Macro-Design Features Can Impact the Dynamics of Osseointegration.

    Science.gov (United States)

    Vivan Cardoso, Marcio; Vandamme, Katleen; Chaudhari, Amol; De Rycker, Judith; Van Meerbeek, Bart; Naert, Ignace; Duyck, Joke

    2015-08-01

    The purpose of this study was to compare the clinical performance of two dental implant types possessing a different macro-design in the in vivo pig model. Titanium Aadva(TM) implants (GC, Tokyo, Japan) were compared with OsseoSpeed(TM) implants (Astra, Mölndal, Sweden), with the Aadva implant displaying significant larger inter-thread dimensions than the OsseoSpeed implant. Implants were installed in the parietal bone of 12 domestic pigs and left for healing for either 1 or 3 months. Implant osseointegration was evaluated by quantitative histology (bone volume relative to the tissue volume [BV/TV]; bone-to-implant contact [BIC]) for distinct implant regions (collar, body, total implant length) with specific implant thread features. The Wilcoxon-Mann-Whitney nonparametric test with α = 0.05 was performed. An inferior amount of bone enveloping the Aadva implant compared with the OsseoSpeed implant was observed, in particular at the implant body part with its considerable inter-thread gaps (p macro-design negatively affected the amount of bone in direct contact with the implant for this specific implant part (p implant osseointegration at the initial healing stage (total implant length; 1-month healing; p implant displayed a clinically acceptable level of osseointegration, the findings demonstrate that implant macro-design features can impact the dynamics of implant osseointegration. Consideration of specific implant macro-design features should be made relative to the biological and mechanical microenvironment. © 2013 Wiley Periodicals, Inc.

  14. [The comparative evaluation of level of security culture in medical organizations].

    Science.gov (United States)

    Roitberg, G E; Kondratova, N V; Galanina, E V

    2016-01-01

    The study was carried out on the basis of clinic “Medicine” in 2014-2015 concerning security culture. The sampling included 465 filled HSPSC questionnaires. The comparative analysis of received was implemented. The “Zubovskaia district hospital” Having no accreditation according security standards and group of clinics from USA functioning for many years in the system of patient security support were selected as objects for comparison. The evaluation was implemented concerning dynamics of security culture in organization at implementation of strategies of security of patients during 5 years and comparison of obtained results with USA clinics was made. The study results demonstrated that in conditions of absence of implemented standards of security in medical organization total evaluation of security remains extremely low. The study of security culture using HSPSC questionnaire is an effective tool for evaluating implementation of various strategies of security ofpatient. The functioning in the system of international standards of quality, primarily JCI standards, permits during several years to achieve high indices of security culture.

  15. The Impact of Macro-adjustment Programmes on Housing ...

    African Journals Online (AJOL)

    The Impact of Macro-adjustment Programmes on Housing Investment in Kampala City, Uganda: Shelter Implications for the Urban Poor. ... Eastern Africa Social Science Research Review ... The adjustment methodology has side-lined and gravely undermined the housing sector thereby aggravating the shelter problem.

  16. Fish farming as an innovative strategy for promoting food security in drought risk regions of Zimbabwe

    Directory of Open Access Journals (Sweden)

    Elvin Shava

    2017-11-01

    Full Text Available This article examines the implementation of fish farming as an innovative and economic strategy for promoting food security and dietary diversities among vulnerable households in drought risk areas of Zimbabwe. The declining climatic conditions and lack of economic opportunities in Mwenezi district of Zimbabwe attracted the attention of three nongovernmental organisations (NGOs to implement fish farming as an innovative mechanism to stimulate food security and generate employment in the district. The article used a qualitative research approach that includes semi-structured interviews and secondary data. The purposive sampling technique was adopted to interview participants in Mwenezi district who were involved in fish farming to assess and explore the experiences and benefits they derive from such development projects. Results for the article revealed that fish farming was well embraced by local communities as it led to improvements in food security, household income and employment regeneration. The local government including traditional leadership (Chiefs and Headmen’s supported the NGO activities as they benefited local communities. The article concludes that although fish farming was instrumental in regenerating employment, some participants still fail to participate because of laziness and desire to maintain dependency syndrome. The article recommends the NGOs to launch awareness campaigns in rural communities and increase networking with the donor community which is fundamental in attracting sustainable funding. The government can also promote fish farming in vulnerable rural communities by providing funding and capacity building programmes.

  17. The Effects of Exurbanization on Bird and Macro invertebrate Communities in Deciduous Forests on the Cumberland Plateau, Tennessee

    International Nuclear Information System (INIS)

    Casey, J.M.; Wilson, M.E.; Haskell, D.G.; Hollingshead, N.

    2009-01-01

    To investigate the potential causes of changes to bird communities in exurban areas, we examined the relationship between bird and macro invertebrate communities in exurbanized forest. We randomly located sampling points across a gradient of exurbanization. We used point counts to quantify bird communities and sweep netting, soil cores, pitfalls, and frass collectors to quantify macro invertebrates. Bird communities had higher richness and abundance in exurban areas compared to undeveloped forests, and lost some species of conservation concern but gained others. The macro invertebrate community was slightly more abundant in exurban areas, with a slight shift in taxonomic composition. The abundance of macro invertebrates in soil cores (but not pitfalls) predicted the abundance of ground-foraging birds. The abundance of macro invertebrates in sweep nets was not associated with the abundance of aerial insectivore birds. Exurbanization therefore appears to change bird and macro invertebrate communities, but to a lesser extent than agricultural forest fragmentation or intensive urbanization.

  18. National security risks? Uncertainty, austerity and other logics of risk in the UK government’s National Security Strategy

    NARCIS (Netherlands)

    Hammerstad, A.; Boas, I.J.C.

    2015-01-01

    Risk scholars within Security Studies have argued that the concept of security has gone through a fundamental transformation away from a threat-based conceptualisation of defence, urgency
    and exceptionality to one of preparedness, precautions and prevention of future risks, some of which are

  19. Plant litter functional diversity effects on litter mass loss depend on the macro-detritivore community.

    Science.gov (United States)

    Patoine, Guillaume; Thakur, Madhav P; Friese, Julia; Nock, Charles; Hönig, Lydia; Haase, Josephine; Scherer-Lorenzen, Michael; Eisenhauer, Nico

    2017-11-01

    A better understanding of the mechanisms driving litter diversity effects on decomposition is needed to predict how biodiversity losses affect this crucial ecosystem process. In a microcosm study, we investigated the effects of litter functional diversity and two major groups of soil macro-detritivores on the mass loss of tree leaf litter mixtures. Furthermore, we tested the effects of litter trait community means and dissimilarity on litter mass loss for seven traits relevant to decomposition. We expected macro-detritivore effects on litter mass loss to be most pronounced in litter mixtures of high functional diversity. We used 24 leaf mixtures differing in functional diversity, which were composed of litter from four species from a pool of 16 common European tree species. Earthworms, isopods, or a combination of both were added to each litter combination for two months. Litter mass loss was significantly higher in the presence of earthworms than in that of isopods, whereas no synergistic effects of macro-detritivore mixtures were found. The effect of functional diversity of the litter material was highest in the presence of both macro-detritivore groups, supporting the notion that litter diversity effects are most pronounced in the presence of different detritivore species. Species-specific litter mass loss was explained by nutrient content, secondary compound concentration, and structural components. Moreover, dissimilarity in N concentrations increased litter mass loss, probably because detritivores having access to nutritionally diverse food sources. Furthermore, strong competition between the two macro-detritivores for soil surface litter resulted in a decrease of survival of both macro-detritivores. These results show that the effects of litter functional diversity on decomposition are contingent upon the macro-detritivore community and composition. We conclude that the temporal dynamics of litter trait diversity effects and their interaction with

  20. Three Macro Controls Over China’s Real Estate Market

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The first macro control: to cool overheated real estate investment June 2003: The People’s Bank of China issued the Notice on Further Strengthening Credit and Loan Business Management of Real Estate

  1. AP1000 Design for Security

    International Nuclear Information System (INIS)

    Long, L.B.; Cummins, W.E.; Winters, J.W.

    2006-01-01

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000

  2. The MACRO detector at Gran Sasso

    International Nuclear Information System (INIS)

    Ambrosio, M.; Antolini, R.; Assiro, R.; Auriemma, G.; Bakari, D.; Baldini, A.; Barbarino, G.C.; Barbarito, E.; Barish, B.C.; Battistoni, G.; Becherini, Y.; Bellotti, R.; Bemporad, C.; Bernardini, P.; Bilokon, H.; Bisi, V.; Bloise, C.; Bottazzi, E.; Bower, C.; Brigida, M.; Bussino, S.; Cafagna, F.; Calicchio, M.; Campana, D.; Candela, A.; Carboni, M.; Cecchini, S.; Cei, F.; Ceres, A.; Chiarella, V.; Choudhary, B.C.; Coutu, S.; Cozzi, M.; Creti, P.; De Cataldo, G.; Esposti, L.D.L. Degli; Dekhissi, H.; Marzo, C. De; Mitri, I. De; Derkaoui, J.; Vincenzi, M. De; Credico, A. Di; Ferdinando, D. Di; Diotallevi, R.; Erriquez, O.; Favuzzi, C.; Forti, C.; Fusco, P.; Gebhard, M.; Giacomelli, G.; Giacomelli, R.; Giannini, G.; Giglietto, N.; Giorgini, M.; Giuliani, R.; Goretti, M.; Grassi, M.; Grau, H.; Gray, L.; Grillo, A.; Guarino, F.; Gustavino, C.; Habig, A.; Hanson, J.; Hanson, K.; Hawthorne, A.; Heinz, R.; Hong, J.T.; Iarocci, E.; Katsavounidis, E.; Katsavounidis, I.; Kearns, E.; Kim, H.; Kyriazopoulou, S.; Lamanna, E.; Lane, C.; Leone, A.; Levin, D.S.; Lipari, P.; Liu, G.; Liu, R.; Longley, N.P.; Longo, M.J.; Loparco, F.; Maaroufi, F.; Mancarella, G.; Mandrioli, G.; Manzoor, S.; Marrelli, V.; Margiotta, A.; Marini, A.; Martello, D.; Marzari-Chiesa, A.; Mazziotta, M.N.; Michael, D.G.; Mikheyev, S.; Miller, L.; Monacelli, P.; Mongelli, M.; Montaruli, T.; Monteno, M.; Mossbarger, L.; Mufson, S.; Musser, J.; Nicolo, D.; Nolty, R.; Okada, C.; Orsini, M.; Orth, C.; Osteria, G.; Ouchrif, M.; Palamara, O.; Parlati, S.; Patera, V.; Patrizii, L.; Pazzi, R.; Peck, C.W.; Pellizzoni, G.; Perchiazzi, M.; Perrone, L.; Petrakis, J.; Petrera, S.; Pignatano, N.; Pinto, C.; Pistilli, P.; Popa, V.; Raino, A.; Reynoldson, J.; Ronga, F.; Rrhioua, A.; Sacchetti, A.; Saggese, P.; Satriano, C.; Satta, L.; Scapparone, E.; Scholberg, K.; Sciubba, A.; Serra, P.; Sioli, M.; Sirri, G.; Sitta, M.; Sondergaard, S.; Spinelli, P.; Spinetti, M.; Spurio, M.; Stalio, S.; Steinberg, R.; Stone, J.L.; Sulak, L.R.; Surdo, A.; Tarle, G.; Togo, V.; Vakili, M.; Valieri, C.; Walter, C.W.; Webb, R.; Zaccheo, N.

    2002-01-01

    MACRO was an experiment that ran in the Laboratori Nazionali del Gran Sasso from 1988 to 2000. Its principal goal was to observe magnetic monopoles or set significantly lower experimental flux limits than had been previously available in the velocity range from about β=10 -4 to unity. In addition it made a variety of other observations. Examples are: setting flux limits on other so far unobserved particles such as nuclei and lightly ionizing particles, searching for WIMP annihilations in the Earth and the Sun and for neutrino bursts from stellar collapses in or near our Galaxy, and making measurements relevant to high energy muon and neutrino astronomy and of the flux of up-going muons as a function of nadir angle showing evidence for neutrino oscillations. The apparatus consisted of three principal types of detectors: liquid scintillator counters, limited streamer tubes, and nuclear track etch detectors. In addition, over part of its area it contained a transition radiation detector. The general design philosophy emphasized redundancy and complementarity. This paper describes the technical aspects of the complete MACRO detector, its operational performance, and the techniques used to calibrate it and verify its proper operation. It supplements a previously published paper which described the first portion of the detector that was built and operated

  3. IT Convergence and Security 2012

    CERN Document Server

    Chung, Kyung-Yong

    2013-01-01

    The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.

  4. Macro Study of Spatial Development Area on Tourism Village

    Directory of Open Access Journals (Sweden)

    Widhianthini Widhianthini

    2016-10-01

    Full Text Available Macro study is one approach that combines the rational method based on the results of previous studies by the authority with the empirical method utilizing the survey techniques. The purpose of this macro study is to identify and analyze the potentials, problems, and the limiting factors, and the needs of the regency; and to recommend the programs and models required by the community to achieve the sustainable development. This research uses the Participatory Rural Appraisal method, the  interview techniques (Semi Structured Interview, the technique of focused group discussion (FGD, the Rapid District Appraisal (RDA, then it is analyzed by the empirical and dynamical systems. The overview of macro studies is particularly relevant in developing the regions, especially the rural areas, based on the existing advantages, such as in Tabanan Regency. Tabanan Regency is a granary in Bali Province and the zoning of agricultural commodities in quadrant III,which is the rural farming area with combined functions between the cultivated and rural areas supported by the tourism department. The studies of the areas in the form of potential analysis, problem analysis, requirement analysis become the guidelines for preparing the development scenarios and program formats. The studies will then constitute the factors driving the realization of sustainable development of tourism villages in supporting the sustainable agriculture.

  5. Increased macroH2A1.1 expression correlates with poor survival of triple-negative breast cancer patients.

    Directory of Open Access Journals (Sweden)

    Anne-Claire Lavigne

    Full Text Available PURPOSE: Epithelial-Mesenchymal Transition (EMT features appear to be key events in development and progression of breast cancer. Epigenetic modifications contribute to the establishment and maintenance of cancer subclasses, as well as to the EMT process. Whether histone variants contribute to these transformations is not known. We investigated the relative expression levels of histone macroH2A1 splice variants and correlated it with breast cancer status/prognosis/types. METHODS: To detect differential expression of macroH2A1 variant mRNAs in breast cancer cells and tumor samples, we used the following databases: GEO, EMBL-EBI and publisher databases (may-august 2012. We extracted macroH2A1.1/macroH2A1 mRNA ratios and performed correlation studies on intrinsic molecular subclasses of breast cancer and on molecular characteristics of EMT. Associations between molecular and survival data were determined. RESULTS: We found increased macroH2A1.1/macroH2A1 mRNA ratios to be associated with the claudin-low intrinsic subtype in breast cancer cell lines. At the molecular level this association translates into a positive correlation between macroH2A1 ratios and molecular characteristics of the EMT process. Moreover, untreated Triple Negative Breast Cancers presenting a high macroH2A1.1 mRNA ratio exhibit a poor outcome. CONCLUSION: These results provide first evidence that macroH2A1.1 could be exploited as an actor in the maintenance of a transient cellular state in EMT progress towards metastatic development of breast tumors.

  6. Towards Comprehensive Food Security Measures: Comparing Key ...

    African Journals Online (AJOL)

    Food security is a multi-dimensional issue that has been difficult to measure comprehensively, given the one-dimensional focus of existing indicators. Three indicators dominate the food security measurement debate: Household Food Insecurity Access Scale (HFIAS), Dietary Diversity Score (DDS) and Coping Strategies ...

  7. Privacy and security disclosures on telecardiology websites

    NARCIS (Netherlands)

    Dubbeld, L.

    2006-01-01

    This article discusses telemedicine providers¿ online privacy and security disclosures. It presents the results of an exploratory study of a number of telecardiology companies¿ Web sites, providing insight in some of the current strategies towards data protection and information security in the

  8. Lecture 3: Web Application Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture focuses on security aspects of Web application development. Various vulnerabilities typical to web applications (such as Cross-site scripting, SQL injection, cross-site request forgery etc.) are introduced and discussed. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support servic...

  9. Macro-Prudential Policies to Mitigate Financial System Vulnerabilities

    NARCIS (Netherlands)

    Claessens, S.; Ghosh, S.R.; Mihet, R.

    2014-01-01

    Macro-prudential policies aimed at mitigating systemic financial risks have become part of the policy toolkit in many emerging markets and some advanced countries. Their effectiveness and efficacy are not well-known, however. Using panel data regressions, we analyze how changes in balance sheets of

  10. Reproductive decision-making in a macro-micro environment

    NARCIS (Netherlands)

    Philipov, D.; Liefbroer, A.C.; Klobas, J.E.

    2015-01-01

    - Takes a new approach to understanding Europe’s fertility gap - Demonstrates how the macro-level environment affects micro-level decision-making - Provides new insights into how people make decisions about having children as well as how policies affect fertility This book provides new insights into

  11. Reproductive Decision-Making in a Macro-Micro Perspective

    NARCIS (Netherlands)

    Philipov, D.; Liefbroer, A.C.; Klobas, J.

    2015-01-01

    This book provides new insights into the significant gap that currently exists between desired and actual fertility in Europe. It examines how people make decisions about having children and demonstrates how the macro-level environment affects micro-level decision-making. Written by an international

  12. U.S. Army War College Guide to Strategy

    National Research Council Canada - National Science Library

    Cerami, Joseph

    2001-01-01

    For more than 3 decades, the Army War College Department of National Security and Strategy has faced the challenge of educating future strategic leaders on the subject of national security, or grand strategy...

  13. Process Control Systems in the Chemical Industry: Safety vs. Security

    Energy Technology Data Exchange (ETDEWEB)

    Jeffrey Hahn; Thomas Anderson

    2005-04-01

    Traditionally, the primary focus of the chemical industry has been safety and productivity. However, recent threats to our nation’s critical infrastructure have prompted a tightening of security measures across many different industry sectors. Reducing vulnerabilities of control systems against physical and cyber attack is necessary to ensure the safety, security and effective functioning of these systems. The U.S. Department of Homeland Security has developed a strategy to secure these vulnerabilities. Crucial to this strategy is the Control Systems Security and Test Center (CSSTC) established to test and analyze control systems equipment. In addition, the CSSTC promotes a proactive, collaborative approach to increase industry's awareness of standards, products and processes that can enhance the security of control systems. This paper outlines measures that can be taken to enhance the cybersecurity of process control systems in the chemical sector.

  14. THE COSTS OF ENERGY SUPPLY SECURITY

    Energy Technology Data Exchange (ETDEWEB)

    Rogner, H.H.; Langlois, L.M.; McDonald, A.; Weisser, D.; Howells, M.

    2007-07-01

    In general, increasing a country's energy supply security does not come for free. It costs money to build up a strategic reserve, to increase supply diversity or even to accelerate energy efficiency improvements. Nor are all investments in increasing energy supply security cost effective, even if the shocks they are designed to insure against can be predicted with 100% accuracy. The first half of the paper surveys different definitions and strategies associated with the concept of energy supply security, and compares current initiatives to establish an 'assured supply of nuclear fuel' to the International Energy Agency's (IEA's) system of strategic national oil reserves. The second half of the paper presents results from several case studies of the costs and effectiveness of selected energy supply security policies. One case study examines alternative strategies for Lithuania following the scheduled closure of the Ignalina-2 nuclear reactor in 2009. The second case study examines, for countries with different energy resources and demand structures, the effectiveness of a policy to increase supply diversity by expanding renewable energy supplies. (auth)

  15. Natural Resources Management for Sustainable Food Security in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Natural Resources Management for Sustainable Food Security in the Sahel ... as well as strategies for managing the resource base with a view to improving food security. ... InnoVet-AMR grants to support development of innovative veterinary ...

  16. Document and author promotion strategies in the secure wiki model

    DEFF Research Database (Denmark)

    Lindberg, Kasper; Jensen, Christian D.

    2012-01-01

    Wiki systems form a subclass of the more general Open Collaborative Authoring Systems, where content is created by a user community. The ability of anyone to edit the content is, at the same time, their strength and their weakness. Anyone can write documents that improve the value of the wiki-system......, but this also means that anyone can introduce errors into documents, either by accident or on purpose. A security model for wiki-style authoring systems, called the Secure Wiki Model, has previously been proposed to address this problem. This model is designed to prevent corruption of good quality documents......, by limiting updates, to such documents, to users who have demonstrated their ability to produce documents of similar or better quality. While this security model prevents all user from editing all documents, it does respect the wiki philosophy by allowing any author who has produced documents of a certain...

  17. Relationship of Interplanetary Shock Micro and Macro Characteristics: A Wind Study

    Science.gov (United States)

    Szabo, Adam; Koval, A

    2008-01-01

    The non-linear least squared MHD fitting technique of Szabo 11 9941 has been recently further refined to provide realistic confidence regions for interplanetary shock normal directions and speeds. Analyzing Wind observed interplanetary shocks from 1995 to 200 1, macro characteristics such as shock strength, Theta Bn and Mach numbers can be compared to the details of shock micro or kinetic structures. The now commonly available very high time resolution (1 1 or 22 vectors/sec) Wind magnetic field data allows the precise characterization of shock kinetic structures, such as the size of the foot, ramp, overshoot and the duration of damped oscillations on either side of the shock. Detailed comparison of the shock micro and macro characteristics will be given. This enables the elucidation of shock kinetic features, relevant for particle energization processes, for observations where high time resolution data is not available. Moreover, establishing a quantitative relationship between the shock micro and macro structures will improve the confidence level of shock fitting techniques during disturbed solar wind conditions.

  18. A Macro Model of Squeeze-Film Air Damping in the Free-Molecule Regime

    KAUST Repository

    Hong, Gang; Ye, Wenjing

    2009-01-01

    An accurate macro model for free‐molecule squeeze‐film air damping on micro plate resonators is present. This model relates air damping directly with device dimensions and operation parameters and therefore provides an efficient tool for the design of high‐performance micro resonators. The construction of the macro model is based on Molecular Dynamics (MD) simulations and analytical traveling‐time distribution. Its accuracy is validated via the comparison between the calculated quality factors of several micro resonators and the available experimental measurements and full MD simulation results. It has been found that the relative errors of the quality factors of two resonators, as compared with experimental data, are 3.9% and 5.7% respectively. The agreements between the macro model results and MD simulation results, on the other hand, are excellent in all cases considered.

  19. A Macro Model of Squeeze-Film Air Damping in the Free-Molecule Regime

    KAUST Repository

    Hong, Gang

    2009-11-30

    An accurate macro model for free‐molecule squeeze‐film air damping on micro plate resonators is present. This model relates air damping directly with device dimensions and operation parameters and therefore provides an efficient tool for the design of high‐performance micro resonators. The construction of the macro model is based on Molecular Dynamics (MD) simulations and analytical traveling‐time distribution. Its accuracy is validated via the comparison between the calculated quality factors of several micro resonators and the available experimental measurements and full MD simulation results. It has been found that the relative errors of the quality factors of two resonators, as compared with experimental data, are 3.9% and 5.7% respectively. The agreements between the macro model results and MD simulation results, on the other hand, are excellent in all cases considered.

  20. Examination of Inequalities in Hungary by Microsimulation in Consistency with Macro Data

    OpenAIRE

    Cserháti, Ilona; Keresztély, Tibor; Takács, Tibor

    2016-01-01

    Effective decision making uses various databases including both micro and macro level datasets. In many cases it is a big challenge to ensure the consistency of the two levels. Different types of problems can occur and several methods can be used to solve them. The paper concentrates on the input alignment of the households’ income for microsimulation, which means refers to improving the elements of a micro data survey (EU-SILC) by using macro data from administrative sources. We use a combin...

  1. AN ANALYSIS OF MACRO- ECONOMIC DETERMINANTS OF EXCHANGE RATE VOLATILITY IN INDIA

    OpenAIRE

    Dr. S. Poornima; M. Ganeshwari

    2016-01-01

    The price of one currency in terms of another currency i.e., exchange rate is a very important variable for an open economy in the global market, because it affects the overall economic performance and growth of the economy. So, the relationship between the related macro-economic factor and exchange rate causing fluctuation in the value of the former carries a high degree of impact for any open economy. This paper empirically investigates the impact between macro-economic factors that affect ...

  2. Fluid Structure Interaction Analysis in Manufacturing Metal/Polymer Macro-Composites

    International Nuclear Information System (INIS)

    Baesso, R.; Lucchetta, G.

    2007-01-01

    Polymer Injection Forming (PIF) is a new manufacturing technology for sheet metal-polymer macro-composites, which results from the combination of injection moulding and sheet metal forming. This process consists on forming the sheet metal according to the boundary of the mould cavity by means of the injected polymer. After cooling, the polymer bonds permanently to the metal resulting in a sheet metal-polymer macro-composite product. Comparing this process to traditional ones (where the polymeric and metal parts are joined together after separate forming) the main advantages are both reduction of production costs and increase of part quality. This paper presents a multi-physics numerical simulation of the process performed in the Ansys/CFX environment

  3. Sulfonated macro-RAFT agents for the surfactant-free synthesis of cerium oxide-based hybrid latexes

    NARCIS (Netherlands)

    Garnier, J.; Warnant, J.; Lacroix-Desmazes, P.; Dufils, P.E.; Vinas, J.; Herk, van A.M.

    2013-01-01

    Three types of amphiphatic macro-RAFT agents were employed as compatibilizers to promote the polymerization reaction at the surface of nanoceria for the synthesis of CeO2-based hybrid latexes. Macro-RAFT copolymers and terpolymers were first synthesized employing various combinations of butyl

  4. Regional disaster risk management strategies for food security: Probing Southern African Development Community channels for influencing national policy

    Directory of Open Access Journals (Sweden)

    Happy M. Tirivangasi

    2018-05-01

    Full Text Available Natural disasters and food insecurity are directly interconnected. Climate change related hazards such as floods, hurricanes, tsunamis, droughts and other risks can weaken food security and severely impact agricultural activities. Consequently, this has an impact on market access, trade, food supply, reduced income, increased food prices, decreased farm income and employment. Natural disasters create poverty, which in turn increases the prevalence of food insecurity and malnutrition. It is clear that disasters put food security at risk. The poorest people in the community are affected by food insecurity and disasters; hence, there is a need to be prepared as well as be in a position to manage disasters. Without serious efforts to address them, the risks of disasters will become an increasingly serious obstacle to sustainable development and the achievement of sustainable development goals, particularly goal number 2 ‘end hunger, achieve food security and improved nutrition and promote sustainable agriculture’. In recent years, countries in southern Africa have experienced an increase in the frequency, magnitude and impact of climate change–related hazards such as droughts, veld fire, depleting water resources and flood events. This research aims to reveal Southern African Development Community disaster risk management strategies for food security to see how they an influence and shape policy at the national level in southern Africa. Sustainable Livelihood approach was adopted as the main theoretical framework for the study. The qualitative Analysis is based largely on data from databases such as national reports, regional reports and empirical findings on the disaster management–sustainable development nexus.

  5. Extending the reach of powder diffraction modelling by user defined macros

    CERN Document Server

    Scardi, Paolo

    2010-01-01

    The main focus of this special topic volume is the development and possibilities of the MACRO language within TOPAS, with a specific session dedicated to WPPM. The collection is presented here in the form of a ""macro tutorial"" for the benefit of the entire powder diffraction community. More than a collection of standard scientific papers, the contributions to this special issue provide methods, tutorials and practical suggestions and solutions for the proper use of TOPAS and WPPM in a number of applications; ranging from the most common to the most refined and specific cases.Readers will fin

  6. A Computer Security Course in the Undergraduate Computer Science Curriculum.

    Science.gov (United States)

    Spillman, Richard

    1992-01-01

    Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…

  7. Macro-level integrated renewable energy production schemes for sustainable development

    International Nuclear Information System (INIS)

    Subhadra, Bobban G.

    2011-01-01

    The production of renewable clean energy is a prime necessity for the sustainable future existence of our planet. However, because of the resource-intensive nature, and other challenges associated with these new generation renewable energy sources, novel industrial frameworks need to be co-developed. Integrated renewable energy production schemes with foundations on resource sharing, carbon neutrality, energy-efficient design, source reduction, green processing plan, anthropogenic use of waste resources for the production green energy along with the production of raw material for allied food and chemical industries is imperative for the sustainable development of this sector especially in an emission-constrained future industrial scenario. To attain these objectives, the scope of hybrid renewable production systems and integrated renewable energy industrial ecology is briefly described. Further, the principles of Integrated Renewable Energy Park (IREP) approach, an example for macro-level energy production, and its benefits and global applications are also explored. - Research highlights: → Discusses the need for macro-level renewable energy production schemes. → Scope of hybrid and integrated industrial ecology for renewable energy production. → Integrated Renewable Energy Parks (IREPs): A macro-level energy production scheme. → Discusses the principle foundations and global applications of IREPs. → Describes the significance of IREPs in the carbon-neutral future business arena.

  8. Growth structure and environment. 6 contributions to the macro economic model development

    International Nuclear Information System (INIS)

    Wier, Mette

    1998-04-01

    This thesis comprises 6 papers on the application of macro economic models to environmental problems. Interactions between the economic and the ecological models are elucidated and a description is given of a possible systematization of of the environmental-economic cycle within a macro economic model. Economic and technological limitations affecting the potential environmental advantages are discussed. In the second part of the thesis the general interdependence of production and consumption, and the various forms of environmental stress is analyzed. For this purpose an environment-related input-output model is presented, where for each industry there are given emissions and/or consumption of natural resources (so-called environmental coefficients), which are likely to originate from the activities of this industry. As examples of macro economic modelling,the nitrogen cycle in Denmark, environmental effects of consumer choice, use of building materials and emission due to energy generation and consumption etc. are analyzed. (EG) 146 refs

  9. Macro-level gender equality and depression in men and women in Europe.

    Science.gov (United States)

    Van de Velde, Sarah; Huijts, Tim; Bracke, Piet; Bambra, Clare

    2013-06-01

    A recurrent finding in international literature is a greater prevalence of depression in women than in men. While explanations for this gender gap have been studied extensively at the individual level, few researchers have studied macro-level determinants of depression in men and women. In the current study we aim to examine the micro-macro linkage of the relationship between gender equality and depression by gender in Europe, using data from the European Social Survey, 2006-2007 (N=39,891). Using a multilevel framework we find that a high degree of macro-level gender equality is related to lower levels of depression in both women and men. It is also related to a smaller gender difference in depression, but only for certain social subgroups and only for specific dimensions of gender equality. © 2013 The Authors. Sociology of Health & Illness © 2013 Foundation for the Sociology of Health & Illness/John Wiley & Sons Ltd.

  10. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    Directory of Open Access Journals (Sweden)

    Dan Constantin TOFAN

    2012-01-01

    Full Text Available Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, dispersed nationwide, and acting within various economic sectors. The collected data will make us able to determine a national cyber-security alert score that could help policy makers in establishing the best strategies for protecting the national cyber-space.

  11. Complicating food security: Definitions, discourses, commitments

    Directory of Open Access Journals (Sweden)

    William Ramp

    2014-12-01

    Full Text Available Food security is now commonly seen as one of the defining global issues of the century, intertwined with population and consumption shifts, climate change, environmental degradation, water scarcity, and the geopolitics attending globalization. Some analysts suggest that food security threats are so urgent that philosophical scruples must be set aside in order to concentrate all resources on developing and implementing radical strategies to avert a looming civilizational crisis. This article suggests that definitions of food security invoke commitments and have consequences, and that continued critical and conceptual attention to the language employed in food security research and policy is warranted.

  12. Understanding the security situation in Colombia

    Energy Technology Data Exchange (ETDEWEB)

    Escobar, C.O. [Colombia Central Bank (Colombia)

    1997-11-01

    The following aspects influencing Colombia are considered: the causes of security problems, including social, political and criminal violence; the political and economic crises produced by financing of the presidential campaign; coal`s social, economic and cultural environment in Guajira and Cesar; a description of the security situation in the carboniferous region focusing on guerrilla, crime and paramilitary threats; and three possible scenarios in the region`s security future. The government`s strategy of assuring restricted security to carboniferous and petroleum plants has proven expensive for the state and country. A competitive regional economy would bring social and economic benefits in the medium and long terms. 1 tab.

  13. Time to death and the forecasting of macro-level health care expenditures: some further considerations.

    Science.gov (United States)

    van Baal, Pieter H; Wong, Albert

    2012-12-01

    Although the effect of time to death (TTD) on health care expenditures (HCE) has been investigated using individual level data, the most profound implications of TTD have been for the forecasting of macro-level HCE. Here we estimate the TTD model using macro-level data from the Netherlands consisting of mortality rates and age- and gender-specific per capita health expenditures for the years 1981-2007. Forecasts for the years 2008-2020 of this macro-level TTD model were compared to forecasts that excluded TTD. Results revealed that the effect of TTD on HCE in our macro model was similar to those found in micro-econometric studies. As the inclusion of TTD pushed growth rate estimates from unidentified causes upwards, however, the two models' forecasts of HCE for the 2008-2020 were similar. We argue that including TTD, if modeled correctly, does not lower forecasts of HCE. Copyright © 2012 Elsevier B.V. All rights reserved.

  14. Sustaining anti-littering behavior within coastal and marine environments: Through the macro-micro level lenses.

    Science.gov (United States)

    Beeharry, Yashna Devi; Bekaroo, Girish; Bokhoree, Chandradeo; Phillips, Michael Robert; Jory, Neelakshi

    2017-06-30

    Being regarded as a problem of global dimensions, marine litter has been a growing concern that affects human beings, wildlife and the economic health of coastal communities to varying degrees. Due to its involvement with human behavior, marine littering has been regarded as a cultural matter encompassing macro and micro level aspects. At the micro or individual level, behavior and behavioral motivation of an individual are driven by perception of that person while at the macro or societal level, aspects including policies and legislations influence behavior. This paper investigates marine littering through the macro-micro level lenses in order to analyze and recommend how anti-littering behavior can be improved and sustained. Using Coleman's model of micro-macro relations, research questions are formulated and investigated through a social survey. Results showed important differences in perceptions among participating groups and to address key issues, potential actions are proposed along with a framework to sustain anti-littering behavior. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Assessing the Macro-Level Correlates of Malware Infections Using a Routine Activities Framework.

    Science.gov (United States)

    Holt, Thomas J; Burruss, George W; Bossler, Adam M

    2018-05-01

    The ability to gain unauthorized access to computer systems to engage in espionage and data theft poses a massive threat to individuals worldwide. There has been minimal focus, however, on the role of malicious software, or malware, which can automate this process. This study examined the macro-correlates of malware infection at the national level by using an open repository of known malware infections and utilizing a routine activities framework. Negative inflated binomial models for counts indicated that nations with greater technological infrastructure, more political freedoms, and with less organized crime financial impact were more likely to report malware infections. The number of Computer Emergency Response Teams (CERTs) in a nation was not significantly related with reported malware infection. The implications of the study for the understanding of malware infection, routine activity theory, and target-hardening strategies are discussed.

  16. The characteristic of marketing macro environment of European developing countries and Ukraine for company's marketing activity

    OpenAIRE

    Peresadko, Galina; Bakastov, Ihor

    2013-01-01

    Іn the report the comparative analysis of different European macro-marketing in developing countries and Ukraine. The analysis of the demographic, economic, natural, technological, political and cultural factors. Also the perspectives for Ukraine's marketing macro environment.

  17. Spins, Stalls, and Shutdowns: Pitfalls of Qualitative Policing and Security Research

    Directory of Open Access Journals (Sweden)

    Randy K. Lippert

    2015-11-01

    Full Text Available This article explores key elements of qualitative research on policing and security agencies, including barriers encountered and strategies to prevent them. While it is oft-assumed that policing/security agencies are difficult to access due to their clandestine or bureaucratic nature, this article demonstrates this is not necessarily the case, as access was gained for three distinct qualitative research projects. Yet, access and subsequent research were not without pitfalls, which we term security spins, security stalls, and security shutdowns. We illustrate how each was encountered and argue these pitfalls are akin to researchers falling into risk categories, not unlike those used by policing/security agents in their work. Before concluding we discuss methodological strategies for scholars to avoid these pitfalls and to advance research that critically interrogates the immense policing/security realm. URN: http://nbn-resolving.de/urn:nbn:de:0114-fqs1601108

  18. Security model for picture archiving and communication systems.

    Science.gov (United States)

    Harding, D B; Gac, R J; Reynolds, C T; Romlein, J; Chacko, A K

    2000-05-01

    The modern information revolution has facilitated a metamorphosis of health care delivery wrought with the challenges of securing patient sensitive data. To accommodate this reality, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). While final guidance has not fully been resolved at this time, it is up to the health care community to develop and implement comprehensive security strategies founded on procedural, hardware and software solutions in preparation for future controls. The Virtual Radiology Environment (VRE) Project, a landmark US Army picture archiving and communications system (PACS) implemented across 10 geographically dispersed medical facilities, has addressed that challenge by planning for the secure transmission of medical images and reports over their local (LAN) and wide area network (WAN) infrastructure. Their model, which is transferable to general PACS implementations, encompasses a strategy of application risk and dataflow identification, data auditing, security policy definition, and procedural controls. When combined with hardware and software solutions that are both non-performance limiting and scalable, the comprehensive approach will not only sufficiently address the current security requirements, but also accommodate the natural evolution of the enterprise security model.

  19. METHODOLOGICAL INSTRUMENTS FOR FORMING THE MARKETING STRATEGY OF AGRICULTURAL PRODUCTION ECOLOGIZATION

    Directory of Open Access Journals (Sweden)

    Mariya Bagorka

    2017-09-01

    Full Text Available The purpose of the article is the investigation of the nature, objectives, and strategic categories of ecologization marketing strategy, development of algorithm of this strategy and determination of environmental, economic, and ecological instruments of implementation of this strategy in the agricultural sector. Methodology. The basis of the formation of a marketing strategy for the ecologization of agrarian production is the systematic approach, which is based on the existence of implementation mechanisms that ensure system consistency, its purposefulness; interdependence; and complexity of its elements, which determines the integrity of the system; all tasks that execute individual elements of the system are interconnected; system elements and their associated actions have a certain subordination that builds a hierarchy; the system changes under the influence of specific factors, which determines its dynamism; the ability of the system to adapt to the variability of the external environment, while not losing its own individuality. Methods for strategic analysis of macro- and micro-environment factors were used to form the marketing strategy of ecologization. This process involves an analytical evaluation of the parameters of the external and internal environment with the help of general scientific and applied methods of strategic analysis. Results. The article explored the ecologization strategy, presented its objectives in the field of agriculture, the basic categories of strategic directions and implementation of ecologization marketing strategies. An algorithm of environmental marketing strategies in agricultural production is developed, environmental, economic and environmental and economic tools to implement them are determined. Practical implications. It is determined that marketing strategy of ecologization of agrarian production is a strategy of innovative development that can solve problems of economic growth, an increase of

  20. The Baltic Sea Macro-Regional Transport Cluster as an Element of the Silk Road Economic Belt

    Directory of Open Access Journals (Sweden)

    Nežerenko Olga

    2017-08-01

    Full Text Available This article analyzes the opportunities of the Chinese initiative “One Belt, One Road”, for the development of the Baltic Sea macro-region (BSR, as a single transport cluster. One of the objectives of the initiative is to strengthen transport linkages from the Pacific Ocean to the Baltic Sea Region. Thus, the contemporary macro-regional approach to the development of EU macro-regions can provide an additional impulse to the creation of formal macro-regional inter-cooperation, via in this case, the project that will advance the transport infrastructure of the region. This study examines the situation of the railway sector in the BSR in the period 2004–2015, through hierarchical cluster analysis, to identify countries with similar trends in cargo flow turnover. Taking into account the favorable geographical position of Poland, its transport performance and advanced (in comparison to other Baltic Sea region countries relations with China, it is concluded that Poland’s conditions are more suitable to promote economic integration with its closest neighbors – the Baltic countries-through the creation of formal macro-regional railway transport within the Rail Baltic project.

  1. Lead macro-encapsulation conceptual and experimental studies

    International Nuclear Information System (INIS)

    Orebaugh, E.G.

    1993-01-01

    Macro-encapsulation, the regulatory treatment for radioactively contaminated lead (mixed) waste has been conceptually and experimentally evaluated for practical application. Epoxy encapsulants molded around lead billets have proven to be exceptionally rugged, easily applied, have high radiation and chemical stability, and minimize required process equipment and production of secondary wastes. This technology can now be considered developed, and can be applied as discussed in this report

  2. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    National Research Council Canada - National Science Library

    2002-01-01

    ... an effective approach and appropriate accountability to Congress and the American people; (2) the Executive Branch s initial efforts to develop a national strategy for homeland security; (3) the impact of an invigorated homeland security program on budgets and resources; and (4) our efforts to obtain information from the Office of Homeland Security (OHS).

  3. Holismo metodológico moderado: uma interpretação weberiana do modelo macro-micro-macro

    Directory of Open Access Journals (Sweden)

    Gert Albert

    2016-12-01

    Full Text Available DOI: http://dx.doi.org/10.5007/2175-7984.2016v15n34p43 O artigo identifica uma clara e indiscutível tendência antirreducionista na sociologia weberiana que coloca em igual posição tanto o nível da ação quanto o nível da estrutura social. Com base nesse pressuposto sugere-se que um paradigma weberiano poderia ser designado como um holismo metodológico moderado. Essa posição combina uma ontologia holista restrita com o modelo explicativo macro-micro-macro. Com base nas atuais reflexões sobre emergência, distingue-se o holismo metodológico moderado de outras posições metodológicas, além de desenvolvê-lo adotando como modelo explicativo os estudos weberianos sobre a ética protestante e a tipologia da dominação. Em seguida demonstra-se que uma teoria da ação de tipo weberiano que adota o princípio “motivos como causa” possui uma orientação fundamentalmente holista que, consequentemente, não exclui da análise o nível da ordem social. Essa versão de um paradigma weberiano possui uma inclinação de base ontológica com uma sociologia de orientação histórica e empírica.

  4. Potential of dynamic spectrum allocation in LTE macro networks

    NARCIS (Netherlands)

    Hoffmann, H.; Ramachandra, P.; Kovacs, I.Z.; Jorguseski, L.; Gunnarsson, F.; Kurner, T.

    2015-01-01

    In recent years Mobile Network Operators (MNOs) worldwide are extensively deploying LTE networks in different spectrum bands and utilising different bandwidth configurations. Initially, the deployment is coverage oriented with macro cells using the lower LTE spectrum bands. As the offered traffic

  5. Merits of CMOS/SIMOX technology for low-voltage SRAM macros

    CERN Document Server

    Kumagai, K; Yamada, T; Nakamura, H; Onishi, H; Matsubara, Y; Imai, K; Kurosawa, S

    1999-01-01

    A 128-kbit SRAM (static random access memory) macro with the 0.35 mu m FD (fully-depleted) CMOS/SIMOX (separation by implantation of oxygen) technology has been developed to demonstrate the merits of that technology for low-voltage $9 applications. Its access time at Vdd =1.5 V was comparable with that obtained with the 0.35 mu m standard bulk CMOS technology at Vdd=3.3 V, due to the combination of the small S/D capacitance and the small back-bias effect. As the $9 yield of the 128-kbit SRAM macros was almost the same as the standard bulk CMOS technology, the manufacturability of the 0.35 mu m FD-CMOS/SIMOX technology has also been demonstrated. (7 refs).

  6. Innovation in small and mediumsized firms in the security service industry

    DEFF Research Database (Denmark)

    Langergaard, Luise Li; Møller, Jørn Kjølseth; Hansen, Anne Vorre

    2014-01-01

    This article is a study of innovation in the security sector based on an analysis of three Danish security companies. It uncovers the logics and dynamics of innovation in the security business, which is part of the operational service sector. Operational service companies are forced to choose...... activities. In order to overcome this general ‘service squeeze’ and break with a mature market, security companies use different strategies for innovation. These strategies depend on the ability of the individual security companies to activate the innovative resources among employees in order to move...... the business activities further up in the market hierarchy of security services by offering more complex and knowledge-intensive solutions to the customers, thereby reducing price competition and increasing the profits of the business activity in the same way as known from other industries...

  7. Development and validation of logistic prognostic models by predefined SAS-macros

    Directory of Open Access Journals (Sweden)

    Ziegler, Christoph

    2006-02-01

    Full Text Available In medical decision making about therapies or diagnostic procedures in the treatment of patients the prognoses of the course or of the magnitude of diseases plays a relevant role. Beside of the subjective attitude of the clinician mathematical models can help in providing such prognoses. Such models are mostly multivariate regression models. In the case of a dichotomous outcome the logistic model will be applied as the standard model. In this paper we will describe SAS-macros for the development of such a model, for examination of the prognostic performance, and for model validation. The rational for this developmental approach of a prognostic modelling and the description of the macros can only given briefly in this paper. Much more details are given in. These 14 SAS-macros are a tool for setting up the whole process of deriving a prognostic model. Especially the possibility of validating the model by a standardized software tool gives an opportunity, which is not used in general in published prognostic models. Therefore, this can help to develop new models with good prognostic performance for use in medical applications.

  8. An Alternative Macro-economic Model for the Classroom

    Science.gov (United States)

    Holmes, Bryan

    1976-01-01

    Presents Michal Kalecki's macro-economic model and two-sector version of the model by Robinson and Eatwell as circular flow diagrams. Advantages of using this approach in first-year undergraduate economics programs are discussed. Available from: General Secretary, Economics Association, Room 340, Hamilton House, Mabledon Place, London WC1H 9BH,…

  9. A Design Methodology for Computer Security Testing

    OpenAIRE

    Ramilli, Marco

    2013-01-01

    The field of "computer security" is often considered something in between Art and Science. This is partly due to the lack of widely agreed and standardized methodologies to evaluate the degree of the security of a system. This dissertation intends to contribute to this area by investigating the most common security testing strategies applied nowadays and by proposing an enhanced methodology that may be effectively applied to different threat scenarios with the same degree of effectiveness. ...

  10. U.S. Strategy for Bioterrorism Emergency Medical Preparedness and Response

    National Research Council Canada - National Science Library

    Lugo, Angel

    2003-01-01

    ... diseases and mass casualty dangers. The 2002 National Strategy for Homeland Security includes numerous emergency preparedness and response initiatives as part of the overall homeland security strategy...

  11. An new MHD/kinetic model for exploring energetic particle production in macro-scale systems

    Science.gov (United States)

    Drake, J. F.; Swisdak, M.; Dahlin, J. T.

    2017-12-01

    A novel MHD/kinetic model is being developed to explore magneticreconnection and particle energization in macro-scale systems such asthe solar corona and the outer heliosphere. The model blends the MHDdescription with a macro-particle description. The rationale for thismodel is based on the recent discovery that energetic particleproduction during magnetic reconnection is controlled by Fermireflection and Betatron acceleration and not parallel electricfields. Since the former mechanisms are not dependent on kineticscales such as the Debye length and the electron and ion inertialscales, a model that sheds these scales is sufficient for describingparticle acceleration in macro-systems. Our MHD/kinetic model includesmacroparticles laid out on an MHD grid that are evolved with the MHDfields. Crucially, the feedback of the energetic component on the MHDfluid is included in the dynamics. Thus, energy of the total system,the MHD fluid plus the energetic component, is conserved. The systemhas no kinetic scales and therefore can be implemented to modelenergetic particle production in macro-systems with none of theconstraints associated with a PIC model. Tests of the new model insimple geometries will be presented and potential applications will bediscussed.

  12. Academic Training Lecture Regular Programme: Computer Security - Introduction to information and computer security (1/4)

    CERN Multimedia

    2012-01-01

    Computer Security: Introduction to information and computer security (1/4), by Sebastian Lopienski (CERN).   Monday, 21 May, 2012 from 11:00 to 12:00 (Europe/Zurich) at CERN ( 31-3-004 - IT Auditorium ) Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Ai...

  13. How can results from macro economic analyses of the energy consumption of households be used in macro models? A discussion of theoretical and empirical literature about aggregation

    International Nuclear Information System (INIS)

    Halvorsen, Bente; Larsen, Bodil M.; Nesbakken, Runa

    2001-01-01

    The literature on energy demand shows that there are systematic differences in income- and price elasticity from analyses based on macro data and micro data. Even if one estimates models with the same explanatory variables, the results may differ with respect to estimated price- and income sensitivity. These differences may be caused by problems involved in transferring micro properties to macro properties, or the estimated macro relationships have failed to adequately consideration the fact that households behave differently in their energy demand. Political goals are often directed towards the entire household sector. Partial equilibrium models do not capture important equilibrium effects and feedback through the energy markets and the economy in general. Thus, it is very interesting, politically and scientifically, to do macro economic model analyses of different political measures that affect the energy consumption. The results of behavioural analyses, in which one investigates the heterogeneity of the energy demand, must be based on information about individual households. When the demand is studied based on micro data, it is difficult to aggregate its properties to a total demand function for the entire household sector if different household sectors have different behaviour. Such heterogeneity of behaviour may for instance arise when households in different regions have different heating equipment because of regional differences in the price of electricity. The subject of aggregation arises immediately when one wants to draw conclusions about the household sector based on information about individual households, whether the discussion is about the whole population or a selection of households. Thus, aggregation is a topic of interest in a wide range of problems

  14. A Hierarchical Security Architecture for Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  15. Incorporating Charging/Discharging Strategy of Electric Vehicles into Security-Constrained Optimal Power Flow to Support High Renewable Penetration

    Directory of Open Access Journals (Sweden)

    Kyungsung An

    2017-05-01

    Full Text Available This research aims to improve the operational efficiency and security of electric power systems at high renewable penetration by exploiting the envisioned controllability or flexibility of electric vehicles (EVs; EVs interact with the grid through grid-to-vehicle (G2V and vehicle-to-grid (V2G services to ensure reliable and cost-effective grid operation. This research provides a computational framework for this decision-making process. Charging and discharging strategies of EV aggregators are incorporated into a security-constrained optimal power flow (SCOPF problem such that overall energy cost is minimized and operation within acceptable reliability criteria is ensured. Particularly, this SCOPF problem has been formulated for Jeju Island in South Korea, in order to lower carbon emissions toward a zero-carbon island by, for example, integrating large-scale renewable energy and EVs. On top of conventional constraints on the generators and line flows, a unique constraint on the system inertia constant, interpreted as the minimum synchronous generation, is considered to ensure grid security at high renewable penetration. The available energy constraint of the participating EV associated with the state-of-charge (SOC of the battery and market price-responsive behavior of the EV aggregators are also explored. Case studies for the Jeju electric power system in 2030 under various operational scenarios demonstrate the effectiveness of the proposed method and improved operational flexibility via controllable EVs.

  16. Secure direct communication based on secret transmitting order of particles

    International Nuclear Information System (INIS)

    Zhu Aidong; Zhang Shou; Xia Yan; Fan Qiubo

    2006-01-01

    We propose the schemes of quantum secure direct communication based on a secret transmitting order of particles. In these protocols, the secret transmitting order of particles ensures the security of communication, and no secret messages are leaked even if the communication is interrupted for security. This strategy of security for communication is also generalized to a quantum dialogue. It not only ensures the unconditional security but also improves the efficiency of communication

  17. WORK PLACE RELATIONS AND PERSONNEL MANAGEMENT: BETWEEN THE MICRO AND MACRO? EPISTEMOLOGICAL PROVOCATIONS RELACIONES DE TRABAJO Y GESTIÓN DE PERSONAS: ¿ENTRE EL MACRO Y EL MICRO? PROVOCACIONES EPISTEMOLÓGICAS RELAÇÕES DE TRABALHO E GESTÃO DE PESSOAS: ENTRE O MACRO E O MICRO? PROVOCAÇÕES EPISTEMOLÓGICAS

    Directory of Open Access Journals (Sweden)

    Antonio Carvalho Neto

    2013-01-01

    Full Text Available The purpose of this article is to promote discussion about our epistemological choices in view of the debate over macro or micro analysis in the  fields of study of Workplace Relations (WR and PersonnelManagement (PM. The WR field is commonly identified with a macro analysis, while the PM is identified with the micro analysis. WR focuses on contexts as determinants, while PM focuses on contexts as conditioners. The article has exercises with themes of WR and PM to discuss micro or macro associating these two fields respectively to the polarization between subjectivism  versus objectivism; irrationalismversus rationalism; individual action  versus structure; individual volition  versus non volition and conditioning context (methodological individualism versus determinant context (methodologicalcollectivism. The contributions of Marxism, Positivism and the Frankfurt School are discussed and their contributions may be relevant to the macro and the micro approaches, if an epistemological conversation is possible with a minimum of prejudice.El objetivo de este artículo es provocar la discusión sobre nuestras elecciones epistemológicas a la luz deldebate sobre la predominancia del macro o del micro en la metodología de las investigaciones en los campos de las Relaciones de Trabajo (RT y de la Gestión de Personas (GP. De manera general, el campo de RT se identifica con una mirada macro, mientras el de la GP se identifica con el micro. Autores de RTcentralizan su análisis en la fuerza de los contextos como determinantes de los fenómenos, mientras autores de GP trabajan con la noción de contexto condicionante. El artículo hace ejercicios con temas de RT y de GP para cuestionar lo que es micro o macro, relacionando esos dos campos respectivamente a la oposición  entre: subjetivismo versus objetivismo; irracionalismo versus racionalismo; acción del individuo versus estructura; volición del individuo versus no volici

  18. Transport phenomena of macro and micro flows behind orifice and flow accelerated corrosion

    International Nuclear Information System (INIS)

    Fujisawa, Nobuyuki; Hayase, Toshiyuki; Ohara, Taku; Ikohagi, Toshiaki

    2008-01-01

    This paper describes experiment and numerical simulations for macro and micro flows behind an orifice model in a square pipe, which are carried from the viewpoint of flow accelerated corrosion (FAC). The measurements of velocity field behind the orifice model were carried out using particle image velocimetry, and the variations of velocity field with respect to the accuracy of the orifice position were studied. It is found that the reattachment behavior of the flow is highly influenced by the orifice position, which is a critical problem for predicting the pipe thinning phenomena by FAC. The DNS simulation was also conducted for calculating the macro flow behind the orifice. The result suggests that the DNS simulation is applicable to the prediction of pipe thinning macro flow for highly aged nuclear plant. The micro flow simulation can predict the pipe thinning phenomena near the wall. (author)

  19. Stratification of the state of Santa Catarina in macro-environments for bean cultivation

    Directory of Open Access Journals (Sweden)

    Juliano Garcia Bertoldo

    2009-01-01

    Full Text Available The purpose of this study was to suggest a division of the State of Santa Catarina in macro-environments forexperimentation and bean production. Data of the traits grain yield and plant cycle were evaluated in 10 common beangenotypes grown in nine environments. The data were submitted to the Student-Newman Keuls test, to detect differencesbetween environments, and the Best Linear Unbiased Prediction, to predict the environmental values. The results showed: (adifferences between the regions of Santa Catarina for the traits grain yield and plant cycle, which had a significant positivecorrelation of 0.26 (b Based on the genotypes and environments studied the state can be divided in two macro-environments(MA1 and MA2 and four micro-environments (MI1, MI2, MI3 and MI4. The state of Santa Catarina may be roughly dividedin at least two macro-environments for the recommendation of new cultivars.

  20. Research on information security in big data era

    Science.gov (United States)

    Zhou, Linqi; Gu, Weihong; Huang, Cheng; Huang, Aijun; Bai, Yongbin

    2018-05-01

    Big data is becoming another hotspot in the field of information technology after the cloud computing and the Internet of Things. However, the existing information security methods can no longer meet the information security requirements in the era of big data. This paper analyzes the challenges and a cause of data security brought by big data, discusses the development trend of network attacks under the background of big data, and puts forward my own opinions on the development of security defense in technology, strategy and product.

  1. Structural-functional integrated concrete with macro-encapsulated inorganic PCM

    Science.gov (United States)

    Mohseni, Ehsan; Tang, Waiching; Wang, Zhiyu

    2017-09-01

    Over the last few years the application of thermal energy storage system incorporating phase change materials (PCMs) to foster productivity and efficiency of buildings energy has grown rapidly. In this study, a structural-functional integrated concrete was developed using macro-encapsulated PCM-lightweight aggregate (LWA) as partial replacement (25 and 50% by volume) of coarse aggregate in control concrete. The PCM-LWA was prepared by incorporation of an inorganic PCM into porous LWAs through vacuum impregnation. The mechanical and thermal performance of PCM-LWA concrete were studied. The test results revealed that though the compressive strength of concrete with PCM-LWA was lower than the control concrete, but ranged from 22.02 MPa to 42.88 MPa which above the minimum strength requirement for structural application. The thermal performance test indicated that macro-encapsulated PCM-LWA has underwent the phase change transition reducing the indoor temperature.

  2. Numerical analysis of macro-crack formation behavior within the lump coke; Cokes sonai kiretsu shinten kiko no kaiseki

    Energy Technology Data Exchange (ETDEWEB)

    Aoki, H; Sato, H; Miura, T [Tohoku University, Sendai (Japan). Faculty of Engineering

    1995-03-15

    The thermal stress analysis within lump coke was studied in order to investigate macro-crack formation and deformation behavior which strongly influence heat and mass transfer in a coke oven chamber. The dilatation of plastic layer, heating rate dependence of thermophysical and mechanical properties of coal/coke, creep in the plastic and semi-coke layers, macro-crack propagation and radiative heat transfer within the macro-crack were considered in an analytical model. The macro-crack propagation was determined from the estimated crack tip stress intensity factor, K{sub I}, at the macro-crack tip compared with the plane strain fracture toughness, K{sub IC}, through the unsteady-state calculation. Calculated results on crack formation and deformation behavior of lump coke were in good agreement with experimental observations in a laboratory-scale oven chamber. The analytical model could predict micro-crack formation within the lump coke normal to the heated wall and the coke surface close to the heated wall. 12 refs., 13 figs.

  3. Performance Evaluation Of Macro amp Micro Mobility In HMIP Networks

    Directory of Open Access Journals (Sweden)

    Osama Ali Abdelgadir

    2015-08-01

    Full Text Available Abstract Changing the location of mobile node during transmission or receiving of data always caused changing of the address of the mobile node which results in packet loss as well as delay in time taken to locate the new address of the Mobile Node therefore delay of data receiving is caused this problem was known as micro-mobility issue. To resolve this problem and ascurrently mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of mobile IP which supports quality of service minimum packet loss limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of mobile IP and micro mobility protocols where mobile IP handles macro mobility and HMIP cellular IP HAWAII handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed.HIERARCHICAL MICRO MOBILITY PROTOCOL is used. To identify the impact of micro-mobility in IP based Wireless Network to implement selected micro-mobility model of Hierarchal Micro Mobility Protocol in network simulator and for more analysis and measurements results and for the purpose of performance comparison between both Macro and Micro mobility Protocol Management.. Simulation results presented in this paper are based on ns 2

  4. Evaluating the Competitiveness of the Northern and Southern Macro-Regions of Italy

    Directory of Open Access Journals (Sweden)

    Lucia Aquilino

    2016-07-01

    Full Text Available This study uses the Crouch and Ritchie (1999 model of competitiveness to investigate/measure the competitiveness of northern and southern Italian macro-regions. Researching competitive advantages along with identifying strengths/weaknesses represent the objectives of this study. 156 responses were analysed, and findings show that northern regions tend to be more competitive than southern regions. While naturally endowed and created resources represent strengths in both regions, the competitiveness of all the determinant factors included in the tourism development, planning and policy of both tourist destinations are found to be quite inadequate. Moreover, the findings revealed that these mature destinations are experiencing the effects unleashed by a number of trends such as the development of new forms of tourism, the increasing number of tourist arrivals, the growth of the global economy and the sophistication of tourists’ tastes, representing both opportunities and threats that Italian destinations need to consider when planning/developing new strategies.

  5. Macro-grazer herbivory regulates seagrass response to pulse and press nutrient loading.

    Science.gov (United States)

    Ravaglioli, Chiara; Capocchi, Antonella; Fontanini, Debora; Mori, Giovanna; Nuccio, Caterina; Bulleri, Fabio

    2018-05-01

    Coastal ecosystems are exposed to multiple stressors. Predicting their outcomes is complicated by variations in their temporal regimes. Here, by means of a 16-month experiment, we investigated tolerance and resistance traits of Posidonia oceanica to herbivore damage under different regimes of nutrient loading. Chronic and pulse nutrient supply were combined with simulated fish herbivory, treated as a pulse stressor. At ambient nutrient levels, P. oceanica could cope with severe herbivory, likely through an increase in photosynthetic activity. Elevated nutrient levels, regardless of the temporal regime, negatively affected plant growth and increased leaf nutritional quality. This ultimately resulted in a reduction of plant biomass that was particularly severe under chronic fertilization. Our results suggest that both chronic and pulse nutrient loadings increase plant palatability to macro-grazers. Strategies for seagrass management should not be exclusively applied in areas exposed to chronic fertilization since even short-term nutrient pulses could alter seagrass meadows. Copyright © 2018 Elsevier Ltd. All rights reserved.

  6. Differentiation strategy : how to create a competitive advantage in online groceries

    OpenAIRE

    Lok, Ka Heng

    2017-01-01

    Since the beginning of e-commerce, digital selling of commodities is becoming more common and accessible to every consumer. It is possible to order any grocery item on the Internet. A successful company in online groceries requires a strategy that could make it stand out from its competitors. That is the aim of the thesis; to create a competitive advantage in online groceries by using a differentiation strategy. The study focuses on analysing the external factors: the macro environment, ...

  7. A muon trigger for the MACRO apparatus

    International Nuclear Information System (INIS)

    Barbarito, E.; Bellotti, R.; Calicchio, M.; Castellano, M.; DeCataldo, G.; DeMarzo, C.; Erriquez, O.; Favuzzi, C.; Giglietto, N.; Liuzzi, R.; Spinelli, P.

    1991-01-01

    A trigger circuit based on EPROM components, able to manage up to 30 lines from independent counters, is described. The circuit has been designed and used in the MACRO apparatus at the Gran Sasso Laboratory for triggering on fast particles. The circuit works with standard TTL positive logic and is assembled in a double standard CAMAC module. It has a high triggering capacity and a high flexibility. (orig.)

  8. Simulation of UMTS Capacity and Quality of Coverage in Urban Macro- and Microcellular Environment

    Directory of Open Access Journals (Sweden)

    P. Pechac

    2005-12-01

    Full Text Available This paper deals with simulations of a radio interface of thirdgeneration (3G mobile systems operating in the WCDMA FDD modeincluding propagation predictions in macro and microcells. In the radionetwork planning of 3G mobile systems, the quality of coverage and thesystem capacity present a common problem. Both macro and microcellularconcepts are very important for implementing wireless communicationsystems, such as Universal Mobile Telecommunication Systems (UMTS indense urban areas. The aim of this paper is to introduce differentimpacts - selected bit rate, uplink (UL loading, allocation and numberof Nodes B, selected propagation prediction models, macro andmicrocellular environment - on system capacity and quality of coveragein UMTS networks. Both separated and composite simulation scenarios ofmacro and microcellular environments are presented. The necessity of aniteration-based simulation approach and site-specific propagationmodeling in microcells is proven.

  9. Effects of changes in micro- and macro-environmental factors on the supply of hospitals services.

    Science.gov (United States)

    Kassaye, W W; Tseng, K C

    1990-01-01

    The failures, marketing difficulties and financial hardships hospitals have experienced raises a question as to whether they have been responsive to the changes in the micro and macro-environmental factors. To determine how responsive hospitals have been to these changes, we investigate the impact of a number of selected factors on the supply of hospital services during 1972 through 1978. The findings indicate that despite the fact that the economy went through recessionary periods, and the demographic distribution exhibited both a shift and a change in the aging and birth rates of the nation, the changes in hospitals' responsiveness have been less than satisfactory. It appears that hospitals readily respond to the changes in the micro-environment than to the changes in macro-environment. Their response to the changes in the macro-environment. Their response to the changes in the macro-environment may be characterized as an effort to create a higher level of production whose goal is to create a still higher level of needs and wants.

  10. Sulfonated macro-RAFT agents for the surfactant-free synthesis of cerium oxide-based hybrid latexes.

    Science.gov (United States)

    Garnier, Jérôme; Warnant, Jérôme; Lacroix-Desmazes, Patrick; Dufils, Pierre-Emmanuel; Vinas, Jérôme; van Herk, Alex

    2013-10-01

    Three types of amphiphatic macro-RAFT agents were employed as compatibilizers to promote the polymerization reaction at the surface of nanoceria for the synthesis of CeO2-based hybrid latexes. Macro-RAFT copolymers and terpolymers were first synthesized employing various combinations of butyl acrylate as a hydrophobic monomer and acrylic acid (AA) and/or 2-acrylamido-2-methylpropane sulfonic acid (AMPS) as hydrophilic monomers. After characterizing the adsorption of these macro-RAFT agents at the cerium oxide surface by UV-visible spectrometry, emulsion copolymerization reactions of styrene and methyl acrylate were then carried out in the presence of the surface-modified nanoceria. Dynamic Light Scattering and cryo-Transmission Electron Microscopy were employed to confirm the hybrid structure of the final CeO2/polymer latexes, and proved that the presence of acrylic acid units in amphiphatic macro-RAFT agents enabled an efficient formation of hybrid structures, while the presence of AMPS units, when combined with AA units, resulted in a better distribution of cerium oxide nanoclusters between latex particles. Copyright © 2013 Elsevier Inc. All rights reserved.

  11. Factors of Formation of the tax Potential of the Securities Market

    Directory of Open Access Journals (Sweden)

    Gumenniy Anatoliy A.

    2014-02-01

    Full Text Available The article is devoted to the problems of identification of factors that influence volumes and dynamics of the tax potential of the securities market. The goal of the article is detection and systematisation of factors of formation and realisation of the tax potential of the securities market. In the result of the conducted study it systemises factors of formation and realisation of the tax potential of the securities market by two groups: economic and legislatory organisational. The main of the economic factors are: state of economic development, degree of the shadow economy, level of savings of the population, level of trust of the population and level of inflation. The article justifies interconnection that exist between the said factors and volumes of the tax potential of the securities market. In particular, it proves that increase of volumes of the shadow economy facilitates reduction of the tax potential of the securities market, since it facilitates outflow of capital from the official sector of economy. Growth of unorganised savings of the population, the volume of which grows proportionally to the growth of the level of distrust of the population to the securities market, has a negative impact on formation of the tax potential of the securities market. Degree of the negative impact of the said factors grows in the event of deterioration of the state of the macro-economic situation and growth of inflation. The legislatory organisational factors are: object, base, rates of taxation of securities trading and the securities market infrastructure. The article proves that low level of infrastructure development could significantly reduce the tax potential of the securities market. The proposed approach to the study of factors of formation of the tax potential gives a possibility to mark out, apart from de-shadowing of operations and expansion of the taxation base, one more direction on increase of the tax potential of the securities market

  12. STRATEGIC FACTORS OF THE DEVELOPMENT AS DETERMINANTS OF COMPANY’S FINANCIAL SECURITY

    Directory of Open Access Journals (Sweden)

    Danuta Mierzwa

    2016-06-01

    Full Text Available Considering  the complexity of problems connected with modern  management of organizations, , the authors attempted  to prove that the  environment of the organization  does significantly determine its development, functioning and financial security.  The study was conducted with the use of  scenario analysis , as well as trend extrapolation. The applied methods enabled investigation of macro – environmental factors of the organization in terms of their strategic effect on its functioning. The examined scenario analyses of the environmental status definitely proved that  in the majority of analyses  the key role is played by the international, economic and political and competitive areas.

  13. Green paper: towards a European strategy for the security of energy supply; Livre Vert: vers une strategie europeenne de securite d'approvisionnement energetique

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-04-01

    The Green Paper ''Towards a European strategy for the security of energy supply in Europe'', published in 2002, gives a clear priority to energy efficiency and renewable. Although it is not a legislative document, it is accepted by the main actors as a reference for all energy related actions. Energie-Cites welcomes the Green Paper. This document gives a clear review of the energy context in Europe and raises fundamental questions, in particular, the place given to energy demand management, presented as the priority policy to ensure security of supply and compliance with the European Union international commitments. However, they precise three important points. It is indispensable that potential energy savings be quantified so as to emphasize the importance of a resource that has always been underestimated. By the same token, the ''demand management'' option presented in the Green Paper would gain in credibility if several alternative scenarios were proposed, the impact and the conditions for the success of such a policy being then more clearly apparent. A policy with a stronger focus on demand management and renewable energy requires one to redirect attention towards a different set of players. (A.L.B.)

  14. Macro and micro challenges for talent retention in South Africa

    Directory of Open Access Journals (Sweden)

    Berenice Kerr-Phillips

    2009-08-01

    Full Text Available The aim of the study was to explore the challenges presented in retaining South Africa’s talent at both macro (country and micro (organisational levels. Using a web-based survey placed on eight New Zealand sites, the reasons for emigration of South African talent during the period 1994–2006 were explored with 84 respondents. Utilising a purposive sampling technique, 20 semi-structured interviews were undertaken with identified ‘top talent’ in two financial services companies. Content analysis of the responses from both samples was employed. Reasons for emigration (macro issues included uncertainty about the future of the country, job insecurity and fears regarding both corruption and violent crime. Reasons for talent loss amongst identified top talent (micro issues were found to be linked to leadership, organisational culture and employment equity.

  15. Food/Hunger Macro-Analysis Seminar. A Do-It-Yourself Manual for College Courses and Action Groups.

    Science.gov (United States)

    Moyer, William; Thorne, Erika

    This guide describes a fifteen-week macro-analysis seminar about food production, distribution, and consumption on international, national, and local levels. The macro-analysis approach emphasizes the interrelatedness of all parts of the food/hunger issue; therefore the seminar also addresses escalating military expenditures, widening poverty, and…

  16. Anti-Phytopathogenic Activities of Macro-Algae Extracts

    Directory of Open Access Journals (Sweden)

    Ingrid Ramírez

    2011-05-01

    Full Text Available Aqueous and ethanolic extracts obtained from nine Chilean marine macro-algae collected at different seasons were examined in vitro and in vivo for properties that reduce the growth of plant pathogens or decrease the injury severity of plant foliar tissues following pathogen infection. Particular crude aqueous or organic extracts showed effects on the growth of pathogenic bacteria whereas others displayed important effects against pathogenic fungi or viruses, either by inhibiting fungal mycelia growth or by reducing the disease symptoms in leaves caused by pathogen challenge. Organic extracts obtained from the brown-alga Lessonia trabeculata inhibited bacterial growth and reduced both the number and size of the necrotic lesion in tomato leaves following infection with Botrytis cinerea. Aqueous and ethanolic extracts from the red-alga Gracillaria chilensis prevent the growth of Phytophthora cinnamomi, showing a response which depends on doses and collecting-time. Similarly, aqueous and ethanolic extracts from the brown-alga Durvillaea antarctica were able to diminish the damage caused by tobacco mosaic virus (TMV in tobacco leaves, and the aqueous procedure is, in addition, more effective and seasonally independent. These results suggest that macro-algae contain compounds with different chemical properties which could be considered for controlling specific plant pathogens.

  17. Corporate strategic plan for safeguards and security

    International Nuclear Information System (INIS)

    1997-06-01

    Department of Energy (DOE) safeguards and security (S and S) is a team effort, consisting of Field, National Laboratories, Program Office, and Headquarters units cooperating to support the Department's diverse security needs. As an integral part of the nation's security structure, the DOE S and S Program regularly supports and works in cooperation with other US Government agencies and private industry to improve the national security posture. Thus, inter- and intra-agency partnerships play an invaluable role in the continuing efforts to integrate and implement improved ways of doing business. Their Corporate Strategic Plan provides a road map to guide, track, and provide feedback for the incorporation and implementation of S and S activities within DOE. Part 1 Planning Framework, describes those overarching factors which influence the planning endeavors. Part 2, Strategic Perspective, outlines where the S and S Program has been and how they will move to the future through core competencies, changing cultural thinking, and implementing their strategies. Part 3, Strategic and Operational Integration, details critical focus areas, strategies, and success indicators designed to enhance inter-agency S and S integration and promote cooperation with external agencies. This Plan will be reviewed annually to ensure it remains supportive and fully-engaged with the nation's and international security environments

  18. Infant emotion regulation: relations to bedtime emotional availability, attachment security, and temperament.

    Science.gov (United States)

    Kim, Bo-Ram; Stifter, Cynthia A; Philbrook, Lauren E; Teti, Douglas M

    2014-11-01

    The present study examines the influences of mothers' emotional availability toward their infants during bedtime, infant attachment security, and interactions between bedtime parenting and attachment with infant temperamental negative affectivity, on infants' emotion regulation strategy use at 12 and 18 months. Infants' emotion regulation strategies were assessed during a frustration task that required infants to regulate their emotions in the absence of parental support. Whereas emotional availability was not directly related to infants' emotion regulation strategies, infant attachment security had direct relations with infants' orienting toward the environment and tension reduction behaviors. Both maternal emotional availability and security of the mother-infant attachment relationship interacted with infant temperamental negative affectivity to predict two strategies that were less adaptive in regulating frustration. Copyright © 2014 Elsevier Inc. All rights reserved.

  19. MacroBac: New Technologies for Robust and Efficient Large-Scale Production of Recombinant Multiprotein Complexes.

    Science.gov (United States)

    Gradia, Scott D; Ishida, Justin P; Tsai, Miaw-Sheue; Jeans, Chris; Tainer, John A; Fuss, Jill O

    2017-01-01

    Recombinant expression of large, multiprotein complexes is essential and often rate limiting for determining structural, biophysical, and biochemical properties of DNA repair, replication, transcription, and other key cellular processes. Baculovirus-infected insect cell expression systems are especially well suited for producing large, human proteins recombinantly, and multigene baculovirus systems have facilitated studies of multiprotein complexes. In this chapter, we describe a multigene baculovirus system called MacroBac that uses a Biobricks-type assembly method based on restriction and ligation (Series 11) or ligation-independent cloning (Series 438). MacroBac cloning and assembly is efficient and equally well suited for either single subcloning reactions or high-throughput cloning using 96-well plates and liquid handling robotics. MacroBac vectors are polypromoter with each gene flanked by a strong polyhedrin promoter and an SV40 poly(A) termination signal that minimize gene order expression level effects seen in many polycistronic assemblies. Large assemblies are robustly achievable, and we have successfully assembled as many as 10 genes into a single MacroBac vector. Importantly, we have observed significant increases in expression levels and quality of large, multiprotein complexes using a single, multigene, polypromoter virus rather than coinfection with multiple, single-gene viruses. Given the importance of characterizing functional complexes, we believe that MacroBac provides a critical enabling technology that may change the way that structural, biophysical, and biochemical research is done. © 2017 Elsevier Inc. All rights reserved.

  20. Abuse of disabled parking: Reforming public's attitude through persuasive multimedia strategy

    Science.gov (United States)

    Yahaya, W. A. J. W.; Zain, M. Z. M.

    2014-02-01

    Attitude is one of the factors that contribute to the abuse of disabled parking. The attitude's components are affective, cognitive and behavioral and may be formed in various ways including learning and persuasion. Using learning and persuasion approach, this study has produced a persuasive multimedia aiming to form a positive attitude toward disabled persons in order to minimize the rate of disabled parking abuse. The persuasive multimedia was developed using Principle of Social Learning draws from Persuasive Technology as learning strategy at macro persuasion level, and modality and redundancy principles draw from Multimedia Learning Principles as design strategy at micro persuasion level. In order to measure the effectiveness of the persuasive multimedia, 93 respondents were selected in a 2 × 2 quasi experimental research design for experiment. Attitude components of affective, cognitive and behavioral were measured using adapted instrument from the Multi Dimensional Attitudes Scale toward Persons With Disabilities (MAS). Result of the study shows that the persuasive multimedia which designed based on Social Learning Theory at macro persuasion level is capable of forming positive attitude toward disabled person. The cognitive component of the attitude found to be the most responsive component. In term of design strategy at the micro persuasion level, modality found to be the most significant strategy compare to redundancy. While males are more responsive to the persuasive multimedia compare to females.

  1. Macro-control Polices on the Real Estate Market: 08 vs. 09

    Institute of Scientific and Technical Information of China (English)

    Zhao Yan

    2009-01-01

    @@ 2008 is a year full of policy changes for the real estate market. On the one hand, real estate policies were launched one after another,most frequent in recent years. On the other hand, a major policy shift was emerging, most evident in financial and fiscal policies.Macro-control policies are meant to lunctlon as a [001 ior reverse regulation. When the market is overheated, macro policies are used to cool it down; when the market is down, they are used to stimulate its development. At present, the central government has basically confirmed its stand to help the real estate market out. If the market remains down in near future, more favorable policies will be put in place.

  2. Significance of Hemispheric Security for Mexico

    Science.gov (United States)

    2003-04-07

    La Seguridad Internacional, la Nueva Geopolitica Continental y Mexico ,” Seminario Internacional sobre Misiones de Paz, Seguridad y Defensa, Rio de...USAWC STRATEGY RESEARCH PROJECT SIGNIFICANCE OF HEMISPHERIC SECURITY FOR MEXICO by LTC Enrique Garcia Jaramillo Cavalry, Mexican Army COL Joseph R...xx-xx-2002 to xx-xx-2003 4. TITLE AND SUBTITLE Significance of Hemispheric Security for Mexico Unclassified 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c

  3. Optimization of healthcare supply chain in context of macro-ergonomics factors by a unique mathematical programming approach.

    Science.gov (United States)

    Azadeh, A; Motevali Haghighi, S; Gaeini, Z; Shabanpour, N

    2016-07-01

    This study presents an integrated approach for analyzing the impact of macro-ergonomics factors in healthcare supply chain (HCSC) by data envelopment analysis (DEA). The case of this study is the supply chain (SC) of a real hospital. Thus, healthcare standards and macro-ergonomics factors are considered to be modeled by the mathematical programming approach. Over 28 subsidiary SC divisions with parallel missions and objectives are evaluated by analyzing inputs and outputs through DEA. Each division in this HCSC is considered as decision making unit (DMU). This approach can analyze the impact of macro-ergonomics factors on supply chain management (SCM) in healthcare sector. Also, this method ranks the relevant performance efficiencies of each HCSC. In this study by using proposed method, the most effective macro-ergonomics factor on HCSC is identified as "teamwork" issue. Also, this study would help managers to identify the areas of weaknesses in their SCM system and set improvement target plan for the related SCM system in healthcare industry. To the best of our knowledge, this is the first study for macro-ergonomics optimization of HCSC. Copyright © 2016 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  4. Cloud Computing Application of Personal Information's Security in Network Sales-channels

    OpenAIRE

    Sun Qiong; Min Liu; Shiming Pang

    2013-01-01

    With the promotion of Internet sales, the security of personal information to network users have become increasingly demanding. The existing network of sales channels has personal information security risks, vulnerable to hacker attacking. Taking full advantage of cloud security management strategy, cloud computing security management model is introduced to the network sale of personal information security applications, which is to solve the problem of information leakage. Then we proposed me...

  5. Conceptualizing Educational Leadership: Does Exploring Macro-Level Facets Matters?

    Science.gov (United States)

    Sinha, Chetan

    2013-01-01

    The present review attempts to examine the present status of educational leadership highlighting the role of macro-level facets in Asian Pacific context. The conceptualization of educational leadership among researchers so far had been found to vary according to different contexts and situations. Theoretical perspectives associated with…

  6. Macro-defect free cements. State of art

    International Nuclear Information System (INIS)

    Holanda, J.N.F.; Povoa, G.E.A.M.; Souza, G.P.; Pinatti, D.G.

    1998-01-01

    The purpose of this work is to prevent a state of art about macro-defect-free cement pastes (MDF cement ) of high mechanical strength. This new type of cement paste is obtained through addition of a water-soluble polymer, followed by intense shear mixing and application of low compacting pressure. It is presented fundamental aspects related to the processing of this MDF paste, as well as its main properties and applications are discussed. (author)

  7. Homeland Security Affairs Journal, Volume II - 2006: Issue 1, April

    OpenAIRE

    2006-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. April 2006. Welcome to the third edition of Homeland Securit...

  8. Potential risks and threats to international security

    Directory of Open Access Journals (Sweden)

    Iurie RICHICINSCHI

    2016-12-01

    Full Text Available Today we can ascertain with certainty that in the early part of the 21st century, the challenges addressed to the current security environment tend to become increasingly diffuse, less predictable and multidimensional, being both a feature of external security, as well as an internal one and, of course, becoming an indispensable part of security policies and strategies. Therefore, the need for international cooperation as a foundation for the stability of the security environment has increased. It should provide a sense of trust and peace by ensuring the absence of danger both for the individual and for the community to which he belongs.

  9. Challenges and Aspects of Cyber Security of the Republic of Croatia

    Directory of Open Access Journals (Sweden)

    Protrka Nikola

    2017-06-01

    Full Text Available The development of the information and communication technology (ICT, regardless of its many advantages, unfortunately has its disadvantage - the abuse of the cyberworld. The global character of cyberspace is specific in terms of national legislation and its view of specificities. Some countries adopted the recommendation of the Convention on Cybercrime of the Council of Europe (Official Gazette NN-MU 9/02, 4/04 and amended their national legislation, whereas others kept implementing their criminal law solutions, which are outdated and cannot reach the level of this type of criminal offences. Consequently, governments are inclined to cooperate and exchange information about this type of crime due to the fact that the criminal offender may be anywhere, and the offence itself can take place at a great distance from the offender. In September 2015, the government of the Republic of Croatia adopted the National Cyber Security Strategy and the Action Plan for the Implementation of the National Cyber Security Strategy, the first allencompassing strategy of the Republic of Croatia on cyber security. The paper also focuses on the role of the Police College in the Action Plan for the Implementation of the National Cyber Security Strategy.

  10. Energy Security and Sub-Saharan Africa

    Directory of Open Access Journals (Sweden)

    Emily Meierding

    2013-02-01

    Full Text Available Published by Palgrave MacmillanOver the last decade the topic of energy security has reappeared on global policy agendas. Most analyses of international energy geopolitics examine the interests and behaviour of powerful energy-importing countries like the US and China. This chapter begins by examining foreign powers’ expanded exploitation of oil and uranium resources in Sub-Saharan Africa. It goes on to examine how energy importers’ efforts to enhance their energy security through Africa are impacting energy security within Africa. It assesses Sub-Saharan states’ attempts to increase consumption of local oil and uranium reserves. Observing the constraints on these efforts, it then outlines some alternative strategies that have been employed to enhance African energy security. It concludes that, while local community-based development projects have improved the well-being of many households, they are not a sufficient guarantor of energy security. Inadequate petroleum access, in particular, remains a development challenge. Foreign powers’ efforts to increase their oil security are undermining the energy security of Sub-Saharan African citizens.

  11. Intégrer les sexospécificités dans les politiques macroéconomiques ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    28 janv. 2011 ... Produit national brut (PNB), investissement, épargne, balance des paiements — voilà les catégories que les macroéconomistes analysent. Mais l'analyse macroéconomique peut-elle être indifférente aux sexospécificités ? Les économistes ont longtemps considéré que les marchés étaient simplement des ...

  12. Interactions between leaf macro, micronutrients and soil properties in pistachio (Pistacia vera L.) orchards

    OpenAIRE

    Koukoulakis, Prodromos; Chatzissavvidis, Christos; Papadopoulos, Aristotelis; Pontikis, Dimitrios

    2013-01-01

    The interactions between: (i) leaf dry matter macronutrients, micronutrients and soil chemical properties, (ii) leaf macro- and micronutrients, (iii) soil macro- and micronutrients and (iv) soil chemical properties, and soil micro- and macronutrients in 50 pistachio orchards were investigated in leaves and soils by means of regression analysis. Most of the soils were deficient in plant-available P, Zn, Mn, Fe, and B, while they were excessively supplied with Cu. Leaf analysis showed that most...

  13. Synthesis of Rh/Macro-Porous Alumina Over Micro-Channel Plate and Its Catalytic Activity Tests for Diesel Reforming.

    Science.gov (United States)

    Seong, Yeon Baek; Kim, Yong Sul; Park, No-Kuk; Lee, Tae Jin

    2015-11-01

    Macro-porous Al2O3 as the catalytic support material was synthesized using colloidal polystyrene spheres over a micro-channel plate. The colloidal polystyrene spheres were used as a template for the production of an ordered macro porous material using an alumina nitrate solution as the precursor for Al2O3. The close-packed colloidal crystal array template method was applied to the formulation of ordered macro-porous Al2O3 used as a catalytic support material over a micro-channel plate. The solvent in the mixture solution, which also contained the colloidal polystyrene solution, aluminum nitrate solution and the precursor of the catalytic active materials (Rh), was evaporated in a vacuum oven at 50 degrees C. The ordered polystyrene spheres and aluminum salt of the solid state were deposited over a micro channel plate, and macro-porous Al2O3 was formed after calcination at 600 degrees C to remove the polystyrene spheres. The catalytic activity of the Rh/macro-porous alumina supported over the micro-channel plate was tested for diesel reforming.

  14. Macro-meso-micro thinking with structure-property relations for chemistry education: an explorative design based study

    NARCIS (Netherlands)

    Meijer, M.R.

    2011-01-01

    ‘You went deeper, step by step, towards a level with a lower scale’. This is a statement of a student that is characteristic for macro-micro thinking in this thesis. Macro-micro thinking refers to a way of reasoning, using causal relations between properties of materials and submicroscopic models of

  15. Student Experiential Opportunities in National Security Careers

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  16. Fertilization of Earth Ponds. III: Effects on Benthic Macro ...

    African Journals Online (AJOL)

    Organic fertilizers in form of cow and chicken manure were applied in oligotrophic or unproductive pond water over a period of one year to stimulate the production of benthic macro invertebrates for the benefit of trout culture, while maintaining adequate water quality. Development of aquatic macrophytes during both ...

  17. Effect of Policy Interventions on Food Security in Tigray, Northern Ethiopia

    Directory of Open Access Journals (Sweden)

    Anne van der Veen

    2011-03-01

    Full Text Available Following the design of a conservation-based agricultural development strategy and food security strategy, the Tigray government has implemented different pro-poor development programs over the past years to address the problems of food security. This study attempts to investigate the effectiveness of government policy interventions at different scales addressed to improve food security. Food security both at the regional and district level was investigated by deriving food balance sheets for the period 2000-2008. An empirical analysis based on a logit model was also employed to analyze household level food security status. The results of the logit model reveal that government policy interventions such as water harvesting schemes, employment generation schemes, and promotion of technology adoption significantly contribute to a higher likelihood of household food security status. The findings of the food balance sheet also indicate that the region has made some impressive development gains in improving regional food self-sufficiency, indicating the importance of government interventions in improving food security both at the household and regional level.

  18. US-Africa Security Policy

    DEFF Research Database (Denmark)

    Møller, Nicolai Stahlfest

    This paper will discuss the United States security policy towards Africa based on the National Security Strategy from 2006 and the founding of US Africa Command, the new military combatant command that is supposed to unify US military efforts on the African continent. The paper will discuss whether...... AFRICOM and US actions in Africa could be seen as a true (newfound) American interest in Africa or whether actions that are considered low-key and low-budget in Washington are to be regarded as a true asymmetry because African states regard US action as important and significant. The paper will explain...

  19. Output power fluctuations due to different weights of macro particles used in particle-in-cell simulations of Cerenkov devices

    International Nuclear Information System (INIS)

    Bao, Rong; Li, Yongdong; Liu, Chunliang; Wang, Hongguang

    2016-01-01

    The output power fluctuations caused by weights of macro particles used in particle-in-cell (PIC) simulations of a backward wave oscillator and a travelling wave tube are statistically analyzed. It is found that the velocities of electrons passed a specific slow-wave structure form a specific electron velocity distribution. The electron velocity distribution obtained in PIC simulation with a relative small weight of macro particles is considered as an initial distribution. By analyzing this initial distribution with a statistical method, the estimations of the output power fluctuations caused by different weights of macro particles are obtained. The statistical method is verified by comparing the estimations with the simulation results. The fluctuations become stronger with increasing weight of macro particles, which can also be determined reversely from estimations of the output power fluctuations. With the weights of macro particles optimized by the statistical method, the output power fluctuations in PIC simulations are relatively small and acceptable.

  20. Secure relay selection based on learning with negative externality in wireless networks

    Science.gov (United States)

    Zhao, Caidan; Xiao, Liang; Kang, Shan; Chen, Guiquan; Li, Yunzhou; Huang, Lianfen

    2013-12-01

    In this paper, we formulate relay selection into a Chinese restaurant game. A secure relay selection strategy is proposed for a wireless network, where multiple source nodes send messages to their destination nodes via several relay nodes, which have different processing and transmission capabilities as well as security properties. The relay selection utilizes a learning-based algorithm for the source nodes to reach their best responses in the Chinese restaurant game. In particular, the relay selection takes into account the negative externality of relay sharing among the source nodes, which learn the capabilities and security properties of relay nodes according to the current signals and the signal history. Simulation results show that this strategy improves the user utility and the overall security performance in wireless networks. In addition, the relay strategy is robust against the signal errors and deviations of some user from the desired actions.

  1. INL Vision and Strategy 2015

    International Nuclear Information System (INIS)

    Pillai, Rekha Sukamar

    2015-01-01

    This Laboratory vision and strategy presents INL's vision and strategy for the Laboratory and is our introduction to a special place dedicated to improving our nation's energy security future.

  2. The Current State of the International Security System

    OpenAIRE

    Ивашов, Леонид Григорьевич

    2013-01-01

    The author examines the modern geopolitical world and assesses the threats to Russia’s security. These threats are demonstrated to be hitched to the goals of the US National Strategy and, in particular, to the US plans on deployment of anti-ballistic missile system. The author argues that in this situation the mainstay of Russia’s foreign policy should become “security through cooperation.”Key words: international security, anti-ballistic missile, preemptive war, geopolitical centers, UN Secu...

  3. Adaptace marketingové strategie společnosti Starbucks na českém trhu

    OpenAIRE

    Pekáriková, Katarína

    2008-01-01

    Purpose of this diploma thesis is Starbucks marketing strategy analysis on the Czech market. Theoretical part focuses primarily on company characteristics with regard to its historical development, key values, brand identity and positioning. This also covers company's global strategy, ways of international expansion and requirements for perspective business partner. Practical part analyses Czech market, its macro-environment and competition in the field. In addition present thesis includes SW...

  4. Efficient Strategy Computation in Zero-Sum Asymmetric Repeated Games

    KAUST Repository

    Li, Lichun

    2017-03-06

    Zero-sum asymmetric games model decision making scenarios involving two competing players who have different information about the game being played. A particular case is that of nested information, where one (informed) player has superior information over the other (uninformed) player. This paper considers the case of nested information in repeated zero-sum games and studies the computation of strategies for both the informed and uninformed players for finite-horizon and discounted infinite-horizon nested information games. For finite-horizon settings, we exploit that for both players, the security strategy, and also the opponent\\'s corresponding best response depend only on the informed player\\'s history of actions. Using this property, we refine the sequence form, and formulate an LP computation of player strategies that is linear in the size of the uninformed player\\'s action set. For the infinite-horizon discounted game, we construct LP formulations to compute the approximated security strategies for both players, and provide a bound on the performance difference between the approximated security strategies and the security strategies. Finally, we illustrate the results on a network interdiction game between an informed system administrator and uniformed intruder.

  5. A study on genetic variation and selective effect of principal characters of hybrid progenies of macro-mutants in peanut

    International Nuclear Information System (INIS)

    Qiu Qingrong

    1990-01-01

    In order to make good use of macro-mutants, we have studied the law of genetic variation and selective effect on the hybrid progenies of original varieties and of two macro-mutants with steady phenotypes. The results show that the hybrid progenies of the two experimental macro-mutants in the broad-sense heritability and the genetic advance of their main economical characters as well as the effect on selection are better than those of the hybrid progenies of the two original varieties. The selection rate from the macro-mutant hybrid progenies is 72.2% which is higher than that of the hybrid progenies of the two original varieties, and and a new prospecting strain has been obtained

  6. Security Implications of Physical Design Attributes in the Emergency Department.

    Science.gov (United States)

    Pati, Debajyoti; Pati, Sipra; Harvey, Thomas E

    2016-07-01

    Security, a subset of safety, is equally important in the efficient delivery of patient care. The emergency department (ED) is susceptible to violence creating concerns for the safety and security of patients, staff, and visitors and for the safe and efficient delivery of care. Although there is an implicit and growing recognition of the role of the physical environment, interventions typically have been at the microlevel. The objective of this study was to identify physical design attributes that potentially influence safety and efficiency of ED operations. An exploratory, qualitative research design was adopted to examine the efficiency and safety correlates of ED physical design attributes. The study comprised a multimeasure approach involving multidisciplinary gaming, semistructured interviews, and touring interviews of frontline staff in four EDs at three hospital systems across three states. Five macro physical design attributes (issues that need to be addressed at the design stage and expensive to rectify once built) emerged from the data as factors substantially associated with security issues. They are design issues pertaining to (a) the entry zone, (b) traffic management, (c) patient room clustering, (d) centralization versus decentralization, and (e) provisions for special populations. Data from this study suggest that ED security concerns are generally associated with three sources: (a) gang-related violence, (b) dissatisfied patients, and (c) behavioral health patients. Study data show that physical design has an important role in addressing the above-mentioned concerns. Implications for ED design are outlined in the article. © The Author(s) 2016.

  7. SPSS macros to compare any two fitted values from a regression model.

    Science.gov (United States)

    Weaver, Bruce; Dubois, Sacha

    2012-12-01

    In regression models with first-order terms only, the coefficient for a given variable is typically interpreted as the change in the fitted value of Y for a one-unit increase in that variable, with all other variables held constant. Therefore, each regression coefficient represents the difference between two fitted values of Y. But the coefficients represent only a fraction of the possible fitted value comparisons that might be of interest to researchers. For many fitted value comparisons that are not captured by any of the regression coefficients, common statistical software packages do not provide the standard errors needed to compute confidence intervals or carry out statistical tests-particularly in more complex models that include interactions, polynomial terms, or regression splines. We describe two SPSS macros that implement a matrix algebra method for comparing any two fitted values from a regression model. The !OLScomp and !MLEcomp macros are for use with models fitted via ordinary least squares and maximum likelihood estimation, respectively. The output from the macros includes the standard error of the difference between the two fitted values, a 95% confidence interval for the difference, and a corresponding statistical test with its p-value.

  8. Development of an automated desktop procedure for defining macro ...

    African Journals Online (AJOL)

    methods (Von Neumann mean square error, CUSUM plots or unweighted values and the Worsley Likelihood Ratio Test (WLRT)) were used to define macro-reach breaks for four South African rivers (Crocodile, Olifants, Mhlathuze and Seekoei Rivers) and were compared to ... Water SA Vol.32 (3) 2006: pp.395-402 ...

  9. A macro-economic and sectoral evaluation of carbon taxation in France

    International Nuclear Information System (INIS)

    Callonnec, Gael; Reynes, Frederic; Yeddir-Tamsamani, Yasser

    2011-01-01

    This paper evaluates the macro-economic and sectoral impact of a carbon tax in France using the Three-ME model that combines two important features: (1) The model has a detailed industrial structure and detailed description of the French tax system, particularly the taxation applied to energy. (2) It has the main properties of the neo-Keynesian models because it takes into account the slow process adjustment of prices and quantifies. Our results show under certain conditions the possibility of a double economic and environmental dividends resulting from carbon taxation, for both the short and long term. Carbon tax. Neo-Keynesian macro-economic model. Sectoral analysis. Initially published in 'Revue de l'OFCE / Debats et politiques' No. 120

  10. MACRO1: a code to test a methodology for analyzing nuclear-waste management systems

    International Nuclear Information System (INIS)

    Edwards, L.L.

    1979-01-01

    The code is primarily a manager of probabilistic data and deterministic mathematical models. The user determines the desired aggregation of the available models into a composite model of a physical system. MACRO1 then propagates the finite probability distributions of the inputs to the model to finite probability distributions over the outputs. MACRO1 has been applied to a sample analysis of a nuclear-waste repository, and its results compared satisfactorily with previously obtained Monte Carlo statistics

  11. Detection of macro-ecological patterns in South American hummingbirds is affected by spatial scale

    DEFF Research Database (Denmark)

    Rahbek, Carsten; Graves, Gary R.

    2000-01-01

    Scale is widely recognized as a fundamental conceptual problem in biology, but the question of whether species-richness patterns vary with scale is often ignored in macro-ecological analyses, despite the increasing application of such data in international conservation programmes. We tested for s...... peaks, decreasing the power of statistical tests to discriminate the causal agents of regional richness gradients. Ideally, the scale of analysis should be varied systematically to provide the optimal resolution of macro-ecological pattern....

  12. Time-frequency wavelet analysis of the interrelationship between the global macro assets and the fear indexes

    Science.gov (United States)

    Abid, Fathi; Kaffel, Bilel

    2018-01-01

    Understanding the interrelationships of the global macro assets is crucial for global macro investing. This paper investigates the local variance and the interconnection between the stock, gold, oil, Forex and the implied volatility markets in the time/frequency domains using the wavelet methodology, including the wavelet power spectrum, the wavelet squared coherence and phase difference, the wavelet multiple correlation and cross-correlation. The univariate analysis reveals that, in some crisis periods, underlying asset markets present the same pattern in terms of the wavelet power spectrum indicating high volatility for the medium scale, and that for the other market stress periods, volatility behaves differently. Moreover, unlike the underlying asset markets, the implied volatility markets are characterized by high power regions across the entire period, even in the absence of economic events. Bivariate results show a bidirectional relationship between the underlying assets and their corresponding implied volatility indexes, and a steady co-movement between the stock index and its corresponding fear index. Multiple correlation analysis indicates a strong correlation between markets at high scales with evidence of a nearly perfect integration for a period longer than a year. In addition, the hedging strategies based on the volatility index lead to an increase in portfolio correlation. On the other hand, the results from multiple cross-correlations reveal that the lead-lag effect starts from the medium scale and that the VIX (stock market volatility index) index is the potential leader or follower of the other markets.

  13. Alternative policy impacts on US GHG emissions and energy security: A hybrid modeling approach

    International Nuclear Information System (INIS)

    Sarica, Kemal; Tyner, Wallace E.

    2013-01-01

    This study addresses the possible impacts of energy and climate policies, namely corporate average fleet efficiency (CAFE) standard, renewable fuel standard (RFS) and clean energy standard (CES), and an economy wide equivalent carbon tax on GHG emissions in the US to the year 2045. Bottom–up and top–down modeling approaches find widespread use in energy economic modeling and policy analysis, in which they differ mainly with respect to the emphasis placed on technology of the energy system and/or the comprehensiveness of endogenous market adjustments. For this study, we use a hybrid energy modeling approach, MARKAL–Macro, that combines the characteristics of two divergent approaches, in order to investigate and quantify the cost of climate policies for the US and an equivalent carbon tax. The approach incorporates Macro-economic feedbacks through a single sector neoclassical growth model while maintaining sectoral and technological detail of the bottom–up optimization framework with endogenous aggregated energy demand. Our analysis is done for two important objectives of the US energy policy: GHG reduction and increased energy security. Our results suggest that the emission tax achieves results quite similar to the CES policy but very different results in the transportation sector. The CAFE standard and RFS are more expensive than a carbon tax for emission reductions. However, the CAFE standard and RFS are much more efficient at achieving crude oil import reductions. The GDP losses are 2.0% and 1.2% relative to the base case for the policy case and carbon tax. That difference may be perceived as being small given the increased energy security gained from the CAFE and RFS policy measures and the uncertainty inherent in this type of analysis. - Highlights: • Evaluates US impacts of three energy/climate policies and a carbon tax (CT) • Analysis done with bottom–up MARKAL model coupled with a macro model • Electricity clean energy standard very close to

  14. Individual Mortality and Macro-Economic Conditions from Birth to Death

    NARCIS (Netherlands)

    Lindeboom, Maarten; Portrait, France; Berg, van den G.J.

    2003-01-01

    This paper analyzes the effects of macro-economic conditions throughout life on the individual mortality rate. We estimate flexible duration models where the individual's mortality rate depends on current conditions, conditions earlier in life (notably during childhood), calendar time, age,

  15. The Battle to Secure Our Public Access Computers

    Science.gov (United States)

    Sendze, Monique

    2006-01-01

    Securing public access workstations should be a significant part of any library's network and information-security strategy because of the sensitive information patrons enter on these workstations. As the IT manager for the Johnson County Library in Kansas City, Kan., this author is challenged to make sure that thousands of patrons get the access…

  16. Sequential use of the STICS crop model and of the MACRO pesticide fate model to simulate pesticides leaching in cropping systems.

    Science.gov (United States)

    Lammoglia, Sabine-Karen; Moeys, Julien; Barriuso, Enrique; Larsbo, Mats; Marín-Benito, Jesús-María; Justes, Eric; Alletto, Lionel; Ubertosi, Marjorie; Nicolardot, Bernard; Munier-Jolain, Nicolas; Mamy, Laure

    2017-03-01

    The current challenge in sustainable agriculture is to introduce new cropping systems to reduce pesticides use in order to reduce ground and surface water contamination. However, it is difficult to carry out in situ experiments to assess the environmental impacts of pesticide use for all possible combinations of climate, crop, and soils; therefore, in silico tools are necessary. The objective of this work was to assess pesticides leaching in cropping systems coupling the performances of a crop model (STICS) and of a pesticide fate model (MACRO). STICS-MACRO has the advantage of being able to simulate pesticides fate in complex cropping systems and to consider some agricultural practices such as fertilization, mulch, or crop residues management, which cannot be accounted for with MACRO. The performance of STICS-MACRO was tested, without calibration, from measurements done in two French experimental sites with contrasted soil and climate properties. The prediction of water percolation and pesticides concentrations with STICS-MACRO was satisfactory, but it varied with the pedoclimatic context. The performance of STICS-MACRO was shown to be similar or better than that of MACRO. The improvement of the simulation of crop growth allowed better estimate of crop transpiration therefore of water balance. It also allowed better estimate of pesticide interception by the crop which was found to be crucial for the prediction of pesticides concentrations in water. STICS-MACRO is a new promising tool to improve the assessment of the environmental risks of pesticides used in cropping systems.

  17. Two-phase mixed media dielectric with macro dielectric beads for enhancing resistivity and breakdown strength

    Science.gov (United States)

    Falabella, Steven; Meyer, Glenn A; Tang, Vincent; Guethlein, Gary

    2014-06-10

    A two-phase mixed media insulator having a dielectric fluid filling the interstices between macro-sized dielectric beads packed into a confined volume, so that the packed dielectric beads inhibit electro-hydrodynamically driven current flows of the dielectric liquid and thereby increase the resistivity and breakdown strength of the two-phase insulator over the dielectric liquid alone. In addition, an electrical apparatus incorporates the two-phase mixed media insulator to insulate between electrical components of different electrical potentials. And a method of electrically insulating between electrical components of different electrical potentials fills a confined volume between the electrical components with the two-phase dielectric composite, so that the macro dielectric beads are packed in the confined volume and interstices formed between the macro dielectric beads are filled with the dielectric liquid.

  18. Mitigations for Security Vulnerabilities Found in Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Trent D. Nelson

    2006-05-01

    Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in on-site CS assessments and suggests mitigation strategies to provide asset owners with the information they need to better protect their systems from common security flows.

  19. Solar Secure Schools: Strategies and Guidelines; October 2004--April 2005

    Energy Technology Data Exchange (ETDEWEB)

    Braun, G. W.; Varadi, P. F.

    2006-01-01

    This report explores the technical and economic aspects of installing solar power (photovoltaic aka PV) systems on schools to improve the schools' energy security and provide power during disasters.

  20. Domestic water and sanitation as water security: monitoring, concepts and strategy

    Science.gov (United States)

    Bradley, David J.; Bartram, Jamie K.

    2013-01-01

    Domestic water and sanitation provide examples of a situation where long-term, target-driven efforts have been launched with the objective of reducing the proportion of people who are water-insecure, most recently through the millennium development goals (MDGs) framework. Impacts of these efforts have been monitored by an increasingly evidence-based system, and plans for the next period of international policy, which are likely to aim at universal coverage with basic water and sanitation, are being currently developed. As distinct from many other domains to which the concept of water security is applied, domestic or personal water security requires a perspective that incorporates the reciprocal notions of provision and risk, as the current status of domestic water and sanitation security is dominated by deficiency This paper reviews the interaction of science and technology with policies, practice and monitoring, and explores how far domestic water can helpfully fit into the proposed concept of water security, how that is best defined, and how far the human right to water affects the situation. It is considered that they fit well together in terms both of practical planning of targets and indicators and as a conceptual framework to help development. The focus needs to be broad, to extend beyond households, to emphasize maintenance as well as construction and to increase equity of access. International and subnational monitoring need to interact, and monitoring results need to be meaningful to service providers as well as users. PMID:24080628

  1. Intercalation and structural aspects of macroRAFT agents into MgAl layered double hydroxides

    Directory of Open Access Journals (Sweden)

    Dessislava Kostadinova

    2016-12-01

    Full Text Available Increasing attention has been devoted to the design of layered double hydroxide (LDH-based hybrid materials. In this work, we demonstrate the intercalation by anion exchange process of poly(acrylic acid (PAA and three different hydrophilic random copolymers of acrylic acid (AA and n-butyl acrylate (BA with molar masses ranging from 2000 to 4200 g mol−1 synthesized by reversible addition-fragmentation chain transfer (RAFT polymerization, into LDH containing magnesium(II and aluminium(III intralayer cations and nitrates as counterions (MgAl-NO3 LDH. At basic pH, the copolymer chains (macroRAFT agents carry negative charges which allowed the establishment of electrostatic interactions with the LDH interlayer and their intercalation. The resulting hybrid macroRAFT/LDH materials displayed an expanded interlamellar domain compared to pristine MgAl-NO3 LDH from 1.36 nm to 2.33 nm. Depending on the nature of the units involved into the macroRAFT copolymer (only AA or AA and BA, the intercalation led to monolayer or bilayer arrangements within the interlayer space. The macroRAFT intercalation and the molecular structure of the hybrid phases were further characterized by Fourier transform infrared (FTIR and solid-state 13C, 1H and 27Al nuclear magnetic resonance (NMR spectroscopies to get a better description of the local structure.

  2. Portraying Monsters: Framing School Bullying through a Macro Lens

    Science.gov (United States)

    Horton, Paul

    2016-01-01

    This article critically considers the discourse on school bullying through the conceptual framework of lenses and argues that a macro lens has been utilised by school bullying researchers to bring into focus the characteristics of the individuals involved and the types of actions used. By considering earlier understandings of bullying, the article…

  3. An evaluation grid for the assessments of macro-economic impacts of energy transition. Working paper Nr 48

    International Nuclear Information System (INIS)

    Ouvrard, Jean-Francois; Scapecchi, Pascale

    2014-05-01

    This study aims at comparing the main available macro-economic models used to assess the consequences of policies for energy transition, and at determining their scope and limitations of validity. More precisely, the authors study the impact of two categories of policy instruments (those aimed at modifying prices and incentive ones) and the role of the adopted modelling of technical progress and of the macro-economic closure of the model. In a first part, they present various tools or models used to assess economic impacts of energy transition: technical-economic, macro-economic, general balance, and hybrid models. Then, after a presentation of some principles adopted to analyse these various models, the authors discuss price-based tools, tools based on demand support, the key role of technological progress, the impact of the macro-economic closure on the reached objective. They finally discuss the results obtained by applying an evaluation grid to energy transition scenarios. A set of recommendations is finally proposed for a better assessment of these impacts

  4. Utilization of macro encapsulated phase change materials for the development of thermal energy storage and structural lightweight aggregate concrete

    International Nuclear Information System (INIS)

    Memon, Shazim Ali; Cui, H.Z.; Zhang, Hang; Xing, Feng

    2015-01-01

    Highlights: • Compressive strength of LWAC with Paraffin–LWA was higher than 15 MPa. • Shrinkage strain with Paraffin–LWA reduced by 41.8%. • For outdoor testing, temperature at room center with Paraffin–LWA reduced by 2.9 °C. • Recovery period with Paraffin–LWA was less than average life span of building. • A reduction of 465 kg CO 2 -eq/year or 12.91 kg CO 2 -eq/year/m 2 was achieved. - Abstract: Structural–functional integrated materials are one of directions of rapid development for saving-energy materials. Phase Change Materials (PCMs) are latent thermal storage materials possessing a large amount of heat energy stored during its phase change stage. Porous lightweight aggregate (LWA) can serve as the carrier for PCM. In this research, a structural concrete with function of indoor temperature control were prepared by using macro encapsulated PCM–LWA. The indoor and outdoor tests were performed to determine the thermal performance of the lightweight aggregate concrete (LWAC) containing macro encapsulated Paraffin–LWA. The compressive strength and shrinkage strain of LWAC with macro encapsulated PCM–LWA were evaluated. Finally, the economic and environmental aspects of application of macro encapsulated Paraffin–LWA in a typical floor area of public housing rental flat in Hong Kong were assessed. From indoor thermal performance test, it was found that LWAC incorporated with macro encapsulated Paraffin–LWA has a function of reducing the energy consumption by decreasing the indoor temperature; flatten the fluctuation of indoor temperature and shifting the loads away from the peak periods. Moreover, from outdoor thermal performance test, it was found that the performance of macro encapsulated Paraffin–LWA in adjusting the room temperature was optimized when there was a remarkable temperature difference between the day and night. Test results showed that the compressive strengths of LWAC incorporating macro encapsulated Paraffin

  5. Adsorption study of a macro-RAFT agent onto SiO2-coated Gd2O3:Eu3+ nanorods: Requirements and limitations

    Science.gov (United States)

    Zou, Hua; Melro, Liliana; de Camargo Chaparro, Thaissa; de Souza Filho, Isnaldi Rodrigues; Ananias, Duarte; Bourgeat-Lami, Elodie; dos Santos, Amilton Martins; Barros-Timmons, Ana

    2017-02-01

    The use of a macromolecular RAFT (macro-RAFT) agent to encapsulate anisotropic nano-objects via emulsion polymerization is an emerging route to prepare polymer/inorganic colloidal nanocomposites. However, a number of requirements have to be fulfilled. This work aims at highlighting the effects of the preparative procedure and dispersion method on the amount of macro-RAFT agent adsorbed onto SiO2-coated Gd2O3:Eu3+ nanorods. The adsorption of macro-RAFT agent was studied using the depletion method with UV-vis spectrophotometry. Measurements were performed at a fixed concentration of nanorods and varying concentrations of the macro-RAFT agent in aqueous dispersion at room temperature. The adsorption isotherms showed that for the same initial macro-RAFT agent concentration, the highest adsorption capacity of the macro-RAFT agent on nanorods was usually achieved for non-calcined thin SiO2-coated nanorods under mild bath sonication.

  6. Embodied energy analysis of photovoltaic (PV) system based on macro- and micro-level

    International Nuclear Information System (INIS)

    Nawaz, I.; Tiwari, G.N.

    2006-01-01

    In this paper the energy payback time and CO 2 emissions of photovoltaic (PV) system have been analyzed. The embodied energy for production of PV module based on single crystal silicon, as well as for the manufacturing of other system components have been computed at macro- and micro-level assuming irradiation of 800-1200 W/m 2 in different climatic zones in India for inclined surface. The energy payback time with and without balance-of-system for open field and rooftop has been evaluated. It is found that the embodied energy at micro-level is significantly higher than embodied energy at macro-level. The effect of insolation, overall efficiency, lifetime of PV system on energy pay back time and CO 2 emissions have been studied with and without balance of system. A 1.2 kW p PV system of SIEMENS for mudhouse at IIT, Delhi based on macro- and micro-level has been evaluated. The CO 2 mitigation potential, the importance and role of PV system for sustainable development are also highlighted

  7. Research on Mechanisms and Controlling Methods of Macro Defects in TC4 Alloy Fabricated by Wire Additive Manufacturing.

    Science.gov (United States)

    Ji, Lei; Lu, Jiping; Tang, Shuiyuan; Wu, Qianru; Wang, Jiachen; Ma, Shuyuan; Fan, Hongli; Liu, Changmeng

    2018-06-28

    Wire feeding additive manufacturing (WFAM) has broad application prospects because of its advantages of low cost and high efficiency. However, with the mode of lateral wire feeding, including wire and laser additive manufacturing, gas tungsten arc additive manufacturing etc., it is easy to generate macro defects on the surface of the components because of the anisotropy of melted wire, which limits the promotion and application of WFAM. In this work, gas tungsten arc additive manufacturing with lateral wire feeding is proposed to investigate the mechanisms of macro defects. The results illustrate that the defect forms mainly include side spatters, collapse, poor flatness, and unmelted wire. It was found that the heat input, layer thickness, tool path, and wire curvature can have an impact on the macro defects. Side spatters are the most serious defects, mainly because the droplets cannot be transferred to the center of the molten pool in the lateral wire feeding mode. This research indicates that the macro defects can be controlled by optimizing the process parameters. Finally, block parts without macro defects were fabricated, which is meaningful for the further application of WFAM.

  8. Spousal Coping Strategies in the Shadow of Terrorism.

    Science.gov (United States)

    Shechory-Bitton, Mally; Cohen-Louck, Keren

    2017-11-01

    The present study focuses on spousal differences in reaction to ongoing exposure to terror and security threats. Sixty-eight married couples with children living in a region exposed to ongoing security threats were evaluated. All participants completed questionnaires on objective exposure (number of incidents) and subjective exposure (sense of fear) to terrorism and security threats, posttraumatic stress disorder (PTSD) symptoms, and their coping strategies with this ongoing exposure. Mothers reported higher levels of fear and PTSD symptoms, although their objective levels of exposure did not differ from those of their husbands. Similarities were found in coping strategies adopted by mothers and fathers to cope with life in the shadow of terrorism. Both mothers and fathers integrated emotion- and problem-focused coping strategies, with greater use of the latter. These similarities partially contradict research findings suggesting gender differences in coping with exposure to security threats. The results support the need for further research into investigating the role of dyadic coping in the context of prolonged exposure to security threats.

  9. Hydrogen Macro System Model User Guide, Version 1.2.1

    Energy Technology Data Exchange (ETDEWEB)

    Ruth, M.; Diakov, V.; Sa, T.; Goldsby, M.; Genung, K.; Hoseley, R.; Smith, A.; Yuzugullu, E.

    2009-07-01

    The Hydrogen Macro System Model (MSM) is a simulation tool that links existing and emerging hydrogen-related models to perform rapid, cross-cutting analysis. It allows analysis of the economics, primary energy-source requirements, and emissions of hydrogen production and delivery pathways.

  10. Processing and Mechanical Properties of Macro Polyamide Fiber Reinforced Concrete.

    Science.gov (United States)

    Jeon, Joong Kyu; Kim, WooSeok; Jeon, Chan Ki; Kim, Jin Cheol

    2014-11-26

    This study developed a macro-sized polyamide (PA) fiber for concrete reinforcement and investigated the influence of the PA fiber on flexural responses in accordance with ASTM standards. PA fibers are advantageous compared to steel fibers that are corrosive and gravitated. The macro-sized PA fiber significantly improved concrete ductility and toughness. Unlike steel fibers, the PA fibers produced two peak bending strengths. The first-peaks occurred near 0.005 mm of deflection and decreased up to 0.5 mm of deflection. Then the bending strength increased up to second-peaks until the deflections reached between 1.0 and 1.5 mm. The averaged flexural responses revealed that PA fiber content did not significantly influence flexural responses before L /600, but had significant influence thereafter. Toughness performance levels were also determined, and the results indicated more than Level II at L /600 and Level IV at others.

  11. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide (French Edition)

    International Nuclear Information System (INIS)

    2017-01-01

    This publication provides an overview, based on practical experience and lessons learned, for establishing nuclear security systems and measures for major public events. It covers technical and administrative nuclear security measures for developing the necessary organizational structure, developing plans, strategies and concepts of operations, and making arrangements for implementing the developed plans, strategies and concepts.

  12. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  13. Cyber Security Research Frameworks For Coevolutionary Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Rush, George D. [Missouri Univ. of Science and Technology, Rolla, MO (United States); Tauritz, Daniel Remy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-12-03

    Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger, more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.

  14. Analysis of household food security concerns and coping strategies of small farmers in northwestern highlands of pakistan

    International Nuclear Information System (INIS)

    Amir, R.M.; Shahbaz, B.; Ali, T.; Zafar, M.I.

    2013-01-01

    Food insecurity is turning out to be one of the worst crises of world in future. Developing countries are especially considered vulnerable to be hit most severely by this impending danger. Resource scarce regions of Pakistan are also included in the list of marginalized areas where population is not able to manage its food by herself. The present study was designed to analyze the state of household food security concerns and identify managing strategies for dealing with shortage of food patterns in Northern Pakistan. The research was based upon a survey of randomly selected two districts. Both qualitative and quantitative research methods were used for data collection. The results indicated that prices of food items were very high. It also delineated that lack of irrigational water; limited market access, and high cost of fertilizers were leading production related constraints. As a resort to these constraints and due to low output from the food crops there was found a shift from subsistence to cash seeking cropping patterns of the growers. This increase in income was perceived as a mean to ensure household food security. Furthermore, at household level the respondents expressed to reduce their expenses on the agricultural inputs in future. (author)

  15. Evaluation of the nuclear security culture

    International Nuclear Information System (INIS)

    Spitalnik, Jorge

    2003-01-01

    The security culture of an organization resides in its workers and it is expressed by the way the personnel that works in a particular organization practice daily its activities. The security culture can be practice in a high or in a low level, but it always exists and it can always be improved. It is based on the security condition and procedures that have been established in the planning phase and in the implementation of a project. After its implantation, in order to avoid deterioration, basically it is necessary to maintain and to bring updated those conditions and procedures through strategies of follow up and control. This process establishes the basis of a program of maintenance and improvement of the Security Culture. Many self-evaluations that have been accomplished at nuclear organizations based on workers perception concerning working conditions and management environment, have permitted objectively determine if the security doctrine, which the organization assure to follow rigorously into its dally activities, is really so (LS)

  16. Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System

    KAUST Repository

    El Shafie, Ahmed

    2016-07-07

    This letter proposes a novel hybrid half-/full-duplex relaying scheme to enhance the relay channel security. A source node (Alice) communicates with her destination node (Bob) in the presence of a buffer-aided full-duplex relay node (Rooney) and a potential eavesdropper (Eve). Rooney adopts two different relaying, namely randomize-and-forward and decode-andforward relaying strategies, to improve the security of the legitimate system. In the first relaying strategy, Rooney uses a codebook different from that used at Alice. In the second relaying strategy, Rooney and Alice use the same codebooks. In addition, Rooney switches between half-duplex and full-duplex modes to further enhance the security of the legitimate system. The numerical results demonstrate that our proposed scheme achieves a significant average secrecy end-to-end throughput improvement relative to the conventional bufferless full-duplex relaying scheme.

  17. Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System

    KAUST Repository

    El Shafie, Ahmed; Salem, Ahmed Sultan; Al-Dhahir, Naofal

    2016-01-01

    This letter proposes a novel hybrid half-/full-duplex relaying scheme to enhance the relay channel security. A source node (Alice) communicates with her destination node (Bob) in the presence of a buffer-aided full-duplex relay node (Rooney) and a potential eavesdropper (Eve). Rooney adopts two different relaying, namely randomize-and-forward and decode-andforward relaying strategies, to improve the security of the legitimate system. In the first relaying strategy, Rooney uses a codebook different from that used at Alice. In the second relaying strategy, Rooney and Alice use the same codebooks. In addition, Rooney switches between half-duplex and full-duplex modes to further enhance the security of the legitimate system. The numerical results demonstrate that our proposed scheme achieves a significant average secrecy end-to-end throughput improvement relative to the conventional bufferless full-duplex relaying scheme.

  18. Preliminary Strategic Environmental Assessment of the Great Western Development Strategy: Safeguarding Ecological Security for a New Western China

    Science.gov (United States)

    Li, Wei; Liu, Yan-Ju; Yang, Zhifeng

    2012-02-01

    The Great Western Development Strategy (GWDS) is a long term national campaign aimed at boosting development of the western area of China and narrowing the economic gap between the western and the eastern parts of China. The Strategic Environmental Assessment (SEA) procedure was employed to assess the environmental challenges brought about by the western development plans. These plans include five key developmental domains (KDDs): water resource exploitation and use, land utilization, energy generation, tourism development, and ecological restoration and conservation. A combination of methods involving matrix assessment, incorporation of expert judgment and trend analysis was employed to analyze and predict the environmental impacts upon eight selected environmental indicators: water resource availability, soil erosion, soil salinization, forest destruction, land desertification, biological diversity, water quality and air quality. Based on the overall results of the assessment, countermeasures for environmental challenges that emerged were raised as key recommendations to ensure ecological security during the implementation of the GWDS. This paper is intended to introduce a consensus-based process for evaluating the complex, long term pressures on the ecological security of large areas, such as western China, that focuses on the use of combined methods applied at the strategic level.

  19. Studies of network organization and dynamics of e-beam crosslinked PVPs: From macro to nano

    International Nuclear Information System (INIS)

    Dispenza, C.; Grimaldi, N.; Sabatino, M.-A.; Todaro, S.; Bulone, D.; Giacomazza, D.; Przybytniak, G.; Alessi, S.; Spadaro, G.

    2012-01-01

    In this work the influence of poly(N-vinyl pyrrolidone) (PVP) concentration in water on the organization and dynamics of the corresponding macro-/nanogel networks has been systematically investigated. Irradiation has been performed at the same irradiation dose (within the sterilization dose range) and dose rate. In the selected irradiation conditions, the transition between macroscopic gelation and micro-/nanogels formation is observed just below the critical overlap concentration (∼1 wt%), whereas the net prevalence of intra-molecular over inter-molecular crosslinking occurs at a lower polymer concentration (below 0.25 wt%). Dynamic–mechanical spectroscopy has been applied as a classical methodology to estimate the network mesh size for macrogels in their swollen state, while 13 C NMR spin–lattice relaxation spectroscopy has been applied on both the macrogel and nanogel freeze dried residues to withdraw interesting information of the network spatial organization in the passage of scale from macro to nano. - Highlights: ► Aqueous solutions of commercial PVP were irradiated using linear electron accelerator. ► By varying polymer concentration it is possible to obtain information from macro to nano networks. ► Spin–lattice relaxation times are associated to the mobility of molecular segments. ► 1 H– 13 C-NMR proton relaxation time represents a junction between macro/nano world.

  20. Influence of pore structure on carbon retention/loss in soil macro-aggregates

    Science.gov (United States)

    Quigley, Michelle; Kravchenko, Alexandra; Rivers, Mark

    2017-04-01

    Carbon protection within soil macro-aggregates is an important component of soil carbon sequestration. Pores, as the transportation network for microorganisms, water, air and nutrients within macro-aggregates, are among the factors controlling carbon protection through restricting physical accessibility of carbon to microorganisms. The understanding of how the intra-aggregate pore structure relates to the degree of carbon physical protection, however, is currently lacking. This knowledge gap can lead to potentially inaccurate models and predictions of soil carbon's fate and storage in future changing climates. This study utilized the natural isotopic difference between C3 and C4 plants to trace the location of newly added carbon within macro-aggregates before and after decomposition and explored how location of this carbon relates to characteristics of intra-aggregate pores. To mimic the effect of decomposition, aggregates were incubated at 23˚ C for 28 days. Computed micro-tomographic images were used to determine pore characteristics at 6 μm resolution before and after incubation. Soil (0-10 cm depth) from a 20 year continuous corn (C4 plant) experiment was used. Two soil treatments were considered: 1) "destroyed-structure", where 1 mm sieved soil was used and 2) "intact-structure", where intact blocks of soil were used. Cereal rye (Secale cereale L.) (C3 plant) was grown in the planting boxes (2 intact, 3 destroyed, and one control) for three months in a greenhouse. From each box, ˜5 macro-aggregates of ˜5 mm size were collected for a total of 27 macro-aggregates. Half of the aggregates were cut into 5-11 sections, with relative positions of the sections within the aggregate recorded, and analyzed for δ13C. The remaining aggregates were incubated and then subjected to cutting and δ13C analysis. While there were no significant differences between the aggregate pore size distributions of the two treatments, the roles that specific pores sizes played in