WorldWideScience

Sample records for non-path-dependent european securities

  1. Path dependence and the geography of infrastructure networks: the case of the European fibre-optic network

    NARCIS (Netherlands)

    Vinciguerra, S.; Frenken, K.

    2015-01-01

    We analyse the path dependent dynamics in the formation of new infrastructure using an augmented gravity model. We observe that the formation of the pan-European telecommunication backbone has been dependent on pre-existent European transportation networks, particularly, the maritime and railway

  2. Path-dependent functions

    International Nuclear Information System (INIS)

    Khrapko, R.I.

    1985-01-01

    A uniform description of various path-dependent functions is presented with the help of expansion of the type of the Taylor series. So called ''path-integrals'' and ''path-tensor'' are introduced which are systems of many-component quantities whose values are defined for arbitrary paths in coordinated region of space in such a way that they contain a complete information on the path. These constructions are considered as elementary path-dependent functions and are used instead of power monomials in the usual Taylor series. Coefficients of such an expansion are interpreted as partial derivatives dependent on the order of the differentiations or else as nonstandard cavariant derivatives called two-point derivatives. Some examples of pathdependent functions are presented.Space curvature tensor is considered whose geometrica properties are determined by the (non-transitive) translator of parallel transport of a general type. Covariant operation leading to the ''extension'' of tensor fiels is pointed out

  3. Path Dependency

    OpenAIRE

    Mark Setterfield

    2015-01-01

    Path dependency is defined, and three different specific concepts of path dependency – cumulative causation, lock in, and hysteresis – are analyzed. The relationships between path dependency and equilibrium, and path dependency and fundamental uncertainty are also discussed. Finally, a typology of dynamical systems is developed to clarify these relationships.

  4. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  5. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  6. Secure Path Selection under Random Fading

    Directory of Open Access Journals (Sweden)

    Furqan Jameel

    2017-05-01

    Full Text Available Application-oriented Wireless Sensor Networks (WSNs promises to be one of the most useful technologies of this century. However, secure communication between nodes in WSNs is still an unresolved issue. In this context, we propose two protocols (i.e. Optimal Secure Path (OSP and Sub-optimal Secure Path (SSP to minimize the outage probability of secrecy capacity in the presence of multiple eavesdroppers. We consider dissimilar fading at the main and wiretap link and provide detailed evaluation of the impact of Nakagami-m and Rician-K factors on the secrecy performance of WSNs. Extensive simulations are performed to validate our findings. Although the optimal scheme ensures more security, yet the sub-optimal scheme proves to be a more practical approach to secure wireless links.

  7. Frequency dependence of quantum path interference in non-collinear high-order harmonic generation

    International Nuclear Information System (INIS)

    Zhong Shi-Yang; He Xin-Kui; Teng Hao; Ye Peng; Wang Li-Feng; He Peng; Wei Zhi-Yi

    2016-01-01

    High-order harmonic generation (HHG) driven by two non-collinear beams including a fundamental and its weak second harmonic is numerically studied. The interference of harmonics from adjacent electron quantum paths is found to be dependent on the relative delay of the driving pulse, and the dependences are different for different harmonic orders. This frequency dependence of the interference is attributed to the spatial frequency chirp in the HHG beam resulting from the harmonic dipole phase, which in turn provides a potential way to gain an insight into the generation of high-order harmonics. As an example, the intensity dependent dipole phase coefficient α is retrieved from the interference fringe. (paper)

  8. Path Dependence

    DEFF Research Database (Denmark)

    Madsen, Mogens Ove

    Begrebet Path Dependence blev oprindelig udviklet inden for New Institutionel Economics af bl.a. David, Arthur og North. Begrebet har spredt sig vidt i samfundsvidenskaberne og undergået en udvikling. Dette paper propagerer for at der er sket så en så omfattende udvikling af begrebet, at man nu kan...... tale om 1. og 2. generation af Path Dependence begrebet. Den nyeste udvikling af begrebet har relevans for metodologi-diskusionerne i relation til Keynes...

  9. A changing European Security and defense architecture and its impact on Turkey

    OpenAIRE

    Yikilkan, Orhan.

    2001-01-01

    Since the 1991 Maastricht Treaty, the European Union countries have been trying to form a common security and defense identity as one facet of the European Union unification process. The efforts to create "separable but not separate" European forces within NATO have accelerated in the last three years and changed direction toward creating an autonomous "European Security and Defense Policy (ESDP)" within the framework of the EU. This policy concerns some non-EU European NATO allies, such as T...

  10. Ethics and European security

    Energy Technology Data Exchange (ETDEWEB)

    Paskins, B.

    1986-01-01

    The alliance between the United States and her NATO partners has been strained severely in the last few years. American perceptions of European disloyalty and European impressions of American assertiveness and lack of judgment have played a large part in generating tensions between the allies and emphasising the new peace movements. This book is an attempt to develop a broader understanding of the problem of European security based on Christian ethics. There are disagreements and differences of emphasis among the contributors but they have in common the view that an exclusive preoccupation with the military dimension is damagingly one-sided. Instead the contributors argue that moral and theological concerns are a vital part of the politics and mechanics of European security and must be incorporated in any effort to devise new policies for security in Europe and the West.

  11. Energy security and European Union. Proposals for the French presidency

    International Nuclear Information System (INIS)

    Mandil, C.

    2008-04-01

    This report treats of energy security and of the two related topics which are the fight against climatic change and the economic growth. The first chapter analyses the energy risks that we will have to face. It makes a difference between the long-term risks (depletion of energy resources) and the short-term risks (supply disruption). Concerning the short-term risks, it is recalled that most of the supply incidents have an internal cause and that imports can have advantages and not only drawbacks. The second chapter approaches the delicate problem of European harmonization between the speech and the action when the energy security is in concern. A conclusion of this chapter is that the 'speaking with a single voice' goal can be reached only if improvements are made in the domain of solidarity between member states. The completion of the internal energy market is therefore a priority and the mission of regulators must include the security aspect. The third chapter treats of the particular case of the relation with the Russian supplier. It suggests to work for a lower energy dependence with respect to Russia, by developing the energy efficiency, the LNG industry, the renewable energies and the nuclear energy. The fourth chapter deals with the relations with the Caspian sea surrounding countries in the perspective of gas exports towards Europe. Here again, the cooperation with Russia is of prime importance. It approaches also the problem of the gas negotiation with Turkey which requires a significant improvement of the consistency of European diplomacy in this area. The last chapter treats of the role of international organisations and of the dialogue in the domain of energy. It suggests some paths to develop the confidence between the different intervening parties. It stresses on the lack of transparency which disturbs the markets and weakens the security. (J.S.)

  12. Path Creation, Path Dependence and Breaking Away from the Path

    OpenAIRE

    Wang, Jens; Hedman, Jonas; Tuunainen, Virpi Kristiina

    2016-01-01

    The explanation of how and why firms succeed or fail is a recurrent research challenge. This is particularly important in the context of technological innovations. We focus on the role of historical events and decisions in explaining such success and failure. Using a case study of Nokia, we develop and extend a multi-layer path dependence framework. We identify four layers of path dependence: technical, strategic and leadership, organizational, and external collaboration. We show how path dep...

  13. Supporting non proliferation and global security efforts

    International Nuclear Information System (INIS)

    Pochon, E.

    2013-01-01

    CEA contributes as a major actor of France's action against nuclear proliferation and to the strengthening of nuclear security at national level as European and International levels, in particular through the support of the IAEA activities in nuclear non proliferation with the French Support Programme for the IAEA safeguards system and security with the contribution to the IAEA Nuclear Security Plan and cooperation projects with the European Commission. The CEA is a French government funded technological research organization, organized around 5 branches: Nuclear Energy, Technological Researches, Defence (DAM), Material Sciences and Life Sciences. Within the scope of its activities, CEA covers most of the research areas and techniques in nuclear non-proliferation and security. The CEA is also the advisor of the French Government on nuclear policy. Treaty monitoring and the development and implementation of non proliferation and global security programs is an important mission of DAM which rely on nuclear weapons manufacture and past testing experience. The programmes on non proliferation and global security carried out to fulfil DAM's mission cover the following areas: development of monitoring and detection methods and equipments, country profiles and nuclear stockpiles assessment, arms control instruments, proliferation resistance of nuclear fuel cycle, monitoring of nuclear tests, operation and maintenance of national detection capabilities and contribution to CTBT verification systems. (A.C.)

  14. European security framework for healthcare.

    Science.gov (United States)

    Ruotsalainen, Pekka; Pohjonen, Hanna

    2003-01-01

    eHealth and telemedicine services are promising business areas in Europe. It is clear that eHealth products and services will be sold and ordered from a distance and over national borderlines in the future. However, there are many barriers to overcome. For both national and pan-European eHealth and telemedicine applications a common security framework is needed. These frameworks set security requirements needed for cross-border eHealth services. The next step is to build a security infrastructure which is independent of technical platforms. Most of the European eHealth platforms are regional or territorial. Some countries are looking for a Public Key Infrastructure, but no large scale solutions do exist in healthcare. There is no clear candidate solution for European-wide interoperable eHealth platform. Gross-platform integration seems to be the most practical integration method at a European level in the short run. The use of Internet as a European integration platform is a promising solution in the long run.

  15. MEASURING PATH DEPENDENCY

    Directory of Open Access Journals (Sweden)

    Peter Juhasz

    2017-03-01

    Full Text Available While risk management gained popularity during the last decades even some of the basic risk types are still far out of focus. One of these is path dependency that refers to the uncertainty of how we reach a certain level of total performance over time. While decision makers are careful in accessing how their position will look like the end of certain periods, little attention is given how they will get there through the period. The uncertainty of how a process will develop across a shorter period of time is often “eliminated” by simply choosing a longer planning time interval, what makes path dependency is one of the most often overlooked business risk types. After reviewing the origin of the problem we propose and compare seven risk measures to access path. Traditional risk measures like standard deviation of sub period cash flows fail to capture this risk type. We conclude that in most cases considering the distribution of the expected cash flow effect caused by the path dependency may offer the best method, but we may need to use several measures at the same time to include all the optimisation limits of the given firm

  16. Presidential elections in the United States: implications for international and European security

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-10-01

    In conclusion it should be noted that the full implementation of D. Trump’s plans for international and European security will depend on how the declared initiatives will correspond to his real actions. Perhaps this would require more than a year, but now the world and the European community must be ready for serious structural and geopolitical changes. The presence of a number of acute problems makes the role of the United States in the process of ensuring international and European security hardly predictable.

  17. Why Europe needs a new European Security Strategy

    NARCIS (Netherlands)

    Drent, M.E.; Landman, Lennart

    2012-01-01

    Next year, the European Security Strategy: A Secure Europe in a Better World will be ten years old. Both the European Union and the world around it have changed in that time. In this Clingendael Policy Brief Margriet Drent and Lennart Landman argue that the European Union's foreign and security

  18. The Evolution of European Security: From Confrontation to Cooperation

    Science.gov (United States)

    2013-03-01

    Vasconcelos , (Paris: The European Union Institute for Security Studies, 2009), 41. 60 Ibid. 61 European Union Home Page, “Common Security and...of ESDP,” in What Ambitions for European Defense in 2020?, 2nd ed., ed. Álvaro de Vasconcelos (Paris: The European Union Institute for Security

  19. Two Generations of Path Dependence

    DEFF Research Database (Denmark)

    Madsen, Mogens Ove

      Even if there is no fully articulated and generally accepted theory of Path Dependence it has eagerly been taken up across a wide range of social sciences - primarily coming from economics. Path Dependence is most of all a metaphor that offers reason to believe, that some political, social...

  20. Security Economics and European Policy

    Science.gov (United States)

    Anderson, Ross; Böhme, Rainer; Clayton, Richard; Moor, Tyler

    In September 2007, we were awarded a contract by the European Network and Information Security Agency (ENISA) to investigate failures in the market for secure electronic communications within the European Union, and come up with policy recommendations. In the process, we spoke to a large number of stakeholders, and held a consultative meeting in December 2007 in Brussels to present draft proposals, which established most had wide stakeholder support. The formal outcome of our work was a detailed report, “Security Economics and the Internal Market”, published by ENISA in March 2008. This paper presents a much abridged version: in it, we present the recommendations we made, along with a summary of our reasoning.

  1. Evaluating and projecting the European security system

    International Nuclear Information System (INIS)

    Dean, J.

    1991-01-01

    Components of the new European security system are described taking into account the new policy making and possibilities to resolve conflicts. Programmes for political and economic integration and co-operation managed by the European Community will provide main positive content of the new European security system. An insight of the future of nuclear armaments in Europe is included together with confidence building measure and the role of NATO

  2. ASPECTS OF POLICIES AND STRATEGIES FOR CYBER SECURITY IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Ilina ARMENCHEVA

    2015-10-01

    Full Text Available Freedom and prosperity of mankind greatly depend on an innovative, safe and reliable Internet that, of course, will keep evolving. Cyber space must be protected from incidents, misuse and abuse. Handling the increasing number of threats to cyber security is a challenge that national security and the trend in the international environment face. This makes taking fast and adequate measures at national, European and international level a must. Changing national security strategies and adopting new cyber security strategies are a part of these measures.

  3. Revisiting the soft security debate: From European progress to ...

    African Journals Online (AJOL)

    Given the extended scope of security sectors falling within the ambit of soft security regional co-operation is indispensable – a phenomenon most visible in European security architecture and that of Northern Europe in particular. Not only European decision-makers, however, pursue the soft security option. As Africa entered ...

  4. SECURITY STRATEGIES OF MEMBER STATES OF THE EUROPEAN UNION FROM THE LISBON TREATY AND THE EUROPEAN SECURITY STRATEGY

    Directory of Open Access Journals (Sweden)

    PABLO RIVAS PARDO

    2017-09-01

    in mind, it is possible to study the variability of the Security Strategy in relation to four strategic guidelines: strategic self-perception, the necessity to tune these postulates with the common objectives of the European Union, the statement of threats and finally the actions projected by these strategies to face the changing environment of international security. This variability will seek the fact of the existence or nonexistence of tuning and consistency between the Security Strategies and the community positions in the matter of security and defense. The selected countries are those who have published their documents after the signing of the Treaty of Lisbon and the publication of the European Security Strategy, in other words, after2009: Austria, Bulgaria, Slovenia, Spain, Estonia, Holland, Hungary, Lithuania, UK and the Czech Republic.

  5. Security and dependability for Ambient Intelligence: Informative but busy

    NARCIS (Netherlands)

    Law, Y.W.; Havinga, Paul J.M.

    2011-01-01

    The edited volume “Security and Dependability for Ambient Intelligence‿ is a comprehensive compilation of the research outcomes of the 3 year-long 7.8 million Euro European Framework Programme 6 project SERENITY (FP6-IST-2006-27587). At a time when Stuxnet and large scale data breaches at

  6. Bypassing Russia: Nabucco project and its implications for the European gas security

    International Nuclear Information System (INIS)

    Erdogdu, Erkan

    2010-01-01

    Restrictions on CO 2 emissions, the nuclear phase-out announced by some member states, high emissions from coal-fired power plants, and barriers to rapid development of renewable generation are factors that make the European Union (EU) highly dependent on natural gas. With three non-EU countries (Russia, Algeria and Norway) currently supplying more than half the gas consumed within the EU and with projections pointing out that by 2030 internal sources will only be able to meet 25% of demand, the EU desperately looks for means to secure new sources of gas supply. In this context, the Nabucco pipeline is planned to deliver gas from Caspian and Middle East regions to the EU market. It runs across Turkey and then through Bulgaria, Romania and Hungary before connecting with a major gas hub in Austria. On paper, Nabucco project makes perfect sense, offering a new export route to the EU markets for Caspian gas producers (Azerbaijan, Turkmenistan and Kazakhstan) as well as Iran and, in time, Iraq. The project is backed by the EU and strongly supported by the United States. Perhaps most importantly, Nabucco would completely bypass Russia. This paper addresses issues surrounding Nabucco project and their implications for the European gas security. (author)

  7. European security and defense policy and its implications for Turkey

    OpenAIRE

    Özköse, Ö Faruk

    2002-01-01

    Cataloged from PDF version of article. The “European Security and Defense Policy” is an evolving process. Since the Maastricht Treaty (1991), the European Union members have been trying to constitute a common security and defense policy within the framework of Common Foreign and Security Policy, second pillar of the European Union. The efforts to create “separable but not separate” European forces within NATO have increased speed in the last years and changed direction towar...

  8. European Union security policy through strategic culture

    Directory of Open Access Journals (Sweden)

    Beriša Hatidža

    2014-01-01

    Full Text Available In this paper, we shall pay attention to the security policy of the European Union, through the strategic culture, starting from the existing various options for cooperation in the field of security and defense. Our goal is to look at the implementation of the Strategic Culture of the European Union (EU SK, research ways to improve the international position of the Union and its impact on policy cooperation and trust with other collectives. Analysis of flexible cooperation between the European Union, as well as access to special procedures in the field of security and defense policy, we will follow the ambition and capacity in implementing the same. Paper aims to introduce the idea of the European Union, which allows its members to rationally consider and check the box of options available to decision makers. In this regard, the EU seeks to build its own armed forces to protect the association of interests-investment terms. Reviewing and understanding the strategic culture of the EU by countries that are not its members can be seen as reasons for strengthening the capacity of the Union for the realization of the impact of the global security as well as predicting its future steps.

  9. Path Creation, Path Dependence and Breaking Away from the Path: Re-Examining the Case of Nokia

    OpenAIRE

    Wang, Jens; Hedman, Jonas; Tuunainen, Virpi Kristiina

    2016-01-01

    The explanation of how and why firms succeed or fail is a recurrent research challenge. This is particularly important in the context of technological innovations. We focus on the role of historical events and decisions in explaining such success and failure. Using a case study of Nokia, we develop and extend a multi-layer path dependence framework. We identify four layers of path dependence: technical, strategic and leadership, organizational, and external collaboration. We show how path dep...

  10. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  11. The European Security and Defence Policy

    DEFF Research Database (Denmark)

    Adler-Nissen, Rebecca

    2009-01-01

    The European Security and Defence Policy (ESDP), which is the operational military and civilian dimension of the Common Foreign and Security Policy (CFSP), is today one of the most dynamic areas of the European Union. However, it is only recently that the EU has acquired explicit military decision....... The Union is thus gradually emerging as an important player on the international scene, with a strategic vision, as well as diplomatic, civilian and military crisis-management instruments that complement the existing economic, commercial, humanitarian and development policies on which the EU has hitherto...... built its reputation as a ‘soft power'. Despite its rapid development, many still regard the EU as weak and ineffi cient when it comes to security and defence policy. Moreover, the EU struggles with internal divisions and has a strained relationship with NATO. Nonetheless, there are good reasons...

  12. Two Generations of Path Dependence in Economics?

    DEFF Research Database (Denmark)

    Madsen, Mogens Ove

    2010-01-01

    Even if there is no fully articulated and generally accepted theory of Path Dependence it has eagerly been taken up across a wide range of social sciences – primarily coming from economics. Path Dependence is most of all a metaphor that offers reason to believe, that some political, social...

  13. Statistical mechanics of paths with curvature dependent action

    International Nuclear Information System (INIS)

    Ambjoern, J.; Durhuus, B.; Jonsson, T.

    1987-01-01

    We analyze the scaling limit of discretized random paths with curvature dependent action. For finite values of the curvature coupling constant the theory belongs to the universality class of simple random walk. It is possible to define a non-trivial scaling limit if the curvature coupling tends to infinity. We compute exactly the two point function in this limit and discuss the relevance of our results for random surfaces and string theories. (orig.)

  14. Path dependence and creation

    DEFF Research Database (Denmark)

    Garud, Raghu; Karnøe, Peter

    This edited volume stems from a conference held in Copenhagen that the authors ran in August of 1997. The authors, aware of the recent work in evolutionary theory and the science of chaos and complexity, challenge the sometimes deterministic flavour of this work. They are interested in uncovering...... the place of agency in these theories that take history so seriously. In the end, they are as interested in path creation and destruction as they are in path dependence. This book is compiled of both theoretical and empirical writing. It shows relatively well-known industries such as the automobile...

  15. Publicity in secured transactions law: Towards a European public notice filing system for non-possessory security rights in movable assets?

    NARCIS (Netherlands)

    Hamwijk, D.J.Y.

    2014-01-01

    There is a growing call to introduce a European public notice filing system for security rights in movable goods comparable to the notice filing system of Art. 9 UCC. A proposal to this effect has been adopted in Book IX DCFR, which represents a comprehensive framework of rules for proprietary

  16. European Cyber Security Perspectives 2015

    NARCIS (Netherlands)

    Baloo, J.; Geveke, H.G.; Paulissen, W.; Vries, H. de

    2015-01-01

    Following the success of last year’s publication, we are proud to present the second edition of our European Cyber Security Perspectives report. Through this collection of articles, we aim to share our different perspectives and insights, the latest developments and achievements in the field of

  17. Non-Gaussian path integration in self-interacting scalar field theories

    International Nuclear Information System (INIS)

    Kaya, Ali

    2004-01-01

    In self-interacting scalar field theories kinetic expansion is an alternative way of calculating the generating functional for Green's functions where the zeroth order non-Gaussian path integral becomes diagonal in x-space and reduces to the product of an ordinary integral at each point which can be evaluated exactly. We discuss how to deal with such functional integrals and propose a new perturbative expansion scheme which combines the elements of the kinetic expansion with the usual perturbation theory techniques. It is then shown that, when the cutoff dependences of the bare parameters in the potential are chosen to have a well defined non-Gaussian path integral without the kinetic term, the theory becomes trivial in the continuum limit

  18. Bourdieu, International Relations and European Security

    DEFF Research Database (Denmark)

    Berling, Trine Villumsen

    2012-01-01

    Despite promising attempts to apply the sociology of Pierre Bourdieu to International Relations (IR), the field could still profit from unexplored potential in his thinking for understanding pivotal theoretical and empirical puzzles. This article takes the failure to fully grasp the paradigmatic...... case of European security after the Cold War as an example of how IR would benefit from reformulating not only its empirical research questions but also several of its central conceptual building blocks with the aid of Bourdieusian sociology. The separation between theory and practice...... and the overemphasis on military power and state actors blind IR from seeing the power struggles that reshaped European security. Instead, a Bourdieusian reformulation adds new types of agency, focuses on the social production of forms of power, and stresses the processual rather than the substantive character...

  19. Role of Global Food Security in the Common Agrarian Policy of the European Union

    Directory of Open Access Journals (Sweden)

    Igor N. Shcherbak

    2014-01-01

    Full Text Available The author devoted his research to the role of the global food security in the priorities of the Common Agricultural Policy of the European Union (CAP. The research sheds light on the parameters of the Common Agricultural Policy and the basic steps on the path of its reform. The research demonstrates that the priorities of the EC are mainly concentrated on achieving food security for the member-states of the EC, its population and the interests of the agricultural sector. The modern challenges to the Global Food Security (global food crises of 2007-2009, acute food shortages and hunger in crises regions of Africa and chronic malnutrition are placed high on the agenda of the CAP. In this situation, the EU is trying in the interests of stabilization of the world agricultural market to solve simultaneously the tasks of providing assistance for development and mitigation of the threats to the Global Food security. The deepening rift between the strategy of the CAP oriented towards promotion of agricultural export and real contribution of the EC to the Global Food Security and assistance for development is becoming more and more the most «vulnerable» place of the CAP.

  20. UNDER WHOSE UMBRELLA? THE EUROPEAN SECURITY ARCHITECTURE

    Directory of Open Access Journals (Sweden)

    Teodor Lucian Moga

    2010-12-01

    Full Text Available The tragic events which occurred during the ‘90s in the Balkans have reiterated the need for the European Union (EU to assume a much more assertive role in managing security concerns in Europe, including the development of European defence capabilities. In 1998, at Saint Malo, Tony Blair and Jacques Chirac launched the European Security and Defence Policy (ESDP. This project has been generated due to the EU’s need to adopt a strategic framework within which to develop a global defence and security component, as well as due to a growing necessity for the EU to contribute effectively to North Atlantic Treaty Organization (NATO and United Nations (UN efforts of conducting defence, international crisis management and peacekeeping operations at an international level in conflict-prone areas. In recent years, ESDP has undergone a spectacular evolution, being now among the major issues discussed in Brussels. However, the creation of the ESDP has been greeted with caution by some NATO members being perceived primarily as a threat to the integrity of the North Atlantic Treaty Organization. The purpose of this paper is to examine the difficulties the ESDP has encountered since its inception and also to what extent it has affected the EU-NATO and the EU-US nexus.

  1. Green paper. Towards a European strategy for the security of energy supply

    International Nuclear Information System (INIS)

    2001-01-01

    This Green Paper is the response to an observable fact: Europe growing future energy dependence. Its aim is to initiate a debate on the security of energy supply, an issue that is still very much alive. Three main points emerge from the Green Paper: the European Union will become increasingly dependent on external energy sources; enlargement will not change the situation; based on current forecasts, dependence will reach 70 % in 2030; the European Union has very limited scope to influence energy supply conditions (it is essentially on the demand side that the EU can intervene, mainly by promoting energy saving in buildings and the transport sector); at present, the European Union is not in a position to respond to the challenge of climate change and to meet its commitments, notably under the Kyoto Protocol. In these circumstances, the Commission would like the debate on the future strategy to be structured around the following principal questions: 1. Can the European Union accept an increase in its dependence on external energy sources without compromising its security of supply and European competitiveness? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on the others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Are tax and State aid policies in the energy sector an obstacle to competitiveness in the European Union or not? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investments be guaranteed? 5. Should more reserves be stockpiled, as already done for oils, and should other energy sources be included, such as gas or coal? Does the risk of physical disruption to energy supplies justify more onerous measures for

  2. Green paper. Towards a European strategy for the security of energy supply

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This Green Paper is the response to an observable fact: Europe growing future energy dependence. Its aim is to initiate a debate on the security of energy supply, an issue that is still very much alive. Three main points emerge from the Green Paper: the European Union will become increasingly dependent on external energy sources; enlargement will not change the situation; based on current forecasts, dependence will reach 70 % in 2030; the European Union has very limited scope to influence energy supply conditions (it is essentially on the demand side that the EU can intervene, mainly by promoting energy saving in buildings and the transport sector); at present, the European Union is not in a position to respond to the challenge of climate change and to meet its commitments, notably under the Kyoto Protocol. In these circumstances, the Commission would like the debate on the future strategy to be structured around the following principal questions: 1. Can the European Union accept an increase in its dependence on external energy sources without compromising its security of supply and European competitiveness? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on the others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Are tax and State aid policies in the energy sector an obstacle to competitiveness in the European Union or not? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investments be guaranteed? 5. Should more reserves be stockpiled, as already done for oils, and should other energy sources be included, such as gas or coal? Does the risk of physical disruption to energy supplies justify more onerous measures for

  3. Energy security and European Union. Proposals for the French presidency; Securite energetique et Union Europeenne. Propositions pour la presidence francaise

    Energy Technology Data Exchange (ETDEWEB)

    Mandil, C

    2008-04-15

    This report treats of energy security and of the two related topics which are the fight against climatic change and the economic growth. The first chapter analyses the energy risks that we will have to face. It makes a difference between the long-term risks (depletion of energy resources) and the short-term risks (supply disruption). Concerning the short-term risks, it is recalled that most of the supply incidents have an internal cause and that imports can have advantages and not only drawbacks. The second chapter approaches the delicate problem of European harmonization between the speech and the action when the energy security is in concern. A conclusion of this chapter is that the 'speaking with a single voice' goal can be reached only if improvements are made in the domain of solidarity between member states. The completion of the internal energy market is therefore a priority and the mission of regulators must include the security aspect. The third chapter treats of the particular case of the relation with the Russian supplier. It suggests to work for a lower energy dependence with respect to Russia, by developing the energy efficiency, the LNG industry, the renewable energies and the nuclear energy. The fourth chapter deals with the relations with the Caspian sea surrounding countries in the perspective of gas exports towards Europe. Here again, the cooperation with Russia is of prime importance. It approaches also the problem of the gas negotiation with Turkey which requires a significant improvement of the consistency of European diplomacy in this area. The last chapter treats of the role of international organisations and of the dialogue in the domain of energy. It suggests some paths to develop the confidence between the different intervening parties. It stresses on the lack of transparency which disturbs the markets and weakens the security. (J.S.)

  4. Pedestrian paths: why path-dependence theory leaves health policy analysis lost in space.

    Science.gov (United States)

    Brown, Lawrence D

    2010-08-01

    Path dependence, a model first advanced to explain puzzles in the diffusion of technology, has lately won allegiance among analysts of the politics of public policy, including health care policy. Though the central premise of the model--that past events and decisions shape options for innovation in the present and future--is indisputable (indeed path dependence is, so to speak, too shallow to be false), the approach, at least as applied to health policy, suffers from ambiguities that undercut its claims to illuminate policy projects such as managed care, on which this article focuses. Because path dependence adds little more than marginal value to familiar images of the politics of policy--incrementalism, for one--analysts might do well to put it on the back burner and pursue instead "thick descriptions" that help them to distinguish different degrees of openness to exogenous change among diverse policy arenas.

  5. The Evolution of the European Security Policy

    Directory of Open Access Journals (Sweden)

    Vasilica Negrut

    2010-06-01

    Full Text Available The process of development of the European Union’s security dimension has known a spectacular evolution in the past years, passing from political consultation to establishing objectives, then commonactions and positions; at a practical level, the Petersburg measures, carried on initially by the Western European Union as an armed branch of the European Union, have been replaced by actions of implication ofthe Union in managing some conflicts. The Lisbon Treaty confirms the commitments of the member states and mentions the fact that the European Union will dispose of the necessary measures for the defense of its objectives and to contribute to world peace and stability.

  6. The Spanish Contribution to European Security and Defense

    Directory of Open Access Journals (Sweden)

    Félix Sanz

    2000-05-01

    Full Text Available The author examines Spain’s material and intellectual contributions to European security and defense. In the first place, he provides an overview of the changes in the personal qualifications of the Spanish Armed Forces and in the mentality of the military officials in adapting to the work of international organisms and to cooperation in broadlydefined schemes of security. On this point, he highlights the Spanish contribution to the missions carried out by the United Nations, OSCE and the WEU. With respect to NATO, Félix Sanz analyzes the Spanish participation before and after this country’s integrationin military structure and in the operative plans of the Alliance. Sanz also underscores the contribution made to multinational forces such as Eurocorps, Eurofor/Euromarfor, the Italian-Spanish amphibious force and, in the future, the European air group. He discussesSpain’s support for other bilateral forums for security, in particular the relation with the United States. In the area of intellectual contributions, the author underlines this country’sinterest in bringing about a convergence of defense forces, Spain’s support for a multinational military and its willingness to collaborate in the design of European defense.

  7. The security of energy supply. The European Commission's Green Paper stimulates debate

    International Nuclear Information System (INIS)

    2000-01-01

    The growing dependence of the European Union (EU) on external supplies of energy is the central focus of a ''Green Paper'' issued in late November 2000 by the Commission of the European Communities in Brussels. Entitled ''Towards a European Strategy for the Security of Energy Supply'', the Green Paper is intended to stimulate debate on the EU's energy policies and strategies. European member States are ''interdependent'', the Green Paper states, ''both because of climate change issues and the creation of the internal energy market. Any energy policy decision taken by a Member State will inevitably have repercussions on the functioning of the market in other Member States. Energy policy has assumed a new, Community dimension.'' Three main points emerge from the Green Paper: The EU will become increasingly dependent on external energy sources; its enlargement will not change this situation. Based on current forecasts, energy dependence will reach 70% by the year 2030. - The EU has very limited scope to influence energy supply conditions; it is essentially on the demand side that the EU can intervene, mainly by promoting energy saving in buildings and the transport sector. - The EU presently is not in a position to respond to the challenge of climate change and to meet its commitments, notably under the Kyoto Protocol. Featured here is the Executive Summary of the Green Paper

  8. The Arab Uprisings and Euro-Mediterranean Security: The Regional Security Agenda of the European Union

    Directory of Open Access Journals (Sweden)

    Schima Viktoria Labitsch

    2014-12-01

    Full Text Available The 2010 Arab uprisings led to profound changes in the political landscape of the Southern Mediterranean, and came at a time of staggering Euro-Mediterranean relations. With prevailing turmoil and violence in Europe’s closest proximity, the Euromed relationship – heavily dominated by security objectives and concerns in the past – is facing new social, political and economic challenges. This work analyses what challenges have made it onto the security agenda of the European Union in response to the uprisings in Tunisia, Libya and Egypt between December 2010 and 2013. It does so by analysing the discourse of three institutions: the European Commission, the European Council and the Council of Ministers. Accordingly, it argues that security in the Euro-Mediterranean context may be analysed in the framework of the wider constructivist Copenhagen school of security studies, treating threats as politically constructed in the process of securitization. It emphasizes the different degrees of institutional involvement in framing the regional security agenda, and the vast application of security logic to migration and mobility as well as its absence in areas of biological and chemical weapons, extremism and weapons of mass destruction. This work’s final argument is that whilst the overall level of securitization throughout the three years remains low and partially inconsistent with the security priorities before 2010, the EU exhibited a particularly strong regional focus on Libya as well as a thematic one on migration and external borders.

  9. Europe gas security. From dependence to interdependence

    International Nuclear Information System (INIS)

    2010-01-01

    This report proposes a diagnostic and draws perspectives for Europe's gas dependence. In a first part, and considering gas as an energy source facing the challenges of the struggle against climate change, it outlines the rather high level of gas resources, their concentration in few countries, and therefore the need to reinforce partnership with these countries. It also outlines the uncertainty about future gas consumption due to new environment policies. The wide spectrum of scenarios entails needs to be reconsidered. The second part deals with the implications of the relationship between Gazprom and the Russian Federation. The third part discusses the European energy policy which tries to combine competition and energy security. Then, four scenarios are proposed and studied for the future of the interdependence between the European Union and the Russian Federation: energy crisis (producer's power), status quo (under-capacity), solidarity between the UE and Russia, and agreement on the climate (globalization of energy exchanges)

  10. Security challenges to Central European bordering territories: view from the Transcarpatian region of Ukraine

    Directory of Open Access Journals (Sweden)

    Myroslava Lendel

    2015-12-01

    Full Text Available The factor of integral Central European space determines the formation of common challenges to the region's security. One part of them is not visualized or not perceived in the capital cities. These threats may be most vividly traced in the Transcarpathian region of Ukraine, taking into consideration the fact that it borders with the abovementioned countries. These are ethnopolitical threats, caused by the multiethnic population of the region, energy dependence, threats of social economic peripherization of Central European bordering territories, informational influence on the population, different attitudes to Ukraine-Russia conflict.

  11. Path Dependency of High Pressure Phase Transformations

    Science.gov (United States)

    Cerreta, Ellen

    2017-06-01

    At high pressures titanium and zirconium are known to undergo a phase transformation from the hexagonal close packed (HCP), alpha-phase to the simple-hexagonal, omega-phase. Under conditions of shock loading, the high-pressure omega-phase can be retained upon release. It has been shown that temperature, peak shock stress, and texture can influence the transformation. Moreover, under these same loading conditions, plastic processes of slip and twinning are also affected by similar differences in the loading path. To understand this path dependency, in-situ velocimetry measurements along with post-mortem metallographic and neutron diffraction characterization of soft recovered specimens have been utilized to qualitatively understand the kinetics of transformation, quantify volume fraction of retained omega-phase and characterize the shocked alpha and omega-phases. Together the work described here can be utilized to map the non-equilibrium phase diagram for these metals and lend insight into the partitioning of plastic processes between phases during high pressure transformation. In collaboration with: Frank Addesssio, Curt Bronkhorst, Donald Brown, David Jones, Turab Lookman, Benjamin Morrow, Carl Trujillo, Los Alamos National Lab.; Juan Pablo Escobedo-Diaz, University of New South Wales; Paulo Rigg, Washington State University.

  12. Non-Standard Monetary Policies Implemented By The European Central Bank After The Financial Crisis

    Directory of Open Access Journals (Sweden)

    Meryem Filiz Baştürk

    2017-07-01

    Full Text Available The financial crisis which began in the U.S. in 2007 influenced all economies on a global scale followingthe collapse of Lehman Brothers in September 2008. As a response to the crisis, central banksstarted to implement non-standard monetary policy tools as well as short-term interest rates alsoknown as standard policy tools in order to help monetary policy transmission channels work effectively.The European Central Bank (ECB implemented non-standard monetary policies as in additionto the standard policy tools during this period. The non-standard monetary policies introducedby the ECB were different from those implemented by other central banks (Fed, Bank of England interms of implementation and results. Firstly, the policies of the ECB were not specific to one singlecountry. Secondly, the banking system was the major source of finance in Europe, which had an impacton the policies. In this regard, the ECB introduced a policy of enhanced credit support consistingof five main elements in order to maintain price stability over the medium term following the crisis.By 2010, public debt in some member countries of the European Union reached high levels, requiringthem to take additional measures. The Securities Markets Programme was introduced to that end.Initially focusing on the debt securities of Greece, Ireland, and Portugal, the Securities Markets Programmewas expanded in August 2011 to cover the debt securities of Italy and Spain. In addition, twoLong-term Refinancing Operations (LTROs were introduced. This article presents a descriptive analysisof the non-standard monetary policy tools introduced by the ECB following the financial crisis.However, the monetary policy implemented in the Euro zone is not specific to one single country, andevery country has a different financial structure, both of which limit the effectiveness of the policiesimplemented. The changing structure of the monetary policy implemented in the aftermath of the crisisaims to

  13. Learning from history : Changes and path dependency in the social housing sector in Austria, France and the Netherlands (1889-2008), Chapter 3

    NARCIS (Netherlands)

    Lévy-Vroelant, C.; Reinprecht, C.; Wassenberg, F.

    2008-01-01

    European social housing history can be interpreted through the combination of two complementary notions: path dependency and change. Socio-political experiences and practices at the national, regional or municipal level are potentially powerful determinants of historical developments—an idea known

  14. Path integral solution for some time-dependent potential

    International Nuclear Information System (INIS)

    Storchak, S.N.

    1989-12-01

    The quantum-mechanical problem with a time-dependent potential is solved by the path integral method. The solution is obtained by the application of the previously derived general formula for rheonomic homogeneous point transformation and reparametrization in the path integral. (author). 4 refs

  15. European perspectives on security research

    CERN Document Server

    2011-01-01

    Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.

  16. Path integral density matrix dynamics: a method for calculating time-dependent properties in thermal adiabatic and non-adiabatic systems.

    Science.gov (United States)

    Habershon, Scott

    2013-09-14

    We introduce a new approach for calculating quantum time-correlation functions and time-dependent expectation values in many-body thermal systems; both electronically adiabatic and non-adiabatic cases can be treated. Our approach uses a path integral simulation to sample an initial thermal density matrix; subsequent evolution of this density matrix is equivalent to solution of the time-dependent Schrödinger equation, which we perform using a linear expansion of Gaussian wavepacket basis functions which evolve according to simple classical-like trajectories. Overall, this methodology represents a formally exact approach for calculating time-dependent quantum properties; by introducing approximations into both the imaginary-time and real-time propagations, this approach can be adapted for complex many-particle systems interacting through arbitrary potentials. We demonstrate this method for the spin Boson model, where we find good agreement with numerically exact calculations. We also discuss future directions of improvement for our approach with a view to improving accuracy and efficiency.

  17. Path integral density matrix dynamics: A method for calculating time-dependent properties in thermal adiabatic and non-adiabatic systems

    International Nuclear Information System (INIS)

    Habershon, Scott

    2013-01-01

    We introduce a new approach for calculating quantum time-correlation functions and time-dependent expectation values in many-body thermal systems; both electronically adiabatic and non-adiabatic cases can be treated. Our approach uses a path integral simulation to sample an initial thermal density matrix; subsequent evolution of this density matrix is equivalent to solution of the time-dependent Schrödinger equation, which we perform using a linear expansion of Gaussian wavepacket basis functions which evolve according to simple classical-like trajectories. Overall, this methodology represents a formally exact approach for calculating time-dependent quantum properties; by introducing approximations into both the imaginary-time and real-time propagations, this approach can be adapted for complex many-particle systems interacting through arbitrary potentials. We demonstrate this method for the spin Boson model, where we find good agreement with numerically exact calculations. We also discuss future directions of improvement for our approach with a view to improving accuracy and efficiency

  18. HOW RESILIENT IS THE EUROPEAN SOCIAL MODEL? FLEXIBILITY OR/AND SECURITY?

    Directory of Open Access Journals (Sweden)

    Georgeta GHEBREA

    2017-12-01

    Full Text Available Our paper aims to assess the resilience of the European social model (ESM against recent challenges. Resilience depends on effectively managing the contradictions of the ESM. Flexicurity is an example of managing contradictions between security and flexibility. The contribution of flexicurity to the resilience of the ESM is determined by the development of the abilities necessary for resilience. Our research evaluates the performance of these abilities using statistical and document analyses. The results show that flexicurity policies perform satisfactorily relative to their resilience abilities. Still, the ability to respond is less effective due to significant differences among the Member States (regarding the implementation of flexicurity policies and to insufficient openness and functionality of the European labour market. Nevertheless, the European flexicurity policies redefine the ESM by adding a touch of a more mobile, autonomous and free-spirited approach, thus representing a solution to both preserve valuable tradition and modernise the ESM.

  19. Security Guarantees and Nuclear Non-Proliferation

    International Nuclear Information System (INIS)

    Bruno Tertrais

    2011-01-01

    The purpose of this paper is to discuss the value of 'security guarantees', that is, positive security assurances that include a formal or informal defense commitment, in preventing nuclear proliferation. It demonstrates that such guarantees have proven to be a very effective instrument in preventing States from going nuclear. It would thus seem logical to reinforce or extend them. However, this path is fraught with obstacles and dilemmas

  20. Security Guarantees and Nuclear Non-Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Bruno Tertrais

    2011-07-01

    The purpose of this paper is to discuss the value of 'security guarantees', that is, positive security assurances that include a formal or informal defense commitment, in preventing nuclear proliferation. It demonstrates that such guarantees have proven to be a very effective instrument in preventing States from going nuclear. It would thus seem logical to reinforce or extend them. However, this path is fraught with obstacles and dilemmas

  1. SecureCore Software Architecture: Trusted Path Application (TPA) Requirements

    National Research Council Canada - National Science Library

    Clark, Paul C; Irvine, Cynthia E; Levin, Timothy E; Nguyen, Thuy D; Vidas, Timothy M

    2007-01-01

    .... A high-level architecture is described to provide such features. In addition, a usage scenario is described for a potential use of the architecture, with emphasis on the trusted path, a non-spoofable user interface to the trusted components of the system. Detailed requirements for the trusted path are provided.

  2. K shortest paths in stochastic time-dependent networks

    DEFF Research Database (Denmark)

    Nielsen, Lars Relund; Pretolani, Daniele; Andersen, Kim Allan

    2004-01-01

    A substantial amount of research has been devoted to the shortest path problem in networks where travel times are stochastic or (deterministic and) time-dependent. More recently, a growing interest has been attracted by networks that are both stochastic and time-dependent. In these networks, the ...... present a computational comparison of time-adaptive and a priori route choices, pointing out the effect of travel time and cost distributions. The reported results show that, under realistic distributions, our solution methods are effective.......A substantial amount of research has been devoted to the shortest path problem in networks where travel times are stochastic or (deterministic and) time-dependent. More recently, a growing interest has been attracted by networks that are both stochastic and time-dependent. In these networks...

  3. A European Perspective on Security Research

    Science.gov (United States)

    Liem, Khoen; Hiller, Daniel; Castex, Christoph

    Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.

  4. US oil dependency and energy security

    International Nuclear Information System (INIS)

    Noel, P.

    2002-01-01

    The three papers of this document were written in the framework of a seminar organized the 30 may 2002 by the IFRI in the framework of its program Energy and Climatic Change. The first presentation deals with the american oil policy since 1980 (relation between the oil dependence and the energy security, the Reagan oil policy, the new oil policy facing the increase of the dependence). The second one deals with the US energy security (oil security, domestic energy security, policy implications). The last presentation is devoted to the US oil dependence in a global context and the problems and policies of international energy security. (A.L.B.)

  5. International and European Security Law

    Directory of Open Access Journals (Sweden)

    Jonathan Herbach

    2012-02-01

    Full Text Available Security law, or more comprehensively conflict and security law, on the international level represents the intersection of three distinct but interrelated fields: international humanitarian law (the law of armed conflict, jus in bello, the law of collective security (most identified with the United Nations (UN system, jus ad bellum and arms control law (including non-proliferation. Security in this sense is multifaceted - interest security, military security and, as is often referred to in the context of the EU, human security. As such, the law covers a wide range of specific topics with respect to conflict, encompassing the use of force, including choice of weapons and fighting techniques, extending to the rules applicable in peacekeeping and peace enforcement, and yet also dictating obligations outside the context of conflict, such as safeguarding and securing dual-use materials (those with both peaceful and military applications to prevent malicious use.

  6. Physical Layer Security Using Two-Path Successive Relaying

    Directory of Open Access Journals (Sweden)

    Qian Yu Liau

    2016-06-01

    Full Text Available Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.

  7. Liberalisation and energy security in the European Union. Success and questions

    International Nuclear Information System (INIS)

    Clastres, Cedric; Locatelli, Catherine

    2012-09-01

    The energy environment of the European Union as well as its own internal situation have undergone profound changes. The energy security of member states is therefore an important issue that should be examined. This security concerns gas and electricity markets, with infrastructures, long-term contracts, lack of investment and with the increasing use of natural gas to generate electricity. Energy market players have to manage security concerns in these two markets in order to supply socially and economically essential commodities. In this article, we examine two main topics. The first is related to the European Union's capacity to solve the problem of security of supply by finding internal solutions. The second concerns external security of supply. With the upstream structure of the gas market, a problem of investing in trans-national gas pipelines exists, besides relations with gas suppliers outside the EU. (authors)

  8. Calculation of the mean path length of the Epstein frame under non-sinusoidal excitations using the double Epstein method

    International Nuclear Information System (INIS)

    Marketos, Philip; Zurek, Stan; Moses, Anthony J.

    2008-01-01

    This paper discusses the effect of non-sinusoidal excitation on the mean path length of the Epstein frame. Two different steels, a non-oriented (NO) steel and a high-permeability grain-oriented (HGO) electrical steel have been tested under pure sinusoidal and non-sinusoidal excitations and the mean path length of the Epstein frame has been re-calculated. Results indicate that the actual mean path of the Epstein frame depends not only on the material permeability and anisotropy but also on the peak flux density and magnetising frequency. The amount of distortion of the excitation frequency also has an effect on the value of the actual mean path length of the Epstein frame

  9. Latvia in the System of European Territorial Security: a View from the Inside and Outside

    Directory of Open Access Journals (Sweden)

    Lanko Dmitry

    2015-03-01

    Full Text Available This article focuses on Latvian contribution to European security, which, for the purposes of this study, is understood as a territorial system of regional security. Such system is a combination of interconnected institutions with Latvian participation operating in the field of security, Latvian cooperation with other European countries in the field of security, and the European perception of major security challenges and threats (that Latvia may or may not agree with. A systemic approach to studying the role of Latvia in the territorial system of European security requires a solid theoretical framework. The theories of international relations discussed in this article fall into two categories: those where territorial security systems are viewed as a product of external factors, and those that focus on internal regional factors. In this article, the authors rely on a variety of methods, including those that are characteristic of classical theories of international relations (such as realism and liberalism, and those employed in social constructivism studies. It is concluded that Latvian cooperation with institutions and countries of the territorial system of European security is rather limited, which indicates either a lack of the country’s integration into the system or a crisis of the system itself. An important result of the study is the validation of a systemic approach to studying regional security systems. This angle proves particularly useful in identifying crises of territorial systems of regional security in various regions of the world.

  10. Security of energy supply: Comparing scenarios from a European perspective

    International Nuclear Information System (INIS)

    Costantini, V.; Markandya, A.; Vicini, G.

    2007-01-01

    This policy compares different results from a set of energy scenarios produced by international energy experts, in order to analyse projections on increasing European external energy dependence and vulnerability. Comparison among different scenarios constitutes the basis of a critical review of existing energy security policies, suggesting alternative or complementary future actions. According to the analysis, the main risks and negative impacts in the long term could be the increasing risk of collusion among exporters due to growing dependence of industrialized countries and insufficient diversification; and a risk of demand/supply imbalance, with consequent instability for exporting regions due to insufficient demand, and lack of infrastructures due to insufficient supply. Cooperation with exporting countries enhancing investments in production capacity, and with developing countries in order to reinforce negotiation capacity of energy-importing countries seem to be the most effective policies at international level. (author)

  11. Security of energy supply: Comparing scenarios from a European perspective

    International Nuclear Information System (INIS)

    Costantini, Valeria; Gracceva, Francesco; Markandya, Anil; Vicini, Giorgio

    2007-01-01

    This paper compares different results from a set of energy scenarios produced by international energy experts, in order to analyse projections on increasing European external energy dependence and vulnerability. Comparison among different scenarios constitutes the basis of a critical review of existing energy security policies, suggesting alternative or complementary future actions. According to the analysis, the main risks and negative impacts in the long term could be the increasing risk of collusion among exporters due to growing dependence of industrialized countries and insufficient diversification; and a risk of demand/supply imbalance, with consequent instability for exporting regions due to insufficient demand, and lack of infrastructures due to insufficient supply. Cooperation with exporting countries enhancing investments in production capacity, and with developing countries in order to reinforce negotiation capacity of energy-importing countries seem to be the most effective policies at international level

  12. Securing Quality in Journalism on a European Scale. An Infrastructure Analysis.

    OpenAIRE

    Anger, Heike

    2010-01-01

    The study at hand shows that in the course of European integration not only politics have been transnationalised and Europeanised but also the infrastructures securing quality in journalism. Infrastructures in journalism can be defined as those institutions and initiatives whose activities are shaping journalism regarding its quality without directly being a part of the media production: European journalism training, European media industry and trade associations and European associations of ...

  13. The European Union as a Security Actor: Moving Beyond the Second Pillar

    Directory of Open Access Journals (Sweden)

    Kamil Zwolski

    2009-04-01

    Full Text Available It is suggested in this article that there is a discrepancy between, on the one hand, literature that focuses on the European Union (EU as a security actor and, on the other, contemporary security studies literature. This difference concerns the fact that the literature on the EU as a security actor treats security in a narrower sense than how it is approached in the literature on security studies. Over the past few decades, security studies literature has begun to fully acknowledge that the concept of security has broadened beyond traditional ‘hard’ security concerns and can encompass many different issues, for example the security implications of climate change. However, the literature on the EU as a security actor very often associates security only with the second pillar of the EU’s organisational structure; in particular the intergovernmental cooperation embodied by the Common Foreign and Security Policy (CFSP and the European Security and Defence Policy (ESDP. The main purpose of this article is to utilise the broader security studies approach to security as a means to expand the understanding of security in the context of the EU’s performance on the international stage. This is important because it allows the Union’s �����actorness’ in the field of security to be examined in a more holistic manner.

  14. Human rights or security? Positions on asylum in European Parliament speeches

    DEFF Research Database (Denmark)

    Frid-Nielsen, Snorre Sylvester

    2018-01-01

    parties’ general ‘right-left’ preferences, and duration of EU membership. Generally, MEPs from Central and Eastern Europe and the European People's Party take up pro-security stances. Wordfish was effective and valid, confirming the relevance of automated content analysis for studying the EU.......-2014, scaling MEPs along a unidimensional policy space. Debates on asylum predominantly concern positions for or against European Union (EU) security measures. Surprisingly, national party preferences for EU integration were not the dominant factor. The strongest predictors of MEPs' positions are their national...

  15. Elements of Social Security in 6 European Countries

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security in 6 European Countries contains an overview of important benefit schemes in Denmark, Sweden, Finland, Germany, Great Britain and the Nether-lands. The schemes are categorized according to common sets of criteria and compared. Stylized cases illustrate the impact...

  16. Solar array deployment analysis considering path-dependent behavior of a tape spring hinge

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kyung Won; Park, Young Jin [KAIST, Daejeon (Korea, Republic of)

    2015-05-15

    Solar array deployment analysis is conducted considering the path-dependent nonlinear behavior of tape spring hinge. Such hinges offer many advantages over rigid hinges; they are self-deployable, self-locking, lightweight, and simple. However, they show strongly nonlinear behavior with respect to rotation angle, making deployment analysis difficult. To accurately consider the characteristics of tape spring hinges for deployment analysis, a path-dependent path identification (PI) method for tracing the previous path of the moment is introduced. To analyze the deployment motion, the governing equation for solar array deployment is derived within the framework of Kane's dynamic equation for three deployable solar panels. The numerical solution is compared with the Recurdyn's multi-body dynamics analysis solution using experimentally measured moment-rotation profiles. Solar array deployment analysis is conducted by considering and not considering the path-dependent PI method. This simulation example shows that the proposed path-dependent PI method is very effective for accurately predicting the deployment motion.

  17. Past and Current Paths to European Union Accession: Romania and Turkey a Comparative Approach

    Directory of Open Access Journals (Sweden)

    Tatiana-Camelia Dogaru

    2015-05-01

    Full Text Available Several decades ago, leaders of six European countries with an inclusive vision of Europe and strong courage started a construction without precedent, the European Union. The remarkable construction evolved not only concerning the number of the Member States, but also in terms of institutional and functional development. Nowadays, the European Union is one of the most important changing factor concerning the governance and the policy-making process at European level and not only, and there is no doubt that the EU will continue to grow as an increasing number of countries express interest in membership. This paper reveals in a comparative perspective the path to European Union Accession, and is based on documentary analysis, using strategy-level documents of the countries and the Progress Reports the European Commission provided during the past enlargement.

  18. The institutional dimension of the European Union’s combat transnational crime, as one of the main threats to European security

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-06-01

    Full Text Available The article investigates the role of the leading institutions of European Union in the fight with transnational crime. It was determined that the problem of transnational crime occupies one of the central places in the field of European security. This is due to the fact that the overall level of crime in Europe in recent years has increased several times compared with the beginning of the XXI century. It was found that today transnational crime is becoming a serious obstacle on the way of building stability and sustainable development. It is nothing less than terrorism, illegal immigration affects the state of European security, creating the new center of a danger in Europe. It is proved that each institution has its own specific of struggle, but the unifying factor is that all of them are working on the same thing – the elimination of the threat in order to increase the level of security in Europe in general and in EU in particular. Substantiated the thesis that it is important to further developing of close and constructive cooperation between the main European institutions, as well as mutual exchange of information and data regarding the recent changes and the manifestations of transnational crime. This will give an opportunity to strengthen the European security system, as well as implement common practical methods of counteraction. It was determined that the actualization of the practical component in the framework of EU institutional dimension in the future will contribute to strengthening European.

  19. The European cooperative approach to securing critical information infrastructure.

    Science.gov (United States)

    Purser, Steve

    2011-10-01

    This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparedness, security and resilience' and further elaborated by the Communication of May 2011 on critical Information infrastructure protection 'Achievements and next steps: towards global cyber-security'. After explaining the need for pan-European cooperation in this area, the CIIP Action Plan is explained in detail. Finally, the current state of progress is summarised together with the proposed next steps.

  20. Random paths with curvature dependent action

    International Nuclear Information System (INIS)

    Ambjoern, J.; Durhuus, B.

    1986-11-01

    We study discretized random paths with a curvature dependent action. The scaling limits of the corresponding statistical mechanical models can be constructed explicitly and are either usual Brownian motion or a theory where the correlations of tangents are nonzero and described by diffusion on the unit sphere. In the latter case the two point function has an anomalous dimension η = 1. (orig.)

  1. US oil dependency and energy security; Dependance petroliere et securite energetique americaine

    Energy Technology Data Exchange (ETDEWEB)

    Noel, P [Institut francais des Relations Internationals, 75 - Paris (France); [Universite Pierre Mendes-France-IEPE-CNRS, 38 - Grenoble (France)

    2002-07-01

    The three papers of this document were written in the framework of a seminar organized the 30 may 2002 by the IFRI in the framework of its program Energy and Climatic Change. The first presentation deals with the american oil policy since 1980 (relation between the oil dependence and the energy security, the Reagan oil policy, the new oil policy facing the increase of the dependence). The second one deals with the US energy security (oil security, domestic energy security, policy implications). The last presentation is devoted to the US oil dependence in a global context and the problems and policies of international energy security. (A.L.B.)

  2. Crossing borders: Security and privacy issues of the European e-passport

    NARCIS (Netherlands)

    Hoepman, J.H.; Hubbers, E.; Jacobs, B.P.F.; Oostdijk, M.D.; Wichers Schreur, R.

    2008-01-01

    The first generation of European e-passports will be issued in 2006. We discuss how borders are crossed regarding the security and privacy erosion of the proposed schemes, and show which borders need to be crossed to improve the security and the privacy protection of the next generation of

  3. Ranking paths in stochastic time-dependent networks

    DEFF Research Database (Denmark)

    Nielsen, Lars Relund; Andersen, Kim Allan; Pretolani, Daniele D.

    2014-01-01

    In this paper we address optimal routing problems in networks where travel times are both stochastic and time-dependent. In these networks, the best route choice is not necessarily a path, but rather a time-adaptive strategy that assigns successors to nodes as a function of time. Nevertheless, in...

  4. Language Education and ELT Materials in Turkey from the Path Dependence Perspective

    Science.gov (United States)

    Isik, Ali

    2011-01-01

    This paper examines the role of traditional language teaching methodology on the current language teaching methodology in Turkey from the Path Dependence Theory perspective. Path Dependence claims that the past continues shaping the present. Similarly, traditional approaches still shape foreign/second language education. Turkey has inherited a…

  5. A Feedback-Based Secure Path Approach for Wireless Sensor Network Data Collection

    Science.gov (United States)

    Mao, Yuxin; Wei, Guiyi

    2010-01-01

    The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. Therefore, how to preserve secure data collection is an important issue to wireless sensor networks. In this paper, we propose a novel approach of secure data collection for wireless sensor networks. We explore secret sharing and multipath routing to achieve secure data collection in wireless sensor network with compromised nodes. We present a novel tracing-feedback mechanism, which makes full use of the routing functionality of wireless sensor networks, to improve the quality of data collection. The major advantage of the approach is that the secure paths are constructed as a by-product of data collection. The process of secure routing causes little overhead to the sensor nodes in the network. Compared with existing works, the algorithms of the proposed approach are easy to implement and execute in resource-constrained wireless sensor networks. According to the result of a simulation experiment, the performance of the approach is better than the recent approaches with a similar purpose. PMID:22163424

  6. A feedback-based secure path approach for wireless sensor network data collection.

    Science.gov (United States)

    Mao, Yuxin; Wei, Guiyi

    2010-01-01

    The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. Therefore, how to preserve secure data collection is an important issue to wireless sensor networks. In this paper, we propose a novel approach of secure data collection for wireless sensor networks. We explore secret sharing and multipath routing to achieve secure data collection in wireless sensor network with compromised nodes. We present a novel tracing-feedback mechanism, which makes full use of the routing functionality of wireless sensor networks, to improve the quality of data collection. The major advantage of the approach is that the secure paths are constructed as a by-product of data collection. The process of secure routing causes little overhead to the sensor nodes in the network. Compared with existing works, the algorithms of the proposed approach are easy to implement and execute in resource-constrained wireless sensor networks. According to the result of a simulation experiment, the performance of the approach is better than the recent approaches with a similar purpose.

  7. A Feedback-Based Secure Path Approach for Wireless Sensor Network Data Collection

    Directory of Open Access Journals (Sweden)

    Guiyi Wei

    2010-10-01

    Full Text Available The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. Therefore, how to preserve secure data collection is an important issue to wireless sensor networks. In this paper, we propose a novel approach of secure data collection for wireless sensor networks. We explore secret sharing and multipath routing to achieve secure data collection in wireless sensor network with compromised nodes. We present a novel tracing-feedback mechanism, which makes full use of the routing functionality of wireless sensor networks, to improve the quality of data collection. The major advantage of the approach is that the secure paths are constructed as a by-product of data collection. The process of secure routing causes little overhead to the sensor nodes in the network. Compared with existing works, the algorithms of the proposed approach are easy to implement and execute in resource-constrained wireless sensor networks. According to the result of a simulation experiment, the performance of the approach is better than the recent approaches with a similar purpose.

  8. The Non-Proliferation Treaty increases security

    International Nuclear Information System (INIS)

    Kahiluoto, K.

    1995-01-01

    Extension of the Nuclear Non-Proliferation Treaty indefinitely was a historic decision. The Treaty is the most extensive international agreement on security policy to date; now its obligations have become a permanent part of international justice. Moreover, the NPT represents a political and moral obligation. Through the NPT, the international community has made a permanent commitment to restrict the proliferation of nuclear weapons. Increasing pressures will be applied to the few countries still outside the NPT, making it more likely that these countries will eventually change their views. The likelihood of regional bans on nuclear weapons in the Middle East and in Asia, too, will increase. The Treaty promotes the establishment of new nuclear-free zones. The nuclear-free zone in Latin America - the countries covered by the Tlatelolco Treaty - is already very close to its full implementation. Finland is firmly committed to the obligations of the Non-Proliferation Treaty. The NPT Conference of 1995 was among the first international meetings in which Finland participated, and took an active role, as a Member State of the European Union. (orig.)

  9. Classical Solutions of Path-Dependent PDEs and Functional Forward-Backward Stochastic Systems

    Directory of Open Access Journals (Sweden)

    Shaolin Ji

    2013-01-01

    Full Text Available In this paper we study the relationship between functional forward-backward stochastic systems and path-dependent PDEs. In the framework of functional Itô calculus, we introduce a path-dependent PDE and prove that its solution is uniquely determined by a functional forward-backward stochastic system.

  10. Web Interface Security Vulnerabilities of European Academic Repositories

    Directory of Open Access Journals (Sweden)

    Matus Formanek

    2017-02-01

    Full Text Available The given analysis summarizes the status quo of the level of security of web interfaces of selected European academic repositories in the field of library and information science. It focuses on the presence and qualities of the secure HTTPS protocol via SSL/TLS protocols. The security of the transmitted data is particularly important in the network environment of the Internet, especially if log-in user data is transmitted. Disclosure may have a direct impact on saved digital objects and their metadata which together represent the most valuable parts of systems of digital libraries and repositories. Furthermore, the paper points to the most noticeable vulnerabilities of protocols of web interfaces and presents practical recommendations for the expert public. These may contribute to the increase of the level of security of the discussed systems. The authors base their proposals on the currently available scientific publications and scientific articles about the given topic.

  11. European Non Destructive Examination Forum (ENDEF)

    International Nuclear Information System (INIS)

    Deffrennes, M.; Engl, G.; Estorff, U. von

    1998-01-01

    Non destructive examination (NDE) during fabrication, Pre-service inspection (PSI) and In service inspection (ISI) are considered key issues for the safe use of nuclear energy. They are important elements of plant lifetime management which is a critical item in decision making on nuclear policies. The European non destructive examination forum (ENDEF) founded by European Commission provides a platform for open discussion between representatives of the European industries with the purpose to establish cooperation between EU, Central and Eastern European Countries and New Independent States in the field of NDE and ISI

  12. Sustainable development and energy in the european union

    International Nuclear Information System (INIS)

    Roth, A.

    2013-01-01

    Sustainable development represents a core objective of the European Union, being embodied through out its major polices. In the field of energy, the EU objectives, commonly known as ä20-20-20ö initiative, aim at ensuring a competitive, secure and sustainable energy for European households and industries by reducing the emissions of green house gases, an efficient use on energy and increasing the use of renewable energy. The present paper draws a review on the most important aspects of EU energy policy, its measures, results and costs from the perspective of security of supply, competitiveness of price and green house gases emissions. The aim is to highlight the trade offs which are involved in the orientation towards a sustainable path of the energetic sector of the European Union. (authors)

  13. European integration and cooperation, basic vectors of European space of freedom, security and justice

    Directory of Open Access Journals (Sweden)

    Ion Balaceanu

    2013-03-01

    Full Text Available European integration and cooperation, basic vectors of European space of freedom, security and justiceAbstract: The European countries joining to the Schengen area had the effect elimination of internal border controls between Schengen member countries, that use permenent provisions of the Schengen acquis, being a single external border where operational checks are carried out according to a set of clear rules on immigration, visas, the asylum, as well as some decisions concerning police cooperation, judicial or customs. This means that the border crossing can be made at any time through many places, and citizens of member countries who are traveling in the Schengen area must present a valid ID. Overcoming internal border can be equated with a journey through the country.

  14. ENERGY IN THE CONTEXT OF THE PRESENT CHALLENGES TO THE EUROPEAN COMMON SECURITY AND DEFENCE POLICY

    Directory of Open Access Journals (Sweden)

    Gabriel ANDRUSEAC

    2014-10-01

    Full Text Available The Common Security and Defence Policy is a part of the European Union’s Common Foreign and Security Policy (CFSP and establishes the policy framework for the institutional structures and military instruments which have to deal with the security challenges in Europe’s geopolitical neighborhood. The article aims to identify and analyze the role of energy as one of the present challenges to the European Common Security and Defence Policy in the context of the recent events in the world economy.

  15. Electron mean free path from angle-dependent photoelectron spectroscopy of aerosol particles

    Energy Technology Data Exchange (ETDEWEB)

    Goldmann, Maximilian; Miguel-Sánchez, Javier; West, Adam H. C.; Yoder, Bruce L.; Signorell, Ruth, E-mail: rsignorell@ethz.ch [Laboratory of Physical Chemistry, ETH Zürich, Vladimir-Prelog-Weg 2, 8093 Zürich (Switzerland)

    2015-06-14

    We propose angle-resolved photoelectron spectroscopy of aerosol particles as an alternative way to determine the electron mean free path of low energy electrons in solid and liquid materials. The mean free path is obtained from fits of simulated photoemission images to experimental ones over a broad range of different aerosol particle sizes. The principal advantage of the aerosol approach is twofold. First, aerosol photoemission studies can be performed for many different materials, including liquids. Second, the size-dependent anisotropy of the photoelectrons can be exploited in addition to size-dependent changes in their kinetic energy. These finite size effects depend in different ways on the mean free path and thus provide more information on the mean free path than corresponding liquid jet, thin film, or bulk data. The present contribution is a proof of principle employing a simple model for the photoemission of electrons and preliminary experimental data for potassium chloride aerosol particles.

  16. Path entanglement of photons by non-local bunching

    International Nuclear Information System (INIS)

    Eisenberg, H.; Hodelin, J.; Khoury, G.; Bouwmeester, D.

    2005-01-01

    Full Text:Path entangled photon states can be used to overcome classical limits on the accuracy of interferometric measurements such as the diffraction limit. These states are superpositions of finding n photons in one out of two (or more) paths. Using stimulated parametric down-conversion, we propose and demonstrate a method for generating heralded multiphoton path entanglement, without applying post-selection. parametric down-conversion is relatively easy to produce compared to pure Fock states as demanded by other proposals. By a special coincidence detection at one down converted arm, the photons of the second arm non-locally bunch into the desired state. Entanglement in photon number is created between two polarization modes rather than two paths. A polarization beam-splitter and a 2 wave plate can translate between the two representations. The experimental generation of a two-photon path entangled state was detected by observing interference at half the photon wavelength. The scheme is generally extendable to higher photon numbers

  17. Path dependence in social and psychological risk factors for dementia

    Directory of Open Access Journals (Sweden)

    Hiroko Matsuoka

    Full Text Available Abstract This article focuses on social and psychological risk factors for Alzheimer's disease, dementia, and cognitive impairment and presents some key points for prevention in developing countries based on previous studies, a social science theory, and our preliminary survey. Previous population-based studies found that educational and occupational attainment, income, participation in social and mental activities, and psychological distress were associated with dementia risk. According to the theory of path dependence, earlier factors largely determine successive ones, where education is one of these early experiences in life. Our preliminary survey suggested that education sets a path that several psychosocial risk factors are dependent on. The expansion of basic education is indispensable. Resources for prevention should be concentrated on individuals with a low level of education. In order to break from a path creating self-reinforcement of risk factors, it is necessary to implement early and active interventions.

  18. Water dependency and water exploitation at global scale as indicators of water security

    Science.gov (United States)

    De Roo, A. P. J.; Beck, H.; Burek, P.; Bernard, B.

    2015-12-01

    A water dependency index has been developed indicating the dependency of water consumption from upstream sources of water, sometimes across (multiple) national border. This index is calculated at global scale using the 0.1 global LISFLOOD hydrological modelling system forced by WFDEI meteorological data for the timeframe 1979-2012. The global LISFLOOD model simulates the most important hydrological processes, as well as water abstraction and consumption from various sectors, and flood routing, at daily scale, with sub-timesteps for routing and subgrid parameterization related to elevation and landuse. The model contains also options for water allocation, to allow preferences of water use for particular sectors in water scarce periods. LISFLOOD is also used for the Global Flood Awareness System (GloFAS), the European Flood Awareness System (EFAS), continental scale climate change impact studies on floods and droughts. The water dependency indicator is calculated on a monthly basis, and various annual and multiannual indicators are derived from it. In this study, the indicator will be compared against water security areas known from other studies. Other indicators calculated are the Water Exploitation Index (WEI+), which is a commonly use water security indicator in Europe, and freshwater resources per capita indicators at regional, national and river basin scale. Several climate scnearios are run to indicate future trends in water security.

  19. Path dependence and independent utility regulation

    DEFF Research Database (Denmark)

    Ibsen, Christian Lyhne; Skovgaard Poulsen, Lauge

    2007-01-01

    The establishment of the Danish independent regulatory authorities for the energy and telecommunications sectors was based upon EU directives as part of their liberalisation process. Following the concepts of transaction costs and path dependency this article analyses differences in independence...... between the two authorities - the Danish Energy Regulatory Authority (Energitilsynet) and the National IT and Telecommunications Agency (IT- og Telestyrelsen) respectively. We find that the state's negligible interest in the energy sector until the 1970s formed the basis for strong energy companies...

  20. Power learning or path dependency? Investigating the roots of the European Food Safety Authority.

    Science.gov (United States)

    Roederer-Rynning, Christilla; Daugbjerg, Carsten

    2010-01-01

    A key motive for establishing the European Food Safety Authority (EFSA) was restoring public confidence in the wake of multiplying food scares and the BSE crisis. Scholars, however, have paid little attention to the actual political and institutional logics that shaped this new organization. This article explores the dynamics underpinning the making of EFSA. We examine the way in which learning and power shaped its organizational architecture. It is demonstrated that the lessons drawn from the past and other models converged on the need to delegate authority to an external agency, but diverged on its mandate, concretely whether or not EFSA should assume risk management responsibilities. In this situation of competitive learning, power and procedural politics conditioned the mandate granted to EFSA. The European Commission, the European Parliament and the European Council shared a common interest in preventing the delegation of regulatory powers to an independent EU agency in food safety policy.

  1. Localization Decisions of Entrepreneurs: The Role of Path Dependency and Market Forces

    Science.gov (United States)

    Pylak, Korneliusz; Majerek, Dariusz

    2017-10-01

    The purpose of this research is to determine the role of path dependency and market forces in the localization decisions of entrepreneurs from different industries. We hypothesize that most industries develop new entities based on the number of companies from the same industry that already exist in a region. We also hypothesize that entrepreneurs create new entities based on related industries operating within the same knowledge pool. To test these hypotheses, we used the machine learning decision tree method. The input variables are the number of companies from 86 industries located in 2,531 communities in Poland in 2009. The target values are the number of new companies from these industries created in the years 2009-2015. The principal results show that localization decisions are mostly based on demand and supply industries, in which manufacturing industries play crucial role. Path dependency appears in less than half of the industries’ models and thus is not the main factor influencing decisions regarding the creation of new companies. The highest share of path-dependent industries is in manufacturing sector, but the degree of the dependence is lower than in the service sector. The service sector seems to be the least path-dependent, as services usually serve other industries. Competition in industries is a rare factor in new company creation; however, if it appears, it usually shrinks the industry.

  2. Rethinking energy security in Asia. A non-traditional view of human security

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  3. MIGRATION PROCESSES "EAST-WEST" IN THE CONTEXT OF THE EUROPEAN SYSTEM OF ECONOMIC SECURITY

    Directory of Open Access Journals (Sweden)

    S. V. Ryazantsev

    2016-01-01

    Full Text Available The article refl ects the infl uence of the migration processes to the economic security of European Union. The article underlines most common economical risks in case if there is an increase of the volume of migration and describes the ways how to reduce those risks.The main conclusions obtained from the results of the study, can be structured as follows: trends and consequences of the migration crisis in the European Union are defi ned by the set of reasons that are due on the one hand the policy of transparency being implemented by individual countries, making the whole European Union is the center of attraction of immigrants (primarily from the MENA countries and other hand, the intense and growing fl ow of migrants creates regional threats, including the European Union's economic security; the problem of ensuring the economic security of the European Union in the context of the impact of the migration crisis is most actual issue at the moment and the main reason is that the accumulation of the fl ow of migrants to the strongest European economy – Germany. In this case, not only Germany, but also France (and until recently UK had to improve the economic and social consequences of migration and also to implement measures aimed to recover from fi nancial crisis of the last few years, the consequences of which to date are shown in the many social and economic areas of the European Union; addressing the problem with migration crisis in the European Union seems to use a special system of measures, in which on the one hand realized containment of migration fl ows and on the other hand held solutions aimed at the assimilation of migrants in multicultural environment with full adoption of the latest socio-economic, democratic and moral values specifi c to European societies.

  4. U.S. Social Security at 75 years: an international perspective.

    Science.gov (United States)

    Hoskins, Dalmer D

    2010-01-01

    Is the historical development of the Old-Age, Survivors, and Disability Insurance (OASDI) program unique or similar to the development of social security programs in other industrialized countries? The U.S. Social Security program was adopted some 40 to 50 years after those of most Western European nations. The United States thus had the opportunity to choose from a number of models and clearly chose to follow the classic social insurance path of such countries as Austria, France, and Germany, which in 1935 already had considerable experience administering earnings-related, employer/worker-financed old-age pension programs. Although based on the traditional social insurance model, OASDI evolved in certain unique ways, including the rejection over the course of succeeding decades of any reliance on general revenue financing, the importance attached to long-range (75-year) actuarial projections, and the relative generosity of benefits for survivors and dependents.

  5. Isothermal chemical denaturation of large proteins: Path-dependence and irreversibility.

    Science.gov (United States)

    Wafer, Lucas; Kloczewiak, Marek; Polleck, Sharon M; Luo, Yin

    2017-12-15

    State functions (e.g., ΔG) are path independent and quantitatively describe the equilibrium states of a thermodynamic system. Isothermal chemical denaturation (ICD) is often used to extrapolate state function parameters for protein unfolding in native buffer conditions. The approach is prudent when the unfolding/refolding processes are path independent and reversible, but may lead to erroneous results if the processes are not reversible. The reversibility was demonstrated in several early studies for smaller proteins, but was assumed in some reports for large proteins with complex structures. In this work, the unfolding/refolding of several proteins were systematically studied using an automated ICD instrument. It is shown that: (i) the apparent unfolding mechanism and conformational stability of large proteins can be denaturant-dependent, (ii) equilibration times for large proteins are non-trivial and may introduce significant error into calculations of ΔG, (iii) fluorescence emission spectroscopy may not correspond to other methods, such as circular dichroism, when used to measure protein unfolding, and (iv) irreversible unfolding and hysteresis can occur in the absence of aggregation. These results suggest that thorough confirmation of the state functions by, for example, performing refolding experiments or using additional denaturants, is needed when quantitatively studying the thermodynamics of protein unfolding using ICD. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. Nuclear energy and the Green Paper of the European Commission 'An European strategy for sustainable, competitive and secure energy'

    International Nuclear Information System (INIS)

    Metes, Mircea

    2006-01-01

    At present the energy is for European Union officials an issue of top priority. In the beginning of 2006 the natural gas crisis between Russia and Ukraine remembered menacingly to the Europeans that energy supply of the continent depends decisively on importation from other geographic areas and that these importation raise risks of a great variety. In addition to the power problems, disastrous effects on the economy, human life and eco-systems appeared to have the climate changes produced by fossil fuel burning. Consequently, a common energetic policy of Europe should be targeted at three main objectives: sustainability, competitiveness and security of supply. Six directions of action were identified: 1. EU must finalize the construction of internal European gas and electricity market; 2. EU should ensure that its energy market guaranties the security of supply under a solidary policy of the member states; 3. It is necessary that a large debate to have place about different sources of energy including the problems of costs and impact on climatic change, security and supply competitiveness and sustainability; 4. EU should approach the climatic change issues in agreement with the objectives established at Lisbon conference aiming at placing EU in the forefront of technological and scientific progress; 5. A strategic plan concerning the energy technology; 6. A common foreign policy in the field of energy. It is worthy to stress that the present Green Paper of EU has a manifestly different position concerning the nuclear energy with respect to the prior Green Paper of November 2000. While, in 2000 the EU Commission viewed the nuclear energy as being 'in limbo', in the 2006 version the Commission declared the nuclear energy as the most important source of power in Europe without CO 2 emissions. It is stated that all the energy options should be kept open while the Europe states have the right to establish their own energy mix, which they consider optimal, and in which

  7. Simulating security of supply effects of the Nabucco and South Stream projects for the European natural gas market

    Energy Technology Data Exchange (ETDEWEB)

    Dieckhoener, Caroline

    2010-12-15

    Due to the increasing European import dependency, significant additional natural gas volumes will be required. In addition to the Nord Stream pipeline, the Nabucco and South Stream pipeline are projects planned for the next decade to provide further gas supplies to the European market. As one of the European Union's energy policies' foci is security of supply, the question can be raised if and how these projects contribute to this objective not only in terms of diversification but also in case of supply disruptions such as occurred in 2009 during the Russia-Ukraine gas crisis. This paper discusses the impact of these two major gas import pipeline projects on the South-Eastern Europe gas supply and analyzes their effects on gas flows and marginal cost prices in general and in case of gas supply disruptions via Ukraine in a model-based analysis with the European natural gas infrastructure and dispatch model TIGER. (orig.)

  8. Importance of security and socialization in europeans life

    Directory of Open Access Journals (Sweden)

    Diana Elena Şerb

    2017-01-01

    Full Text Available The purpose of this research is to examine the importance of safety and socialization in the lives of individuals. The influence of agents of socialization (school, family, friends are manifested as differences in preferences, feelings and thoughts of people. The article is structured in two parts. The first part presents the knowledge in the field, but in the context of Maslow's hierarchy of needs. In the second part is carried out an research among Europeans about some aspect of their lives: how they spend their free time, the feeling of attachment to the community, a sense of security and availability to communicate personal matters to their group of friends. The research method was investigating the secondary sources (database obtained from the survey from a site specializing in the analysis of living conditions of Europeans - European Social Survey. After the reception and processing of results in Excel and SPSS we obtained a general conclusion that people need to socialize, to be part of a group and feel safe.

  9. European cooperation in the field of security and defence. International Relation theories perspective

    Directory of Open Access Journals (Sweden)

    Jacek Czaputowicz

    2014-06-01

    Full Text Available The paper discusses various theoretical explanations of the European cooperation in the field of security and defence. According to realist explanations this cooperation was a response to external evolutions in the international system, i.e. changes in polarity and distribution of power. Liberals say that it was rather due to internal factors. Constructivists argue that it was a result of elites’ socialisation, while according to Pierre Bourdieu’s field theory, it was caused by civil servants and military staff at the policy implementation level. The paper argues that external factors underlined by realists were decisive, i.e. America’s decreasing involvement in European security.

  10. Brexit na perspectiva do Path Dependency

    OpenAIRE

    Giorgio Romano Schutte

    2018-01-01

    Esta pesquisa analisou o Brexit em uma perspectiva histórica, focando a conturbada relação entre a Europa continental e o Reino Unido ao longo do século XX, com ênfase no período pós Segunda Guerra Mundial. Foi utilizado o conceito de path dependency para argumentar sobre o papel de fatores históricos e decisões do passado, embora tomados em outras circunstâncias, ainda com força para influenciar o presente, para entender o Brexit. A premissa básica que será apresentada no ensaio é que o Rein...

  11. Reparametrization in the path integral over finite dimensional manifold with a time-dependent metric

    International Nuclear Information System (INIS)

    Storchak, S.N.

    1988-01-01

    The path reparametrization procedure in the path integral is considered using the methods of stochastic processes for diffusion on finite dimensional manifold with a time-dependent metric. the reparametrization Jacobian has been obtained. The formulas of reparametrization for a symbolic presentation of the path integral have been derived

  12. Strengthening the European Union Climate and Energy Package to build a low carbon, competitive and energy secure european union

    Energy Technology Data Exchange (ETDEWEB)

    Guerin, Emmanuel; Spencer, Thomas

    2011-10-11

    Immediate action to strengthen the European Union Climate and Energy Package (EU CEP) is needed to ensure Europe's sustained growth, competitiveness and energy security. Indeed, the current 20% emissions reduction target is too low to reach the European long-term goal of reducing emissions by at least 80% by 2050 at acceptable costs. But the EU CEP is also inefficient to address sustainable potential competitiveness losses and carbon leakages in some carbon intensive industries, and most importantly to boost fully the competitiveness of firms producing low-carbon products and services. Moving to 30% by 2020 could induce significant long-term GDP gains and only marginal GDP short-term costs, increase the competitiveness of European firms producing innovative low-carbon technologies, and reduce both final energy consumption and EU energy dependency. But for these objectives to be met, the contents of policies to reach this 30% target is as important as the target itself. There are three main areas in which the EU CEP needs strengthening: (1) Improvement of the energy efficiency of the existing building stocks, and limitation of the absolute level of energy consumption in the transport sector are needed to reach the 20% energy efficiency target. Binding targets should only be used when absolutely necessary and when helpful. (2) From an economic, environmental and political perspective, setting a stringent European Union Emission Trading System (EU ETS) 2030 cap between -45 and -50% from 2005 levels is probably the most relevant, efficient, and realistic option in the short term. It would increase the predictability of the carbon price signal, and therefore the credibility of the regulator. Banking would ensure that this stringent mid-term target translates into a short-term increase of the carbon price. (3) In some cases, direct public financial support is justified and efficient: to overcome market failures and non-market barriers; to support innovation in low

  13. Strengthening the European Union Climate and Energy Package to build a low carbon, competitive and energy secure european union

    International Nuclear Information System (INIS)

    Guerin, Emmanuel; Spencer, Thomas

    2011-01-01

    Immediate action to strengthen the European Union Climate and Energy Package (EU CEP) is needed to ensure Europe's sustained growth, competitiveness and energy security. Indeed, the current 20% emissions reduction target is too low to reach the European long-term goal of reducing emissions by at least 80% by 2050 at acceptable costs. But the EU CEP is also inefficient to address sustainable potential competitiveness losses and carbon leakages in some carbon intensive industries, and most importantly to boost fully the competitiveness of firms producing low-carbon products and services. Moving to 30% by 2020 could induce significant long-term GDP gains and only marginal GDP short-term costs, increase the competitiveness of European firms producing innovative low-carbon technologies, and reduce both final energy consumption and EU energy dependency. But for these objectives to be met, the contents of policies to reach this 30% target is as important as the target itself. There are three main areas in which the EU CEP needs strengthening: (1) Improvement of the energy efficiency of the existing building stocks, and limitation of the absolute level of energy consumption in the transport sector are needed to reach the 20% energy efficiency target. Binding targets should only be used when absolutely necessary and when helpful. (2) From an economic, environmental and political perspective, setting a stringent European Union Emission Trading System (EU ETS) 2030 cap between -45 and -50% from 2005 levels is probably the most relevant, efficient, and realistic option in the short term. It would increase the predictability of the carbon price signal, and therefore the credibility of the regulator. Banking would ensure that this stringent mid-term target translates into a short-term increase of the carbon price. (3) In some cases, direct public financial support is justified and efficient: to overcome market failures and non-market barriers; to support innovation in low

  14. Political dimension of European constitutionalism

    Directory of Open Access Journals (Sweden)

    Kaplánová Patricia

    2015-04-01

    Full Text Available Author in the article tries to analyse different elements of document called European Constitution. Analysis is supported with theoretical framework of federalism, presented by Brezovšek. Authors is playing with idea of (confederal and international organization elements of European Constitution and their mix. They are also trying to set some connections between so called common European identity as necessary condition to give legitimacy to the European Constitution. This became important question after „votes of non-confidence“ to the European Constitution in France, despite it should be addressed already before. However, European Constitution is important document on the path of European integration and lack of support to it will slow down this process of widening and deepening European ties.

  15. Multi-rate path-following control for unmanned air vehicles

    NARCIS (Netherlands)

    Guerreiro Tome Antunes, D.J.; Silvestre, C.J.; Cunha, R.

    2008-01-01

    A methodology is provided to tackle the path-following integrated guidance and control problem for unmanned air vehicles with measured outputs available at different rates. The path-following problem is addressed by defining a suitable non-linear path dependent error space to express the vehicle’s

  16. THE FOREIGN AND SECURITY POLICIES OF THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Anand Menon

    2003-09-01

    Full Text Available In only a decade the European Union has moved from being a new kid on the block in terms of foreign and security policies to being a high profile and surprisingly effective international actor. Certainly, it has failed to match the ambitions of some of its most enthusiastic proponents. Certainly, too, European publics know next to nothing about what the Union does in the international realm. It is because of this that, despite their potential and their effectiveness to date, EU policies in this sphere were widely derided as failures following the moment when the attacks of 11 September 2001 shook the western world to its core. The Convention on the Future of Europe and subsequent intergovernmental conference look set to make significant institutional changes to the Union’s foreign and security policy systems. In undertaking these reforms, Convention members, and national governments are doubtless motivated by the laudable objective of enabling the Union to do more on the international stage. One can only hope that these motives notwithstanding, they do not simply propose reforms for their own sake and, in the process, undermine a system that, to the surprise of many, has continued to function respectably in an ever more complex and ever more dangerous world.

  17. Institutional change in European natural gas markets and implications for energy security: Lessons from the German case

    International Nuclear Information System (INIS)

    Westphal, Kirsten

    2014-01-01

    This article focuses on institutional change in the German gas market driven by EU internal market and climate policies. It argues that institutional change has functional externalities for energy security. The German gas market provides a useful case study, as Germany is the biggest continental gas market, a major hub and transport country which has largely privatised, unbundled and separated its natural gas undertakings. Transition is ongoing, tending towards an internal market. Inter/national natural gas economics is in flux. Institutional evolution has repercussions for corporate and market structures, the operating of the system and the realization of transactions. Changes in the institutional framework crucially affect energy security, which is often associated with institutional stability. On the basis of this case study, it is argued herein that the security of natural gas supplies should be reexamined in the context of the developments described above, since overall the institutional changes in natural gas security lag behind the EU’s internal natural gas market development. - Highlights: • EU natural gas market regulation primarily aims to establish competitive markets. • German/EU regulatory approach has externalities for supply security. • Institutional changes and breaks with path dependencies take place in Germany/the EU. • Institutional change results in increasing uncertainty and complexity. • Subsequent change in perceptions and expectations may destabilise trade relations

  18. Data security in Intelligent Transport Systems

    Directory of Open Access Journals (Sweden)

    Tomas Zelinka

    2012-10-01

    Full Text Available Intelligent Transport Services expect availability of the secure seamless communications solutions typically covering widely spread areas. Different ITS solutions require different portfolio of telecommunications service quality. These parameters have to correspond with ITS service performance parameters required by specific service. Even though quite extensive range of public wireless data services with reasonable coverage are provided, most of them are provided with no guaranteed quality and security. ITS requirements can be in most parameters easier reached if multi-path communications systems are applied core solution is combined with both public as well as private ones where and when it is needed. Such solution requires implementation of relevant flexible system architecture supported by the efficient decision processes. This paper is concentrated the telecommunications security issues relevant to the ITS wide area networking. Expected level of security varies in dependence on relevant ITS service requirements. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure (C2I or other vehicles (C2C progressively grow. Such trend upsurges the fatal problems appearance probability in case security of the wide area networks is not relevantly treated. That is reason why relevant communications security treatment becomes crucial part of the ITS solution. Besides of available "off shelf" security tools we present solution based on non-public universal identifier with dynamical extension (time and position dependency as an autonomous variables and data selection according to actor role or category. Presented results were obtained within projects e-Ident1, DOTEK2 and SRATVU3.

  19. Energy and non-traditional security (NTS) in Asia

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  20. The green paper 'towards a European strategy for the security of energy supply'

    International Nuclear Information System (INIS)

    Laponche, B.; Tillerson, K.

    2001-01-01

    The Green Paper, 'Towards a European Strategy for the Security of Energy Supply' was adopted by the European Commission on the 20. of November, 2000 (COM(2000)769 final). At this occasion, the Commission launched a public debate on this strategic document. On the 21. of June 2001, a Public Hearing on Security of energy supply in Europe, on the basis of the Green Paper, was organised by the Committee on Industry, External Trade, Research and Energy of the European Parliament. Bernard Laponche was among the six experts participating to the Hearing and presented the following paper, prepared with Kenya Tillerson. This presentation is organised in three chapters: I - Comments on the Green Paper; II - Energy efficiency potentials; III - Conclusions and Recommendations. Chapter I shows that under the heading of the security of supply, the Green paper elaborates and proposes a global energy strategy taking into account environmental and internal market issues and constraints. This leads to recommendations for a common energy policy for Europe based, as first priority, on a demand policy, i.e. energy efficiency on the demand side. If the necessity of such a policy is clearly stated, the Green paper remains weak on the quantitative objectives, due to the lack of contrasted energy forecast scenarios, as well as on the means of a vigorous energy efficiency policy at European Level. The issue of energy efficiency potentials at European Union level is examined in Chapter II, in the light of the poor information which can be extracted from the energy scenarios presented by the European Commission in various publications. A comparison of energy consumption indicators in France and the European Union leads to a rough estimate of a potential for energy demand efficiency by 2020 of the order of 280 Mtoe on final energy consumption, for the European Union. Chapter III underlines the merits of the Green Paper which are a clear-sighted analysis and a well defined main recommendation

  1. Strain path dependency in metal plasticity

    NARCIS (Netherlands)

    Viatkina, E.M.; Brekelmans, W.A.M.; Geers, M.G.D.

    2003-01-01

    A change in strain path has a significant effect on the mechanical response of metals. Strain path change effects physically originate from a complex microstructure evolution. This paper deals with the contribution of cell structure evolution to the strain path change effect. The material with cells

  2. Path probability distribution of stochastic motion of non dissipative systems: a classical analog of Feynman factor of path integral

    International Nuclear Information System (INIS)

    Lin, T.L.; Wang, R.; Bi, W.P.; El Kaabouchi, A.; Pujos, C.; Calvayrac, F.; Wang, Q.A.

    2013-01-01

    We investigate, by numerical simulation, the path probability of non dissipative mechanical systems undergoing stochastic motion. The aim is to search for the relationship between this probability and the usual mechanical action. The model of simulation is a one-dimensional particle subject to conservative force and Gaussian random displacement. The probability that a sample path between two fixed points is taken is computed from the number of particles moving along this path, an output of the simulation, divided by the total number of particles arriving at the final point. It is found that the path probability decays exponentially with increasing action of the sample paths. The decay rate increases with decreasing randomness. This result supports the existence of a classical analog of the Feynman factor in the path integral formulation of quantum mechanics for Hamiltonian systems

  3. Non-proliferation and security: synergy and differences

    International Nuclear Information System (INIS)

    Joly, J.

    2013-01-01

    Operators of nuclear facilities put in place both physical and organisational means to meet in a comprehensive way the requirements associated with Nuclear Non-Proliferation, Safety and Security. The common aim is to protect man and the environment from ionising radiation. The approaches for meeting these requirements have real similarities, but also differences which need to be respected in order to develop an appropriate synergy for obtaining the best possible level of safety, security and non-proliferation. This article aims to show the provisions that have been taken with regard to non-proliferation, security and safety which complement and reinforce each other.The paper is followed by the slides of the presentation. (author)

  4. Security of energy supply under the laws of the European Union / European Community; Energieversorgungssicherheit im Recht der Europaeischen Union, Europaeischen Gemeinschaft

    Energy Technology Data Exchange (ETDEWEB)

    Proefrock, M.C.

    2007-07-01

    Security of supply is defined as the availability and reliability of energy supply at acceptable prices. By security of energy supply we mean a globally large supply of reliable, affordable, clean energy. By virtue of its nature security of supply in the energy sector primarily requires making provisions for the future through exploration, innovation, research, diversification and investments in technology. Energy politics takes place in a tension field defined by the goals of economic efficiency, sustainability and security of supply. In the past there have been repeated shifts within this triad of goals. The task for a rational energy policy is to reconciliate these goals in a meaningful way. European energy policy is understood to comprise all sovereign measures taken by the European Union in the energy sector, in particular measures that impact on the supply and demand for energy resources. Energy law serves, or should serve, to bring energy policy to realisation and therefore presupposes the existence of the latter. Energy policy means the figuration of an economy's energy sector in such a manner that the present and future demand of the economic region is covered.

  5. The path dependence of district manager decision-space in Ghana

    NARCIS (Netherlands)

    Kwamie, Aku; Dijk, van Han; Ansah, Evelyn K.; Agyepong, Irene Akua

    2016-01-01

    The district health system in Ghana today is characterized by high resource-uncertainty and narrow decision-space. This article builds a theory-driven historical case study to describe the influence of path-dependent administrative, fiscal and political decentralization processes on development

  6. The European dimension in non-proliferation

    International Nuclear Information System (INIS)

    Krause, J.

    1996-01-01

    Europe was for decades the focal point of efforts to prevent or constrain nuclear proliferation and the first region in which non-proliferation efforts failed. Paper deals with current proliferation problems in Europe, namely, diversion of weapons, diversion from dismantling, production over-capacity, security concerns. Legal instruments against proliferation in Europe described here include development of international norms; instruments of security assurance and cooperation; disarmament assistance; fissile material management; assistance in creating export control systems; improving and harmonizing export controls for dual-purpose items. Problems in implementing non-proliferation instruments are described separately

  7. ASEAN’s Path to Regional Autonomy: Lessons Learned from the European Union

    Science.gov (United States)

    2016-04-04

    ASEAN. ASEAN’s Path to Regional Autonomy 12 Both the 1997 Asian Financial Crisis and ASEAN expansion to Myanmar made it clear that something...From - To) 04/04/2016 Master’s of Military Studies SEP 2015 -APR 2016 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER ASEAN’s Path to Regional Autonomy ...greater autonomy by enhancing military interoperability, making ASEAN the primary hub for diplomatic arrangements with non-members, transitioning to a

  8. The path dependency theory: analytical framework to study institutional integration. The case of France.

    Science.gov (United States)

    Trouvé, Hélène; Couturier, Yves; Etheridge, Francis; Saint-Jean, Olivier; Somme, Dominique

    2010-06-30

    The literature on integration indicates the need for an enhanced theorization of institutional integration. This article proposes path dependence as an analytical framework to study the systems in which integration takes place. PRISMA proposes a model for integrating health and social care services for older adults. This model was initially tested in Quebec. The PRISMA France study gave us an opportunity to analyze institutional integration in France. A qualitative approach was used. Analyses were based on semi-structured interviews with actors of all levels of decision-making, observations of advisory board meetings, and administrative documents. Our analyses revealed the complexity and fragmentation of institutional integration. The path dependency theory, which analyzes the change capacity of institutions by taking into account their historic structures, allows analysis of this situation. The path dependency to the Bismarckian system and the incomplete reforms of gerontological policies generate the coexistence and juxtaposition of institutional systems. In such a context, no institution has sufficient ability to determine gerontology policy and build institutional integration by itself. Using path dependence as an analytical framework helps to understand the reasons why institutional integration is critical to organizational and clinical integration, and the complex construction of institutional integration in France.

  9. European Climate - Energy Security Nexus. A model based scenario analysis

    International Nuclear Information System (INIS)

    Criqui, Patrick; Mima, Silvana

    2011-01-01

    In this research, we have provided an overview of the climate-security nexus in the European sector through a model based scenario analysis with POLES model. The analysis underline that under stringent climate policies, Europe take advantage of a double dividend in its capacity to develop a new cleaner energy model and in lower vulnerability to potential shocks on the international energy markets. (authors)

  10. Secure E-Business applications based on the European Citizen Card

    Science.gov (United States)

    Zipfel, Christian; Daum, Henning; Meister, Gisela

    The introduction of ID cards enhanced with electronic authentication services opens up the possibility to use these for identification and authentication in e-business applications. To avoid incompatible national solutions, the specification of the European Citizen Card aims at defining interoperable services for such use cases. Especially the given device authentication methods can help to eliminate security problems with current e-business and online banking applications.

  11. Distance Dependence of Path Loss for Millimeter Wave Inter-Vehicle Communications

    Directory of Open Access Journals (Sweden)

    M. Fujise

    2004-12-01

    Full Text Available Millimeter-wave path loss between two cars was measured to obtainthe general applicable distance for inter-vehicle communication systemsin real environments. An abrupt and substantial increase in path lossdue to interruption, curves, and different-lane traveling has been amajor concern in inter-vehicle communications. The path lossmeasurements were carried out using 60-GHz CW radiowaves and standardhorn antennas on metropolitan highways and regular roads. Because thepropagation loss is traffic-dependent, the highways were classifiedinto uncrowded and crowded highways, and the regular roads wereclassified into uncrowded and crowded roads. The path loss for thehighways exhibited 2nd-power-law attenuation and that for the regularroads exhibited 1st-power-law attenuation with an increase ininter-vehicle distance. Additional losses of 15 dB for the highways and5 dB for the regular roads were observed when the inter-vehicledistance was more than approximately 30 m. Thus, we were able todemonstrate millimeter-wave inter-vehicle communications at aninter-vehicle distance of more than 100 m.

  12. Determining the spin dependent mean free path in Co90Fe10 using giant magnetoresistance

    Science.gov (United States)

    Shakespear, K. F.; Perdue, K. L.; Moyerman, S. M.; Checkelsky, J. G.; Harberger, S. S.; Tamboli, A. C.; Carey, M. J.; Sparks, P. D.; Eckert, J. C.

    2005-05-01

    The spin dependent mean free path in Co90Fe10 is determined as a function of temperature down to 5K using two different spin valve structures. At 5K the spin dependent mean free path for one structure was measured to be 9.4±1.4nm, decreasing by a factor of 3 by 350K. For the other structure, it is 7.5±0.5nm at 5K and decreased by a factor of 1.5 by 350K. In both cases, the spin dependent mean free path approaches the typical thickness of ferromagnetic layers in spin valves at room temperature and, thus, has an impact on the choice of design parameters for the development of new spintronic devices.

  13. DEFIANT POLITICAL PATHS IN WARSAW: ANOTHER BREACH IN EUROPE AND A NEW MILESTONE FOR THE EURO-ATLANTIC SECURITY ARCHITECTURE

    Directory of Open Access Journals (Sweden)

    Robert LUPITU

    2016-07-01

    Full Text Available The paper aims to review the new political landscape in Poland, a country that has the potential to be a major game changer within the European Union and the North Atlantic Alliance. When the role model of Eastern European countries and former communists satellites becomes a political surface for a tyranny of the majority, a polarized approach used by Law and Justice Party in order to secure and boost its power, another uncertainty falls in Europe. In its sections, the paper focuses on the political environment that has led to Law and Justice Party’s political win, the vital and undesired threat that quick and rough political measures pose to the rule of law system and the ruling party political view that aims to secure and boost its power in the perils from its proximity, by adopting a double standard policy, one distant from EU’s values and another close to NATO’s core interests. Additionally, the paper examines thoughtfully the double standard issue of Warsaw’s new cabinet in a European Union that hardly copes with different sorts of crisis and an unforeseen security landscape that with a NATO troops deployment in Eastern Europe will establish, if not a new Cold War mind set, at least a frosty view from both Russia and the West. By playing a negative game changer role and choosing to consider a prevalence of self-interests among its European and Euro-Atlantic participation, Poland finds itself in a race that may disrupt democracy for security causes, although they are not mutually excluded.

  14. Russian Oil and Natural Gas: Strategic Culture and Security Implications of European Dependence

    National Research Council Canada - National Science Library

    Phillips, William M

    2007-01-01

    .... The third section investigates the importance of revenues that Russia receives from consumption of oil and natural gas exports to Europe on their Gross National Product and economic growth for the future. By understanding Russia's strategic culture and the interdependence of European demand and Russian supply, conclusions are made that determine the threat, risk, and circumstances that Russia will deny energy resources to European countries.

  15. Japan’s energy security predicament post-Fukushima

    International Nuclear Information System (INIS)

    Vivoda, Vlado

    2012-01-01

    If energy security is defined as the availability of energy at all times in various forms, in sufficient quantities and at affordable prices, without unacceptable or irreversible impact on the economy and the environment, Japan is facing an energy security predicament. For a country that was already uneasy about energy security, the March 11, 2011 earthquake and tsunami, which caused a nuclear catastrophe in TEPCO’s Fukushima Daiichi nuclear power plant, turned this unease into outright anxiety. With the temporary and/or permanent closure of many nuclear reactors Japan has had to replace lost power. Tokyo has had no choice but to secure additional fossil fuels, a strategy that has negatively affected Japan’s economy due to rising fuel costs. The increase in Japan’s fossil fuel consumption has also caused a significant increase in greenhouse gas emissions, and affected Tokyo’s commitment to Kyoto targets. This paper analyzes the consequences of the 2011 nuclear disaster for Japan’s energy security. Recognizing that Japan’s future energy policy choices are constrained and path dependent, the paper outlines energy policy recommendations for Japan’s government. - Highlights: ► Analysis of Japan’s energy security situation post-Fukushima. ► Energy transition is path dependant and slow. ► Government is facing significant challenges in terms of future energy policy.

  16. 12 CFR 703.10 - Monitoring non-security investments.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Monitoring non-security investments. 703.10... INVESTMENT AND DEPOSIT ACTIVITIES § 703.10 Monitoring non-security investments. (a) At least quarterly, a... credit union does not have an investment-related committee, then each member of its board of directors...

  17. On Adaptive vs. Non-adaptive Security of Multiparty Protocols

    DEFF Research Database (Denmark)

    Canetti, Ran; Damgård, Ivan Bjerre; Dziembowski, Stefan

    2001-01-01

    highlights of our results are: – - According to the definition of Dodis-Micali-Rogaway (which is set in the information-theoretic model), adaptive and non-adaptive security are equivalent. This holds for both honest-but-curious and Byzantine adversaries, and for any number of parties. – - According......Security analysis of multiparty cryptographic protocols distinguishes between two types of adversarialsettings: In the non-adaptive setting, the set of corrupted parties is chosen in advance, before the interaction begins. In the adaptive setting, the adversary chooses who to corrupt during...... the course of the computation. We study the relations between adaptive security (i.e., security in the adaptive setting) and non-adaptive security, according to two definitions and in several models of computation. While affirming some prevailing beliefs, we also obtain some unexpected results. Some...

  18. GENERAL PRINCIPLES OF EU (CRIMINAL LAW: LEGALITY, EQUALITY, NON-DISCRIMINATION, SPECIALTY AND NE BIS IN IDEM IN THE FIELD OF THE EUROPEAN ARREST WARRANT

    Directory of Open Access Journals (Sweden)

    NOREL NEAGU

    2012-05-01

    Full Text Available This article deals with the case law of the Court of Justice of the European Union in the field of the European arrest warrant, critically analysing the principles invoked in several decisions validating the European legislation in the field: legality, equality and non-discrimination, specialty, ne bis in idem. The author concludes that an area of freedom, security and justice could be built on these principles, but further harmonisation of legislation needs to be realised to avoid a ”journey to the unknown” for European citizens in respect to legislation of other member states of the EU.

  19. A design of toxic gas detecting security robot car based on wireless path-patrol

    Directory of Open Access Journals (Sweden)

    Cheng Ho-Chih

    2017-01-01

    Full Text Available Because a toxic gas detecting/monitoring system in a chemical plant is not movable, a gas detecting/monitoring system will be passive and the detecting range will also be constrained. This invention is an active multi-functional wireless patrol car that can substitute for humans that inspect a plant's security. In addition, to widen the monitoring vision within the environment, two motors used to rotate a wireless IPCAM with two axes are presented. Also, to control the robot car's movement, two axis motors used to drive the wheel of the robot car are also installed. Additionally, a toxic gas detector is linked to the microcontroller of the patrol car. The detected concentration of the gas will be fed back to the server pc. To enhance the robot car's patrolling duration, a movable electrical power unit in conjunction with a wireless module is also used. Consequently, this paper introduces a wireless path-patrol and toxic gas detecting security robot car that can assure a plant's security and protect workers when toxic gases are emitted.

  20. European Energy Policy and Its Effects on Gas Security

    Science.gov (United States)

    Radu, Victorita Stefana Anda

    The goal of this study is to examine the effects of the energy policies of the European Union (EU) on its gas security in the period 2006 to 2016. While energy security is often given a broad meaning, this paper focuses on its external dimension: the EU?s relations with external gas suppliers. It is grounded on four pillars drawing from the compounded institutionalist and liberal theoretical frameworks: regulatory state, rational-choice, external governance, and regime effectiveness. The research question was investigated through a qualitative methodology with two main components: a legislative analysis and four case studies representing the main gas supply options--Russia, North African exporting countries, Norway, and liquefied natural gas (LNG). They highlighted that the EU framed the need for gas security mainly in the context of political risks associated with Russian gas supply, but it almost never took into account other equally important risks. Moreover, the research revealed two main issues. First, that the deeper and the more numerous EU?s energy policies were, the bigger was the magnitude of the effect. Specifically, competitiveness and infrastructure policies had the largest magnitude, while the sustainability and security of supply policies had the smallest effect. Second, EU energy policies only partially diminished the economic and political risks in relation to foreign gas suppliers. To conclude, to a certain extent the EU?s efforts made a positive contribution to the external dimension of the EU?s gas security, but the distinguishing trait remains that there is no consistency in terms of the magnitude of the effect and its nature.

  1. Pricing of path dependent derivatives with discretely monitored underlying assets

    Science.gov (United States)

    Choi, Hyomin

    This dissertation presents two different approaches to path dependent option pricing with discrete sampling. Provided the underlying asset of a path dependent derivative contract follows an affine process, we use the forward characteristic method to evaluate its fair price. Our study shows that the valuation method is numerically accessible as long as the contract payoff is a linear combination of log return of its underlying asset price. We compute various examples of such contracts and give contract-tailored formulas that we use in these examples. In the second part, we consider variance options under stochastic volatility model. We analyze the difference between variance option prices with discrete and continuous sampling as a function of N, the number of observations made in the former. We find the series expansion of the difference with respect to 1/N and find its leading term. By adding this leading term to the value of continuously sampled variance option, we obtain a simple and well-understood approximation of discretely sample variance option price.

  2. Definition of path integrals and rules for non-linear transformations

    International Nuclear Information System (INIS)

    Kerler, W.

    1978-01-01

    Functional integrals are defined as the limit of multidimensional integrals based on fundamental generating distributions. The 'lattice choice' is put into a suitable functional form. The independence of the particular choice and the necessity of this fact are shown. Various forms of the path integrals are derived and discussed. The relation to the traditional ordering problem is pointed out. The mechanism of non-linear transformations of variables is investigated and rules are given. In the case of fields it turns out that the path integrals can also be considered for space translations. (Auth.)

  3. Conducting a Nuclear Security Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Leach, Janice [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Snell, Mark K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-06-01

    There are three general steps that make up a nuclear security assessment: 1. Develop data Libraries that indicate how effective the physical protection measures are both individually but also as parts of subsystems and actual systems. 2. Perform Path Analysis 3. Perform Scenario Analysis. Depending upon the nature and objectives of the assessment not all three of these steps may need to be performed; for example, at facilities with simple layouts there may not be a need to perform path analysis. Each of these steps is described within this report.

  4. Looking beyond credit ratings : Factors investors consider In pricing European asset-backed securities

    NARCIS (Netherlands)

    Fabozzi, F.; Vink, D.

    2012-01-01

    In this paper, we empirically investigate what credit factors investors rely upon when pricing the spread at issue for European asset-backed securities. More specifically, we investigate how credit factors affect new issuance spreads after taking into account credit rating. We do so by investigating

  5. Path-space variational inference for non-equilibrium coarse-grained systems

    International Nuclear Information System (INIS)

    Harmandaris, Vagelis; Kalligiannaki, Evangelia; Katsoulakis, Markos; Plecháč, Petr

    2016-01-01

    In this paper we discuss information-theoretic tools for obtaining optimized coarse-grained molecular models for both equilibrium and non-equilibrium molecular simulations. The latter are ubiquitous in physicochemical and biological applications, where they are typically associated with coupling mechanisms, multi-physics and/or boundary conditions. In general the non-equilibrium steady states are not known explicitly as they do not necessarily have a Gibbs structure. The presented approach can compare microscopic behavior of molecular systems to parametric and non-parametric coarse-grained models using the relative entropy between distributions on the path space and setting up a corresponding path-space variational inference problem. The methods can become entirely data-driven when the microscopic dynamics are replaced with corresponding correlated data in the form of time series. Furthermore, we present connections and generalizations of force matching methods in coarse-graining with path-space information methods. We demonstrate the enhanced transferability of information-based parameterizations to different observables, at a specific thermodynamic point, due to information inequalities. We discuss methodological connections between information-based coarse-graining of molecular systems and variational inference methods primarily developed in the machine learning community. However, we note that the work presented here addresses variational inference for correlated time series due to the focus on dynamics. The applicability of the proposed methods is demonstrated on high-dimensional stochastic processes given by overdamped and driven Langevin dynamics of interacting particles.

  6. Path-space variational inference for non-equilibrium coarse-grained systems

    Energy Technology Data Exchange (ETDEWEB)

    Harmandaris, Vagelis, E-mail: harman@uoc.gr [Department of Mathematics and Applied Mathematics, University of Crete (Greece); Institute of Applied and Computational Mathematics (IACM), Foundation for Research and Technology Hellas (FORTH), IACM/FORTH, GR-71110 Heraklion (Greece); Kalligiannaki, Evangelia, E-mail: ekalligian@tem.uoc.gr [Department of Mathematics and Applied Mathematics, University of Crete (Greece); Katsoulakis, Markos, E-mail: markos@math.umass.edu [Department of Mathematics and Statistics, University of Massachusetts at Amherst (United States); Plecháč, Petr, E-mail: plechac@math.udel.edu [Department of Mathematical Sciences, University of Delaware, Newark, Delaware (United States)

    2016-06-01

    In this paper we discuss information-theoretic tools for obtaining optimized coarse-grained molecular models for both equilibrium and non-equilibrium molecular simulations. The latter are ubiquitous in physicochemical and biological applications, where they are typically associated with coupling mechanisms, multi-physics and/or boundary conditions. In general the non-equilibrium steady states are not known explicitly as they do not necessarily have a Gibbs structure. The presented approach can compare microscopic behavior of molecular systems to parametric and non-parametric coarse-grained models using the relative entropy between distributions on the path space and setting up a corresponding path-space variational inference problem. The methods can become entirely data-driven when the microscopic dynamics are replaced with corresponding correlated data in the form of time series. Furthermore, we present connections and generalizations of force matching methods in coarse-graining with path-space information methods. We demonstrate the enhanced transferability of information-based parameterizations to different observables, at a specific thermodynamic point, due to information inequalities. We discuss methodological connections between information-based coarse-graining of molecular systems and variational inference methods primarily developed in the machine learning community. However, we note that the work presented here addresses variational inference for correlated time series due to the focus on dynamics. The applicability of the proposed methods is demonstrated on high-dimensional stochastic processes given by overdamped and driven Langevin dynamics of interacting particles.

  7. Economic foundation and importance of non-state security sector within the national security system

    Directory of Open Access Journals (Sweden)

    Anđelković Slobodan

    2016-01-01

    Full Text Available The main purpose of this paper was to present the causes (for, role (played by and the growing importance of the non-state actors within the national security sector, while analyzing the economic interest of individuals, organizations and the state itself that were favoring such a development. In the course of our research we established how, as the state narrowed its activities down to more vital and more dangerous fields of work, this opened up space for independent contractors to enter those fields which carried less systemic risk. Such change was made possible in the post-Cold War context, when many of the former service members were hired by private companies. The economic motive had a role to play as well, given the need for additional security going beyond what state offered to its citizens, as many doubted the ability (efficiency of state to provide it in the first place; and private sector's willingness to provide it for a price. In Serbia, position of non-state security sector is still very much limited by the traditional notion of security as well as the division of competences, both left-overs from socialist times. This goes against positive tendencies within the sector itself (improvement of types and specialization of the security as service; strengthening of legal regulation; flexibility of services being offered. By conducting its basic service and improving the security of its clients, representatives of non-state security sector are - indirectly - improving the security of society as a whole, ensuring economic stability, which presents one of key national interests.

  8. European Union energy policy integration: A case of European Commission policy entrepreneurship and increasing supranationalism

    International Nuclear Information System (INIS)

    Maltby, Tomas

    2013-01-01

    Focusing on gas, this article explores the role of the European Commission in the process of European Union energy security policy development, and the extent to which the policy area is becoming increasingly supranational. Situating the article within the literature on agenda-setting and framing, it is argued that a policy window was opened as a result of: enlargement to include more energy import dependent states, a trend of increasing energy imports and prices, and gas supply disruptions. From the mid-2000s, the Commission contributed to a shift in political norms, successfully framing import dependency as a problem requiring an EU-level solution, based on the institution’s pre-existing preferences for a diversified energy supply and internal energy market. Whilst Member States retain significant sovereignty, the Commission has achieved since 2006 creeping competencies in the internal, and to a lesser extent external, dimensions of EU energy policy. - Highlights: ► We examine the development of EU energy security policy, focusing on gas. ► We examine changes in European Commission competence in energy policy. ► The European Commission has gained increased competence in the internal market. ► In the external dimension of EU energy policy Member States retain competence. ► The European Commission has had qualified success as a policy entrepreneur

  9. Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Architecture Lab Test Report

    Science.gov (United States)

    Iannicca, Dennis C.; McKim, James H.; Stewart, David H.; Thadhani, Suresh K.; Young, Daniel P.

    2015-01-01

    NASA Glenn Research Center, in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the FAA and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the current GRC prototype CNPC architecture as a demonstration platform. The security controls were integrated into a lab test bed mock-up of the Mobile IPv6 architecture currently being used for NASA flight testing, and a series of network tests were conducted to evaluate the security overhead of the controls compared to the baseline CNPC link without any security. The aim of testing was to evaluate the performance impact of the additional security control overhead when added to the Mobile IPv6 architecture in various modes of operation. The statistics collected included packet captures at points along the path to gauge packet size as the sample data traversed the CNPC network, round trip latency, jitter, and throughput. The effort involved a series of tests of the baseline link, a link with Robust Header Compression (ROHC) and without security controls, a link with security controls and without ROHC, and finally a link with both ROHC and security controls enabled. The effort demonstrated that ROHC is both desirable and necessary to offset the additional expected overhead of applying security controls to the CNPC link.

  10. The Impact of the Conflict in Ukraine on Lithuanian Security Development

    Directory of Open Access Journals (Sweden)

    Kojala Linas

    2015-12-01

    Full Text Available After regaining independence in 1990, Lithuania chose a strategic path to integrate into Western organizations, with clear priorities for the European Union and NATO, the biggest military alliance in the world. In Russia, such direction was regarded as a threat to its influence in the post-Soviet area. Hence the article seeks to provide an overview of Lithuania’s security policy, with specific emphasis on the role of Russia, in the recent quarter century. The aim is to distinguish key priorities for Lithuania and assess their practical implementation. Furthermore, the paper seeks to analyse the impact of the war in Ukraine, both on Lithuanian and regional security as well as the development of key security priorities.

  11. European energy policy: the green book

    International Nuclear Information System (INIS)

    Anon.

    2006-01-01

    Energy dependence, insecurity of supplies, rise of demand and prices, global warming: these are the characteristics of the energy situation of the 21. century. The new green book of the European Commission about 'a European strategy for a safe, competitive and durable energy' starts from this alarming status and proposes some suggestions for the building up of a new global European energy policy: realization of the European domestic energy markets (a European energy network, a priority interconnection plan for gas networks, a separation of transport and distribution activities for equitable rules, a reinforcement of the competitiveness of the European industry), a joint security of supplies between member states (redefining the EU position about strategic oil and gas reserves), a sustainable, efficient and diversified energy offer, an integrated approach to fight against global warming (improving energy efficiency, development of renewable energy sources, carbon sequestration), encouraging innovation, developing a consistent foreign policy of energy (a clear policy for the security and diversification of energy supplies, energy partnerships between producers, transit countries and other international actors). (J.S.)

  12. Security careers skills, compensation, and career paths

    CERN Document Server

    Walker, Stephen W

    2014-01-01

    The third edition of Security Careers is the authoritative reference for current job descriptions and pay practices of security, compliance, ethics, environmental, health and safety occupations. The job descriptions and compensation ranges in this report are drawn from research from the Foushée Group, which has been conducting this research since 1980. Security Careers includes more than 75 job descriptions for security-related positions, which range from the entry-level security guard to the top global corporate executive. It also provides four years of compensation trend data to give a th

  13. Constraining Path-Dependent Processes During Basalt-CO2 Interactions with Observations From Flow-Through and Batch Experiments

    Science.gov (United States)

    Thomas, D.; Garing, C.; Zahasky, C.; Harrison, A. L.; Bird, D. K.; Benson, S. M.; Oelkers, E. H.; Maher, K.

    2017-12-01

    Predicting the timing and magnitude of CO2 storage in basaltic rocks relies partly on quantifying the dependence of reactivity on flow path and mineral distribution. Flow-through experiments that use intact cores are advantageous because the spatial heterogeneity of pore space and reactive phases is preserved. Combining aqueous geochemical analyses and petrologic characterization with non-destructive imaging techniques (e.g. micro-computed tomography) constrains the relationship between irreversible reactions, pore connectivity and accessible surface area. Our work enhances these capabilities by dynamically imaging flow through vesicular basalts with Positron Emission Tomography (PET) scanning. PET highlights the path a fluid takes by detecting photons produced during radioactive decay of an injected radiotracer (FDG). We have performed single-phase, CO2-saturated flow-through experiments with basaltic core from Iceland at CO2 sequestration conditions (50 °C; 76-90 bar Ptot). Constant flow rate and continuous pressure measurements at the inlet and outlet of the core constrain permeability. We monitor geochemical evolution through cation and anion analysis of outlet fluid sampled periodically. Before and after reaction, we perform PET scans and characterize the core using micro-CT. The PET scans indicate a discrete, localized flow path that appears to be a micro-crack connecting vesicles, suggesting that vesicle-lining minerals are immediately accessible and important reactants. Rapid increases in aqueous cation concentration, pH and HCO3- indicate that the rock reacts nearly immediately after CO2 injection. After 24 hours the solute release decreases, which may reflect a transition to reaction with phases with slower kinetic dissolution rates (e.g. zeolites and glasses to feldspar), a decrease in available reactive surface area or precipitation. We have performed batch experiments using crushed material of the same rock to elucidate the effect of flow path

  14. The Migration Crisis from the East-Central European Perspective: Challenges for Regional Security

    Directory of Open Access Journals (Sweden)

    Renata Podgórzańska

    2017-12-01

    Full Text Available Nowadays, the common denominator of involvement of the EastCentral Europe in the international arena, and above all, the premise determining community of interest expressed in the European Union is the migration crisis. Despite the different circumstances of activity in the context of the migration crisis, states in the region express similar opinions on the consequences of immigration for security in the region. Above all, they emphasise the implications of immigration for the internal security of states. Given the complex nature of migration, this article focuses on the phenomenon of immigration in the EU, determining the causes of the escalation of the influx of immigrants and, above all, identifying the consequences for the security of states of East-Central Europe.

  15. European Non Destructive Examination Forum (ENDEF)

    International Nuclear Information System (INIS)

    Deffrennes, M.; Engl, G.; Estorff, U. von

    1998-01-01

    ENDEF, an initiative of the European Commission, DG XVII (Energy) was well supported by the European industrial institutions working in assistance with nuclear industrial organisations in the CEEC's (Central and Eastern European Countries) and NIS's (New Independent States). This Forum provides effectively a platform for open discussion between representatives of industrial actors active in the NDE (Non Destructive Examination)/ISI (In Service Inspection) field with the purpose to establish a co-operation pattern between qualified representatives of the EU (European Union) industry to offer a better co-ordinated and well defined assistance to the CEEC's and NIS in the field of NDE/ISI, and to lay the ground for further industrial co-operation. ENDEF developed a strategy to follow for the establishment of co-operation projects. This strategy is now used to understand the extent of past or present assistance projects and to identify the areas where more co-operation is needed. ENDEF encourages the creation in the NIS's and CEEC's of similar forums in order to increase the co-operation and co-ordination. ENDEF is also working in perfect agreement with the European Network ENIQ, piloted by the European plant operators. This identity of views lead to the leadership by the ENDEF co-ordinator of the ENIQ Task 3 involving Applications of the European Methodology for ISI qualification in the CEEC's and NIS's and presently fully integrated in ENDEF. (orig.)

  16. Tracing the Interface Between Numerical Flexibility and Income Security for European Youth during the Economic Crisis

    DEFF Research Database (Denmark)

    Leschke, Janine; Finn, Mairéad

    benefit schemes. This paper adopts a comparative European approach in order to shed light on the interaction between flexibility and income security, for youth. Special extracts of the aggregate European Labour Force Survey data are used to trace the development of (involuntary) temporary employment among...... duration than adults. In a majority of EU countries youth are also disadvantaged with regard to unemployment benefits. Eligibility criteria require a certain minimum period in employment before unemployment insurance benefits can be accessed; and means-testing applies to unemployment and social assistance...... underexplored. This allows us to assess if developments during the economic crisis have improved or rather deteriorated the situation of youth with regard to different dimension of flexibility and security....

  17. Production from Giant Gas Fields in Norway and Russia and Subsequent Implications for European Energy Security

    International Nuclear Information System (INIS)

    Soederbergh, Bengt

    2010-01-01

    70 bcm In addition, there are a number of potential downside factors for future Russian gas supplies to the European markets. Consequently, a 90% increase of import volumes to the EU by 2030 will be impossible to achieve. From a European energy security perspective the dependence of pipeline gas imports is not the only energy security problem to be in the limelight, the question of physical availability of overall gas supplies deserves serious attention as well. There is a lively discussion regarding the geopolitical implications of European dependence on imported gas from Russia. However, the results of this thesis suggest that when assessing the future gas demand of the EU it would be of equal importance to be concerned about diminishing availability of global gas supplies

  18. THIRD-COUNTRY MIGRATION TO THE EU: BETWEEN NORMATIVE EUROPEAN FRAMEWORKS AND NON-EUROPEAN IMMIGRANTS' PERSONAL EFFORTS

    Directory of Open Access Journals (Sweden)

    Demir ABDULLAH

    2018-05-01

    Full Text Available European leaders' rhetoric on third-country migration ranges from a discourse extolling the benefits of a United Europe, to one upholding Europe’s repute as a bastion of fundamental human rights, to yet another one out of which the continent emerges as a repressive fortress. Third-country migration not only engages the EU's efforts, but also those exerted by non-EU immigrantstowardsintegrating and becoming more open to their European host culture. This paper will be focusing both on the EU's commitment to honing its third-country migration policies, as well as on the non-EU immigrants' potential and limitations when it comes to their assimilation/integration into EU countries, in particular, Romania. Methodologically this paper uses the content analysis of European leaders’ discourses and also the qualitative analysis of data collected from 40 interviews carried out with non-EU immigrants into Romania. Another methodological tool will consist in an analysis of official EU documents. What will be pursued is the way in which the EU official documents reflect the shared interest proved by European leaders concerning the immigration processes. It will touch upon how the integration processes reclaims on the one hand permanent exchanges between the host European society and non European immigrant and on the other hand sustained efforts from these two parts in order to meet their needs and recognise their limits, in terms of economic, professional and social resources.

  19. Path dependence, fragmented property rights and the slow diffusion of high throughput technologies in inter-war British coal mining

    Energy Technology Data Exchange (ETDEWEB)

    Peter Scott

    2006-01-15

    This article examines the importance of path dependence effects in impeding the diffusion of high throughput mechanized mining systems in the British coal industry. It demonstrates that the industry had become 'locked in' to low throughput underground haulage technology, on account of institutional interrelatedness between Britain's traditional practice of extensive in-seam mining and its unique system of fragmented, privately owned mineral royalties. Fragmented royalties prevented the concentration of workings and introduction of high throughput main haulage systems that underpinned the rapid productivity growth of European producers. Meanwhile, technical interrelatedness between the haulage systems taking coal to the pit shaft and operations further 'upstream' created bottlenecks which both slowed the overall rate of mechanization and limited the productivity gains from the mechanization that did occur.

  20. The use of a path independent integral in non-linear fracture mechanics

    International Nuclear Information System (INIS)

    Hellen, T.K.

    1977-01-01

    A computer program for calculating the J and J* integrals has been developed as an extension to the BERSAFE finite element system. A full analysis of the cracked structure including plasticity, creep and thermal strains is conducted and the results are stored on a permanent data set. The integral values may then be calculated using the post-processor program for any number of contours and load or time steps, without recourse to further expensive computations. Numerical examples are presented comparing the J and J* integrals for a number of cracked plates under thermal, plastic and creep environments. To demonstrate the accuracy for a simple thermo-elastic case, a centre cracked plate subject to a symmetric quadratic gradient is included. Here, the J integral is shown to be path dependent whereas good independence is seen for the J* integral. The case of an elastic-plastic plate is invetigated to demonstrate path independence for both integrals in non-linear elasticity, and the effects of unloading are discussed. An alternative method for obtaining the change of potential energy over a small crack extension is briefly mentioned and compared to the J and J* results in this case. An axisymmetric bar with an internal penny-shaped crack subjected to tension is discussed under elastic-plastic materials behavior

  1. Green paper: towards a European strategy for the security of energy supply

    International Nuclear Information System (INIS)

    2001-04-01

    The Green Paper ''Towards a European strategy for the security of energy supply in Europe'', published in 2002, gives a clear priority to energy efficiency and renewable. Although it is not a legislative document, it is accepted by the main actors as a reference for all energy related actions. Energie-Cites welcomes the Green Paper. This document gives a clear review of the energy context in Europe and raises fundamental questions, in particular, the place given to energy demand management, presented as the priority policy to ensure security of supply and compliance with the European Union international commitments. However, they precise three important points. It is indispensable that potential energy savings be quantified so as to emphasize the importance of a resource that has always been underestimated. By the same token, the ''demand management'' option presented in the Green Paper would gain in credibility if several alternative scenarios were proposed, the impact and the conditions for the success of such a policy being then more clearly apparent. A policy with a stronger focus on demand management and renewable energy requires one to redirect attention towards a different set of players. (A.L.B.)

  2. Measurement with Persons: A European Network

    NARCIS (Netherlands)

    Pendrill, L.R.; Emardson, R.; Berglund, B.; Gröning, M.; Höglund, A.; Cancedda, A.; Quinti, G.; Crenna, F.; Rossi, G.B.; Drnovek, J.; Gersak, G.; Goodman, T.; Harris, S.; Heijden, van der G.W.A.M.; Kallinen, K.; Ravaja, N.

    2010-01-01

    The European ‘Measuring the Impossible’ Network MINET promotes new research activities in measurement dependent on human perception and/or interpretation. This includes the perceived attributes of products and services, such as quality or desirability, and societal parameters such as security and

  3. Temperature dependence of electron mean free path in molybdenum from ultrasonic measurements

    Energy Technology Data Exchange (ETDEWEB)

    Almond, D P; Detwiler, D A; Rayne, J A [Carnegie-Mellon Univ., Pittsburgh, Pa. (USA)

    1975-09-08

    The temperature dependence of the electronic mean free path in molybdenum has been obtained from ultrasonic attenuation measurements.For temperature up to 30 K a T/sup -2/ law is followed suggesting the importance of electron-electron scattering in the attenuation mechanism.

  4. European Non Destructive Examination Forum (ENDEF)

    Energy Technology Data Exchange (ETDEWEB)

    Deffrennes, M [EC, DG XVII, Nuclear Energy, Brussels (Belgium); Engl, G [Siemens AG Energieerzeugung KWU, Erlangen (Germany); Estorff, U von [EC, JRC/IAM, Petten (Netherlands)

    1998-11-01

    ENDEF, an initiative of the European Commission, DG XVII (Energy) was well supported by the European industrial institutions working in assistance with nuclear industrial organisations in the CEEC`s (Central and Eastern European Countries) and NIS`s (New Independent States). This Forum provides effectively a platform for open discussion between representatives of industrial actors active in the NDE (Non Destructive Examination)/ISI (In Service Inspection) field with the purpose to establish a co-operation pattern between qualified representatives of the EU (European Union) industry to offer a better co-ordinated and well defined assistance to the CEEC`s and NIS in the field of NDE/ISI, and to lay the ground for further industrial co-operation. ENDEF developed a strategy to follow for the establishment of co-operation projects. This strategy is now used to understand the extent of past or present assistance projects and to identify the areas where more co-operation is needed. ENDEF encourages the creation in the NIS`s and CEEC`s of similar forums in order to increase the co-operation and co-ordination. ENDEF is also working in perfect agreement with the European Network ENIQ, piloted by the European plant operators. This identity of views lead to the leadership by the ENDEF co-ordinator of the ENIQ Task 3 involving Applications of the European Methodology for ISI qualification in the CEEC`s and NIS`s and presently fully integrated in ENDEF. (orig.)

  5. Study evaluating the status quo and the legal implications of third party liability for the European Security Industry

    NARCIS (Netherlands)

    Bergkamp, L.; Faure, M.G.; Hinteregger, M.; Philipsen, N.J.

    2013-01-01

    Third party liability has been identified as an issue that could adversely impact the European security industry. Limitless third party liability for security product and services is believed to have the potential to reduce investments in innovation. In the US, the Safety Act (discussed in this

  6. Path-integral isomorphic Hamiltonian for including nuclear quantum effects in non-adiabatic dynamics

    Science.gov (United States)

    Tao, Xuecheng; Shushkov, Philip; Miller, Thomas F.

    2018-03-01

    We describe a path-integral approach for including nuclear quantum effects in non-adiabatic chemical dynamics simulations. For a general physical system with multiple electronic energy levels, a corresponding isomorphic Hamiltonian is introduced such that Boltzmann sampling of the isomorphic Hamiltonian with classical nuclear degrees of freedom yields the exact quantum Boltzmann distribution for the original physical system. In the limit of a single electronic energy level, the isomorphic Hamiltonian reduces to the familiar cases of either ring polymer molecular dynamics (RPMD) or centroid molecular dynamics Hamiltonians, depending on the implementation. An advantage of the isomorphic Hamiltonian is that it can easily be combined with existing mixed quantum-classical dynamics methods, such as surface hopping or Ehrenfest dynamics, to enable the simulation of electronically non-adiabatic processes with nuclear quantum effects. We present numerical applications of the isomorphic Hamiltonian to model two- and three-level systems, with encouraging results that include improvement upon a previously reported combination of RPMD with surface hopping in the deep-tunneling regime.

  7. Path integration in conical space

    International Nuclear Information System (INIS)

    Inomata, Akira; Junker, Georg

    2012-01-01

    Quantum mechanics in conical space is studied by the path integral method. It is shown that the curvature effect gives rise to an effective potential in the radial path integral. It is further shown that the radial path integral in conical space can be reduced to a form identical with that in flat space when the discrete angular momentum of each partial wave is replaced by a specific non-integral angular momentum. The effective potential is found proportional to the squared mean curvature of the conical surface embedded in Euclidean space. The path integral calculation is compatible with the Schrödinger equation modified with the Gaussian and the mean curvature. -- Highlights: ► We study quantum mechanics on a cone by the path integral approach. ► The path integral depends only on the metric and the curvature effect is built in. ► The approach is consistent with the Schrödinger equation modified by an effective potential. ► The effective potential is found to be of the “Jensen–Koppe” and “da Costa” type.

  8. Dependence Structures and Systemic Risk of Government Securities Markets in Central and Eastern Europe: A CoVaR-Copula Approach

    Directory of Open Access Journals (Sweden)

    Lu Yang

    2018-01-01

    Full Text Available Abstract: In this study, we proposed a new empirical method by combining generalized autoregressive score functions and a copula model with high-frequency data to model the conditional time-varying joint distribution of the government bond yields between Poland/Czech Republic/Hungary, and Germany. Capturing the conditional time-varying joint distribution of these bond yields allowed us to precisely measure the dependence of the government securities markets. In particular, we found a high dependence of these government securities markets in the long term, but a low dependence in the short term. In addition, we report that the Czech Republic showed the highest dependence with Germany, while Hungary showed the lowest. Moreover, we found that the systemic risk dynamics were consistent with the idea that the global financial crisis not only had spillover effects on countries with weak economic fundamentals (e.g., Hungary, which had the highest systemic risk, but also had contagion effects for both CEEC-3 countries and Germany. Finally, we confirm that three major market events, namely the EU accession, the global financial crisis, and the European debt crisis, caused structural changes to the dynamic correlation.

  9. Security Economics in the European Context: Implications of the EUSECON Project

    OpenAIRE

    Michael Brzoska; Raphael Bossong; Eric van Um

    2011-01-01

    This paper presents key aspects and policy implications of a multi-annual research project on economic analyses of European security issues (EUSECON), with an emphasis on intentional threats of organised crime, piracy and terrorism. The first part argues that rational models can provide significant insights on the emergence and current patterns of terrorism and piracy. These findings could lead to new priorities or to more nuanced interventions in response to these threats. The second part fo...

  10. Overcoming Path Dependency and “Lock-In”

    DEFF Research Database (Denmark)

    Soyer, Ayberk; Onar, Sezi Çevik; Sanchez, Ron

    2017-01-01

    Competence-Based Management (CBM) theory and research suggest that a firm’s competence building and leveraging processes are key factors influencing its competitive success. To achieve sustained competitive success, a firm’s competence building processes must continuously renew and extend...... the competences a firm has and can leverage. However, the ability of a firm to sustain strategically adequate levels of competence building – while also maintaining strategically successful competence leveraging – may be limited by various self-reinforcing managerial and organizational mechanisms that can arise...... from competence leveraging processes. In this paper we focus on certain managerial behaviors that may create path dependencies that lead an organization to become “locked-in” to its current competence leveraging processes and to neglect essential competence building, resulting in an inability to renew...

  11. The EU as black widow; Devouring the WEU to give birth to a European Security and Defence Policy

    NARCIS (Netherlands)

    Wessel, Ramses A.; Kronenberger, Vincent

    2001-01-01

    The Treaty of Nice will finally turn the European Union into a security and defence organisation. Alongside its tasks in all other areas the Union will be given the competence to strengthen its contribution to the maintenance of international peace and security in accordance with the UN Charter.

  12. Association of the OPRM1 variant rs1799971 (A118G) with non-specific liability to substance dependence in a collaborative de novo meta-analysis of European-ancestry cohorts

    Science.gov (United States)

    Schwantes-An, Tae-Hwi; Zhang, Juan; Chen, Li-Shiun; Hartz, Sarah M.; Culverhouse, Robert C.; Chen, Xiangning; Coon, Hilary; Frank, Josef; Kamens, Helen M.; Konte, Bettina; Kovanen, Leena; Latvala, Antti; Legrand, Lisa N.; Maher, Brion S.; Melroy, Whitney E.; Nelson, Elliot C.; Reid, Mark W.; Robinson, Jason D.; Shen, Pei-Hong; Yang, Bao-Zhu; Andrews, Judy A.; Aveyard, Paul; Beltcheva, Olga; Brown, Sandra A.; Cannon, Dale S.; Cichon, Sven; Corley, Robin P.; Dahmen, Norbert; Degenhardt, Louisa; Foroud, Tatiana; Gaebel, Wolfgang; Giegling, Ina; Glatt, Stephen J.; Grucza, Richard A.; Hardin, Jill; Hartmann, Annette M.; Heath, Andrew C.; Herms, Stefan; Hodgkinson, Colin A.; Hoffmann, Per; Hops, Hyman; Huizinga, David; Ising, Marcus; Johnson, Eric O.; Johnstone, Elaine; Kaneva, Radka P.; Kendler, Kenneth S.; Kiefer, Falk; Kranzler, Henry R.; Krauter, Ken S.; Levran, Orna; Lucae, Susanne; Lynskey, Michael T.; Maier, Wolfgang; Mann, Karl; Martin, Nicholas G.; Mattheisen, Manuel; Montgomery, Grant W.; Müller-Myhsok, Bertram; Murphy, Michael F.; Neale, Michael C.; Nikolov, Momchil A.; Nishita, Denise; Nöthen, Markus M; Nurnberger, John; Partonen, Timo; Pergadia, Michele L.; Reynolds, Maureen; Ridinger, Monika; Rose, Richard J.; Rouvinen-Lagerström, Noora; Scherbaum, Norbert; Schmäl, Christine; Soyka, Michael; Stallings, Michael C.; Steffens, Michael; Treutlein, Jens; Tsuang, Ming; Wall, Tamara L.; Wodarz, Norbert; Yuferov, Vadim; Zill, Peter; Bergen, Andrew W.; Chen, Jingchun; Cinciripini, Paul M.; Edenberg, Howard J; Ehringer, Marissa A.; Ferrell, Robert E.; Gelernter, Joel; Goldman, David; Hewitt, John K.; Hopfer, Christian J.; Iacono, William G.; Kaprio, Jaakko; Kreek, Mary Jeanne; Kremensky, Ivo M.; Madden, Pamela A.F.; McGue, Matt; Munafò, Marcus R.; Philibert, Robert A.; Rietschel, Marcella; Roy, Alec; Rujescu, Dan; Saarikoski, Sirkku T.; Swan, Gary E.; Todorov, Alexandre A.; Vanyukov, Michael M.; Weiss, Robert B.; Bierut, Laura J.; Saccone, Nancy L.

    2015-01-01

    The mu1 opioid receptor gene, OPRM1, has long been a high-priority candidate for human genetic studies of addiction. Because of its potential functional significance, the non-synonymous variant rs1799971 (A118G, Asn40Asp) in OPRM1 has been extensively studied, yet its role in addiction has remained unclear, with conflicting association findings. To resolve the question of what effect, if any, rs1799971 has on substance dependence risk, we conducted collaborative meta-analyses of 25 datasets with over 28,000 European-ancestry subjects. We investigated non-specific risk for “general” substance dependence, comparing cases dependent on any substance to controls who were non-dependent on all assessed substances. We also examined five specific substance dependence diagnoses: DSM-IV alcohol, opioid, cannabis, and cocaine dependence, and nicotine dependence defined by the proxy of heavy/light smoking (cigarettes-per-day > 20 versus ≤ 10). The G allele showed a modest protective effect on general substance dependence (OR = 0.90, 95% C.I. [0.83–0.97], p-value = 0.0095, N = 16,908). We observed similar effects for each individual substance, although these were not statistically significant, likely because of reduced sample sizes. We conclude that rs1799971 contributes to mechanisms of addiction liability that are shared across different addictive substances. This project highlights the benefits of examining addictive behaviors collectively and the power of collaborative data sharing and meta-analyses. PMID:26392368

  13. Russian Oil and Natural Gas: Strategic Culture and Security Implications of European Dependence

    National Research Council Canada - National Science Library

    Phillips, William M

    2007-01-01

    .... The first section looks into the past actions and strategic culture of Russia to determine if there exists a threat that Russia will deny energy resources to European countries for political or economic gain...

  14. Engaging Non-State Security Providers: Whither the Rule of Law?

    Directory of Open Access Journals (Sweden)

    Timothy Donais

    2017-07-01

    Full Text Available The primacy of the rule of law has long been seen as one of the essential principles of security sector reform (SSR programming, and part of the larger gospel of SSR is that the accountability of security providers is best guaranteed by embedding security governance within a rule of law framework. Acknowledging the reality of non-state security provision, however, presents a challenge to thinking about SSR as merely the extension of the rule of law into the security realm, in large part because whatever legitimacy non-state security providers possess tends to be grounded in 'extralegal' foundations. This paper – more conceptual than empirical in its approach – considers the implications of hybrid forms of security governance for thinking about the relationship between SSR and rule of law promotion, and argues that the rule of law still provides a useful source of strategic direction for SSR programming.

  15. Path dependent magnetic states and evidence of kinetically arrested states in Nd doped LaFe{sub 11.5}Al{sub 1.5}

    Energy Technology Data Exchange (ETDEWEB)

    Bag, Pallab; Nath, R., E-mail: rnath@iisertvm.ac.in

    2017-03-15

    First order antiferromagnetic to ferromagnetic transition and path dependent magnetic states in La{sub 1−x}Nd{sub x}Fe{sub 11.5}Al{sub 1.5} for x∼0.1 are studied at low temperatures via powder x-ray diffraction, magnetization, and specific heat measurements. X-ray diffraction measurements suggest that around 8% of high temperature antiferromagnetic phase is converted to ferromagnetic phase at low temperatures in zero field cooling. A systematic study of temperature and magnetic field dependent magnetization measurements show a non-monotonic variation of upper critical field and re-entrant antiferromagnetic-ferromagnetic-antiferromagnetic transition while warming at an applied magnetic field under zero-field-cooled condition. This has been interpreted in the framework of kinetic arrest model for first order magnetic transition. It is also found that the antiferromagnetic phase is in the non-equilibrium state and behaves as a glass-like magnetic state at low temperatures. The specific heat in field-temperature space is studied and found to have a lower electronic contribution for the non-equilibrium antiferromagnetic state, compared to the equilibrium ferromagnetic state in this compound. - Highlights: • Structural and magnetic properties of La{sub 0.9}Nd{sub 0.1}Fe{sub 11.5}Al{sub 1.5} are investigated. • It shows coexistence and path dependent AFM and FM phases at low temperatures. • The AFM and FM phase fractions were estimated from the x-ray diffraction pattern. • Re-entrant transition and a non-monotonic variation of upper critical field. • The glass like AFM state is explained by the kinetic arrest model.

  16. Examining the Impact of Non-Technical Security Management Factors on Information Security Management in Health Informatics

    Science.gov (United States)

    Imam, Abbas H.

    2013-01-01

    Complexity of information security has become a major issue for organizations due to incessant threats to information assets. Healthcare organizations are particularly concerned with security owing to the inherent vulnerability of sensitive information assets in health informatics. While the non-technical security management elements have been at…

  17. Open source systems security certification

    CERN Document Server

    Damiani, Ernesto; El Ioini, Nabil

    2009-01-01

    Open Source Advances in Computer Applications book series provides timely technological and business information for: Enabling Open Source Systems (OSS) to become an integral part of systems and devices produced by technology companies; Inserting OSS in the critical path of complex network development and embedded products, including methodologies and tools for domain-specific OSS testing (lab code available), plus certification of security, dependability and safety properties for complex systems; Ensuring integrated systems, including OSS, meet performance and security requirements as well as achieving the necessary certifications, according to the overall strategy of OSS usage on the part of the adopter

  18. Ecological Security Pattern Analysis Based on InVEST and Least-Cost Path Model: A Case Study of Dongguan Water Village

    Directory of Open Access Journals (Sweden)

    Qian Lin

    2016-02-01

    Full Text Available The famous “world’s factory” city, Dongguan, like many other places in China, is a typical beneficiary of China’s Reform and Opening-up Policy. However, rapid urban sprawl and economic growth are at the expense of the destruction of the local environment. Therefore, it is of great importance to establish an ecological security network for sustainable development. InVEST models, effective tools to measure sensitivity and intensity of external threats to quantify habitat value, are used to calculate habitat quality of water and land. By combining structural connectivity and the Least-Cost Path model (LCP model, in which corridors are determined based on the minimum accumulative cost path between each critical point, ecological security patterns were calculated. According to the results, the northwest region of Dongguan, having a large quantity of farmlands and water and therefore many corridors and critical patches, is the most essential area in the overall security of ecological environments, which should be protected first. If developed, it should be dominated by eco-tourism and eco-agriculture. We hope that research on the ecological network, which includes critical patches and corridors formed by greenland and rivers, will lead toward better-informed proposals for local urban planning and regional sustainable development.

  19. Non-common path aberration correction in an adaptive optics scanning ophthalmoscope.

    Science.gov (United States)

    Sulai, Yusufu N; Dubra, Alfredo

    2014-09-01

    The correction of non-common path aberrations (NCPAs) between the imaging and wavefront sensing channel in a confocal scanning adaptive optics ophthalmoscope is demonstrated. NCPA correction is achieved by maximizing an image sharpness metric while the confocal detection aperture is temporarily removed, effectively minimizing the monochromatic aberrations in the illumination path of the imaging channel. Comparison of NCPA estimated using zonal and modal orthogonal wavefront corrector bases provided wavefronts that differ by ~λ/20 in root-mean-squared (~λ/30 standard deviation). Sequential insertion of a cylindrical lens in the illumination and light collection paths of the imaging channel was used to compare image resolution after changing the wavefront correction to maximize image sharpness and intensity metrics. Finally, the NCPA correction was incorporated into the closed-loop adaptive optics control by biasing the wavefront sensor signals without reducing its bandwidth.

  20. Adaptive versus Non-Adaptive Security of Multi-Party Protocols

    DEFF Research Database (Denmark)

    Canetti, Ran; Damgård, Ivan Bjerre; Dziembowski, Stefan

    2004-01-01

    Security analysis of multi-party cryptographic protocols distinguishes between two types of adversarial settings: In the non-adaptive setting the set of corrupted parties is chosen in advance, before the interaction begins. In the adaptive setting the adversary chooses who to corrupt during...... the course of the computation. We study the relations between adaptive security (i.e., security in the adaptive setting) and nonadaptive security, according to two definitions and in several models of computation....

  1. Russian Federation’s plans to deploy nuclear weapons in Crimea: the possible consequences for Ukraine and European security

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-06-01

    Full Text Available The article investigates the possible consequences for Ukraine and European security in case of deploying by Russian Federation nuclear weapons in Crimea. It was determined that under current conditions of confrontation between Ukraine and Russia such actions could further complicate the process of resolving the situation in the east of our country and threaten the implementation of peace initiatives regarding the resumption of constructive dialogue. It was found that the reluctance to disclose or hide the real intentions of Russia produces around Ukraine’s borders space of uncertainty and danger. This directly threatens the national security of our state and continue to make use of the power factor in relations with the Russian Federation. It is proved that Ukraine needs to do more emphasis on their own national identity and opportunities to prove its independence with regard to solving such questions. Substantiated the thesis that the European community should now take the necessary measures to prevent the development of the Russian Federation’s plans regarding the deployment of nuclear weapons in Crimea. This will give the opportunity to avoid misunderstandings and create a ground to prevent the destabilization of the European security system.

  2. Interest Groups and Strategic Constructivism: Business Actors and Border Security Policies in the European Union

    NARCIS (Netherlands)

    Baird, T.E.

    Evidence suggests that business lobbying shapes European Union (EU) border security policies, but there has been no detailed empirical and theoretical work detailing how interest groups exert influence in this domain. Building on strategic constructivist accounts of policy-making, the article argues

  3. The security of energy supply. The European seminar. The green book of the Commission. The IEA judgment. The strategic oil stocks

    International Nuclear Information System (INIS)

    Rose, D.; Burucoa, X.

    2001-01-01

    This issue of Energies et Matieres Premieres journal comprises five articles about the security of energy supplies in Europe and France. The first article is the opening talk given by Christian Pierret at the European seminar on the security of energy supplies (Paris-Bercy, France, Nov. 24 2000). The article gives a broad presentation of the French energy policy in the worldwide economical, political and environmental context of energy. The second article is the concluding talk given by Jean-Michel Charpin at the seminar. The third article reports on some excerpts of the technical summary that was used to elaborate the green book of the European commission about the security of energy supplies. The fourth article is a summary written in collaboration with the IEA about the French policy of security of energy supplies. The last article gives a presentation of the role and management of strategic oil stocks (historical aspects, rules and legal aspects, management of crises, economical impact of the US destocking of September 2000, proposal of the European Commission's green book). (J.S.)

  4. Jet path length dependence in Pb+Pb Collisions with the ATLAS detector

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00232412; The ATLAS collaboration

    2016-01-01

    The phenomenon of events containing highly asymmetric dijet pairs is one of the most striking results in heavy ion physics. It has provided the first direct observation of in-medium jet energy loss at the LHC. New results showing the variation of the dijet asymmetry with the angle between the leading jet and the second order event-plane are presented. This observable effectively probes the path-length dependence of the dijet asymmetry at fixed centrality. The variation of the dijet asymmetry with the soft particle v2, at fixed centrality is also measured. These measurements can provide a better understanding of the correlation of the parton energy-loss with the underlying geometry. Correlated production of nearby jets is also shown. Two neighbouring jets originating from the same hard scattering should have more similar path lengths in the medium compared to the two jets in the dijet event topology, therefore measuring neighbouring jets may probe differences in quenching that do not result from different path...

  5. Non-European traditional herbal medicines in Europe: a community herbal monograph perspective.

    Science.gov (United States)

    Qu, Liping; Zou, Wenjun; Zhou, Zhenxiang; Zhang, Tingmo; Greef, JanVander; Wang, Mei

    2014-10-28

    The European Directive 2004/24/EC introducing a simplified registration procedure for traditional herbal medicinal products, plays an important role in harmonising the current legislation framework for all herbal medicinal products in the European Union (EU). Although substantial achievements have been made under the new scheme, only a limited number of herbal medicinal products from non-European traditions commonly used in Europe have been registered. Therefore, identification of the obstacles, and determination of appropriate means to overcome the major challenges in the registration of non-European traditional herbal medicinal products are of critical importance for the EU herbal medicinal product market. The primary aims of this study were to understand the key issues and obstacles to registration of non-European traditional herbal medicinal products within the EU. The findings may identify the need for more attention on the Community herbal monographs elaborated by the Herbal Medicinal Products Committee (HMPC), as well as further evidence based scientific research on non-European herbal substances/preparations by the scientific community. A systematic evaluation of the herbal substances and preparations included in Community herbal monographs and public statements has been carried out. The focus was herbal substances and preparations derived from non-European traditions. Of the 109 adopted Community herbal monographs, 10 are herbal substances used in Chinese traditional medicine. Where the HMPC issued a public statement because it was unable to elaborate a monograph more than half-involved herbal substances/preparations from non-European traditions. The main reasons herbal substances/preparations from non-European traditions were not accepted for inclusion in the Community herbal monographs have been identified as due to unfulfilled requirements of Directive 2004/24/EC. The most common reasons were the lack of evidence to demonstrate a 15-year minimum

  6. Education of Non-European Ancestry Immigrant Students in Suburban High Schools

    Science.gov (United States)

    Shodavaram, Mary P.; Jones, Lisa A.; Weaver, Laurie R.; Marquez, Judith A.; Ensle, Anne L.

    2009-01-01

    The purpose of this study was to examine suburban high school teachers' beliefs about non-European ancestry immigrant students; more specifically, suburban teachers' beliefs regarding the impact of students' cultural backgrounds on academic performance were examined. Non-European ancestry immigrant students are those students whose ancestral…

  7. BRIEF OVERVIEW ON THE CONDITIONALITY IN THE EUROPEAN NEIGHBOURHOOD POLICY

    Directory of Open Access Journals (Sweden)

    Oana Mocanu

    2010-12-01

    Full Text Available The European Neighbourhood Policy (ENP has become a top issue on the EU agenda after the EU enlargement wave of 2004, completed in 2007. The question of efficiently managing the new borders of EU, by facing the new-fangled challenges related to security, combating trafficking, ensuring economic prosperity and environment protection has driven new and restructured EU mechanisms in order to manage the relations with its new neighbourhood - rather diverse in terms of economic and social welfare. Conditionality from the part of EU towards the ENP partner states has been an intricate issue even from the start. How committed can these countries be on the path of rough economic, political and social reforms, in the absence of a perspective of EU accession? If conditionality, as we know it from the pre-accession process of the former candidate states for example, is going to be a success or a failure in the case of the ENP states is still a matter of perception. This paper attempts to give an overview of different opinions upon the potential effect of the conditionality mechanism within the ENP. The victory or breakdown of conditionality within the ENP depends both on the commitment of the ENP partner states to the goals, values, concrete projects promoted through this policy and its consolidated initiatives (Eastern Partnership, Union for Mediterranean, but most of all on the capacity of the European Union to replace the traditional incentive of accession with a proper alternative, mostly in economic, financial, social and security terms.

  8. How partnership behaviour evolves in networks : path dependency, social figuration and life events

    NARCIS (Netherlands)

    Romme, A.G.L.; Akkermans, H.A.

    2008-01-01

    Networks have become the dominant life form in many organizational settings. Most studies of relationships in networks focus on the dyadic interaction between two agents. However, work on enactment, sensemaking, path dependency, and social figuration processes (e.g. by Weick and Elias) suggests

  9. Artificial Potential Field Approach to Path Tracking for a Non-Holonomic Mobile Robot

    DEFF Research Database (Denmark)

    Sørensen, M.J.

    2003-01-01

    This paper introduces a novel path tracking controller for an over-actuated robotic vehicle moving in an agricultural field. The vehicle itself is a four wheel steered, four wheel driven vehicle subject to the two non-holonomic constraints of free rolling and non-slipping wheels. A dynamic model...

  10. Addressing 2030 EU policy framework for energy and climate: Cost, risk and energy security issues

    International Nuclear Information System (INIS)

    Llano-Paz, Fernando de; Martínez Fernandez, Paulino; Soares, Isabel

    2016-01-01

    The different energy sources, their costs and impacts on the environment determine the electricity production process. Energy planning must solve the existence of uncertainty through the diversification of power generation technologies portfolio. The European Union energy and environmental policy has been mainly based on promoting the security of supply, efficiency, energy savings and the promotion of Renewable Energy Sources. The recent European Commission communication “Towards an European Energy Union: A secure, sustainable, competitive and affordable energy for every European” establishes the path for the European future. This study deals with the analysis of the latest EU “Energy Union” goals through the application of Markowitz portfolio theory considering technological real assets. The EU targets are assessed under a double perspective: economic and environmental. The model concludes that implementing a high share of Renewable Energy target in the design of European Policies is not relevant: the maximization of Renewable Energy share could be achieved considering a sole Low Emissions of carbon dioxide policy. Additionally it is confirmed the need of Nuclear energy in 2030: a zero nuclear energy share in 2030 European Mix is not possible, unless the technological limits participation for Renewable Energy Sources were increased. - Highlights: • Implementing a high RES share target in European Policies could not be relevant. • Maximizing RES share could be achieved considering a sole Low Emissions policy. • The EU 2030 Nuclear energy 50% shutting down could be feasible. • Minimizing risk portfolio presents high diversification and energy security levels.

  11. The Primacy of Alliance: Deterrence and European Security - Proliferation Papers No. 46

    International Nuclear Information System (INIS)

    Freedman, Lawrence

    2013-03-01

    Since the end of the Cold War, the international security environment has been transformed and nuclear weapons have been marginalized in the West. However, the NATO security policies remain almost unchanged: deterrence is still considered as a principle guiding the Atlantic Alliance, even though the actual policy statements lack target, direction and urgency. Questioning the credibility of deterrence in Europe and its future, this text recalls that it lies first and foremost with solidarity and political cohesion among members of the Alliance, and only secondly with the threat of nuclear retaliation. As a consequence, the decreasing salience of nuclear weapons in the West seems less worrying for the robustness of deterrence in Europe than a long-term and lasting shift of US foreign policy away from the European continent. (author)

  12. A synchrotron X-ray diffraction study of non-proportional strain-path effects

    International Nuclear Information System (INIS)

    Collins, D.M.; Erinosho, T.; Dunne, F.P.E.; Todd, R.I.; Connolley, T.; Mostafavi, M.; Kupfer, H.; Wilkinson, A.J.

    2017-01-01

    Common alloys used in sheet form can display a significant ductility benefit when they are subjected to certain multiaxial strain paths. This effect has been studied here for a polycrystalline ferritic steel using a combination of Nakajima bulge testing, X-ray diffraction during biaxial testing of cruciform samples and crystal plasticity finite element (CPFE) modelling. Greatest gains in strain to failure were found when subjecting sheets to uniaxial loading followed by balanced biaxial deformation, resulting in a total deformation close to plane-strain. A combined strain of approximately double that of proportional loading was achieved. The evolution of macrostrain, microstrain and texture during non-proportional loading were evaluated by in-situ high energy synchrotron diffraction. The results have demonstrated that the inhomogeneous strain accumulation from non-proportional deformation is strongly dependent on texture and the applied strain-ratio of the first deformation pass. Experimental diffraction evidence is supported by results produced by a novel method of CPFE-derived diffraction simulation. Using constitutive laws selected on the basis of good agreement with measured lattice strain development, the CPFE model demonstrated the capability to replicate ductility gains measured experimentally.

  13. Path Planning for Non-Circular, Non-Holonomic Robots in Highly Cluttered Environments.

    Science.gov (United States)

    Samaniego, Ricardo; Lopez, Joaquin; Vazquez, Fernando

    2017-08-15

    This paper presents an algorithm for finding a solution to the problem of planning a feasible path for a slender autonomous mobile robot in a large and cluttered environment. The presented approach is based on performing a graph search on a kinodynamic-feasible lattice state space of high resolution; however, the technique is applicable to many search algorithms. With the purpose of allowing the algorithm to consider paths that take the robot through narrow passes and close to obstacles, high resolutions are used for the lattice space and the control set. This introduces new challenges because one of the most computationally expensive parts of path search based planning algorithms is calculating the cost of each one of the actions or steps that could potentially be part of the trajectory. The reason for this is that the evaluation of each one of these actions involves convolving the robot's footprint with a portion of a local map to evaluate the possibility of a collision, an operation that grows exponentially as the resolution is increased. The novel approach presented here reduces the need for these convolutions by using a set of offline precomputed maps that are updated, by means of a partial convolution, as new information arrives from sensors or other sources. Not only does this improve run-time performance, but it also provides support for dynamic search in changing environments. A set of alternative fast convolution methods are also proposed, depending on whether the environment is cluttered with obstacles or not. Finally, we provide both theoretical and experimental results from different experiments and applications.

  14. Data on European non-residential buildings.

    Science.gov (United States)

    D'Agostino, Delia; Cuniberti, Barbara; Bertoldi, Paolo

    2017-10-01

    This data article relates to the research paper Energy consumption and efficiency technology measures in European non-residential buildings (D'Agostino et al., 2017) [1]. The reported data have been collected in the framework of the Green Building Programme that ran from 2006 to 2014. The project has encouraged the adoption of efficiency measures to boost energy savings in European non-residential buildings. Data focus on the one-thousand buildings that joined the Programme allowing to save around 985 GWh/year. The main requirement to join the Programme was the reduction of at least 25% primary energy consumption in a new or retrofitted building. Energy consumption before and after the renovation are provided for retrofitted buildings while, in new constructions, a building had to be designed using at least 25% less energy than requested by the country's building codes. The following data are linked within this article: energy consumption, absolute and relative savings related to primary energy, saving percentages, implemented efficiency measures and renewables. Further information is given about each building in relation to geometry, envelope, materials, lighting and systems.

  15. Kazakh Initiatives on Cooperation with European Union

    Directory of Open Access Journals (Sweden)

    Rustem S. Kurmanguzhin

    2015-01-01

    Full Text Available The author of this article presents initiatives of the Republic of Kazakhstan to develop cooperation with the European Union that was initiated through 2000 - 2009. In 2000 the Republic of Kazakhstan proposed to EU Comment cooperation doctrine in Central Asia. The purpose of the doctrine lied in expanding cooperation in the areas of trade, economy and investment; in granting access to commodities and services from European markets; in developing collaboration in the areas of energy, transport, communication, finance and banking. In 2006 Kazakhstan introduced a new set of prepossess to the new European Union Strategy for Central Asian 2007-2013 that was developed under the chairmanship of Germany of the EU in the first half of 2007. The Strategy covered areas of cooperation such as regional integration, economic development, democratization, energy and security. In 2008 under the instructions of the President of Kazakhstan Ministry of Foreign Affairs in cooperation with other ministries developed a state programme "Path to Europe" for 2009 - 2011, which aided the priorities of cooperation between Kazakhstan and the European Union. "Path to Europe" has become a key initiative of the Kazakh foreign policy that was successfully implemented, as well as the most important document aimed at modernization of the national economy and the Kazakh society. In the beginning of2009 using the accumulated positive experience of cooperation with the EU and experience of a number of countries in Europe and Asia, Kazakhstan devised and submitted a concept of a new treaty which was supposed to replace the Partnership and Cooperation Agreement of 1995. The Republic of Kazakhstan's influence eventually persuaded the European Union to agree on the necessity of devising the Enhanced Partnership and Cooperation Agreement.

  16. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    Full Text Available According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-governmental organisations, communities, and individual citizens. This has immediate bearing on the everyday security reality of the Czech Republic. In international context, the “security frontier” of the Czech Republic is expanding, e.g. through the country’s involvement in UN and NATO security missions in conflict-ridden regions of Europe and the world. The country also helps enhance the internal security of the European Union, whose strength depends on its Member States’ willingness to “harmonise” the pursuit of their respective national security interests. This approach is especially important with regard to the principal security threats Europe faces and will continue to face in the future: terrorism and organised crime. It is vital that the Czech Republic have a well-working security system capable of responding effectively to a broad range of threats. This requirement applies first and foremost to the Police, the Fire and Rescue Service, and intelligence services. Unfortunately, with the present effectiveness of the Czech security system, much remains wishful thinking and, due to the lack of a comprehensive framework, a comparatively low level of protection against emergencies exists. Fight against crime is hampered by inefficient operation of the Police and judiciary. A thorough analysis of the aforementioned problems could provide basis for a broader public debate over the priorities and goals of Czech security policy, which should

  17. THE EUROPEAN UNION MILITARY POWER: THE NEW CHALLENGES WITH OLD DILEMMAS

    Directory of Open Access Journals (Sweden)

    Blerim Ramadani

    2015-09-01

    Full Text Available Recent crises show clearly that Europeans security depends on external developments. The Common Security and Defense Policy failed to provide security, while the European Union military missions were limited in terms of their scope. This inability threatens the interests and security of the member states. Exactly, this research explores the concept of military power of the EU. In order to elaborate anatomy of military power of the EU, the descriptive-analytic method is used. Military performance analysis proves that the EU is able to have the greatest impact in the global arena. The research shows that with the achievement of a political strategy among the stakeholder, on which the replacement of the consensus mechanism with an ordinary majority is predicted, the EU would be able to lead a proactive and efficient security policy.

  18. Hybrid path planning for non-holonomic autonomous vehicles: An experimental evaluation

    NARCIS (Netherlands)

    Esposto, F.; Goos, J.; Teerhuis, A.; Alirezaei, M.

    2017-01-01

    Path planning of an autonomous vehicle as a non-holonomic system is an essential part for many automated driving applications. Parking a car into a parking lot and maneuvering it through a narrow corridor would be a common driving scenarios in an urban environment. In this study a hybrid approach

  19. The uniqueness of the energy security, justice, and governance problem

    International Nuclear Information System (INIS)

    Goldthau, Andreas; Sovacool, Benjamin K.

    2012-01-01

    This article argues that among all policy fields exhibiting externalities of a global scale, energy stands out on four dimensions: vertical complexity, horizontal complexity, higher entailed costs, and stronger path dependency. These structural attributes are at odds with contemporary key challenges of energy security, energy justice, and low carbon energy transition. With regard to the latter, energy governance challenges occur related to unclear levels of authority and weak resilience. This has implications for energy scholarship, specifically relating to the political economy of energy transitions, discussions about common pool resources, systems analysis, and other neighboring disciplines. - Highlights: ► Among all policy fields exhibiting global externalities, energy stands out. ► It is characterized by greater complexity, higher costs, and stronger path dependency. ► This is at odds with key challenges relating to security, justice, and transition. ► Problems are particularly related to unclear levels of authority and weak resilience. ► Energy scholarship needs to focus further on these issues.

  20. The Role of Europe in Peacekeeping and International Security

    Directory of Open Access Journals (Sweden)

    Pablo Antonio Fernández Sánchez

    1998-09-01

    Full Text Available All of the States in Europe belong to the United Nations and two of them enjoy status as Permanent Members of the Security Council, which is the primordial organism for dealing with peacekeeping and international security. Besides this, one or two European States have almost always been chosen to form part of the Security Council as rotating, non-permanent members, with voting priviliges and the capacity to design policies for peacekeeping and international security. Such State participation in the Security Council is not carried out collectively, but rather individually, which explains, in part, Europe’s political “dwarfism” in regards these two matters. Another aspect to consider is this: The 15 Member States of the European Union pay, on time, 35.41% of the United Nation’s budget, whereas the one State that pays the most, 25%, the United States of America, is a nation in persistent arrears, if not an endemic debtor. Before this, though, national egoisms ask each European country to impart its own foreign policy, a fact observed when each deals with security and peace matters. This individualistic isolationism is prejudicial to the many European interests, which are seen as fragmented if not in confrontation. The problematic above is seen to be growing in complexity for lack of a common defense structure that allows for pre-existent structures and logistics to facilitate the work of the United Nations in matters of peacekeeping and international security. To an analysis of these issues are these pages dedicated.

  1. Successes and Shortfalls of European Union Common Security and Defence Policy Missions in Africa

    DEFF Research Database (Denmark)

    Højstrup Christensen, Gitte; Kammel, Arnold; Nervanto, Elisa

    This brief synthesises the IECEU project’s most essential findings on the effectiveness of European Union (EU) missions in four Africa countries: Libya, South Sudan, the Democratic Republic of the Congo (DRC) and the Central African Republic (CAR). It describes the main elements and impact...... and context. However, the EU missions presented in this brief share the main characteristic that they have all been deployed under the union’s Common Security and Defence Policy (CSDP)2 with the explicit intent of improving the overall security situation and addressing conflicts in Africa. This brief...... will start by providing a short overview of each case, describing the conflict(s), security situation, mission objectives and obstacles. In this way, it compares the overall effectiveness of EU operational conflict prevention across the four African countries and discusses what lessons can be learned from...

  2. Ensuring Secure Non-interference of Programs by Game Semantics

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar

    Non-interference is a security property which states that improper information leakages due to direct and indirect flows have not occurred through executing programs. In this paper we investigate a game semantics based formulation of non-interference that allows to perform a security analysis...... of closed and open procedural programs. We show that such formulation is amenable to automated verification techniques. The practicality of this method is illustrated by several examples, which also emphasize its advantage compared to known operational methods for reasoning about open programs....

  3. IS A NEW EUROPEAN UNION ENERGY POLICY NEEDED?

    Directory of Open Access Journals (Sweden)

    Irina, PETRUCA

    2013-12-01

    Full Text Available In January 2009, because of a different between Russia and Ukraine, a major natural gas pipeline was closed, this being the worst gas cut-off of the decade. Eighteen countries have been interrupted from gas supplies and countries which had limited reserves and a shortage of alternative supply met a serious energy deficit, in the middle of an especially cold winter. After 22 days, the gas flows to all European countries were back to the normal level. A result of this, and of another similar dispute from 2006, was that the EU has put into question the confidence on the Russian gas supplies. The insecurity has led to a renewal of the political interest in energy security on EU level. The Russian cut-offs have been like a wake-up call to policy makers at a time when the EU faces significant energy security challenges as a result of the emerging world order. More than half of its energy, the EU buys from non-EU sources, while the demand for energy is always higher. In the meantime, the EU production levels of hydrocarbons are decreasing, leading to higher dependency on non-EU sources. Thereby, the energy security became a globally important topic and will raise important challenges for the EU in the future.

  4. Fractional path planning and path tracking

    International Nuclear Information System (INIS)

    Melchior, P.; Jallouli-Khlif, R.; Metoui, B.

    2011-01-01

    This paper presents the main results of the application of fractional approach in path planning and path tracking. A new robust path planning design for mobile robot was studied in dynamic environment. The normalized attractive force applied to the robot is based on a fictitious fractional attractive potential. This method allows to obtain robust path planning despite robot mass variation. The danger level of each obstacles is characterized by the fractional order of the repulsive potential of the obstacles. Under these conditions, the robot dynamic behavior was studied by analyzing its X - Y path planning with dynamic target or dynamic obstacles. The case of simultaneously mobile obstacles and target is also considered. The influence of the robot mass variation is studied and the robustness analysis of the obtained path shows the robustness improvement due to the non integer order properties. Pre shaping approach is used to reduce system vibration in motion control. Desired systems inputs are altered so that the system finishes the requested move without residual vibration. This technique, developed by N.C. Singer and W.P.Seering, is used for flexible structure control, particularly in the aerospace field. In a previous work, this method was extended for explicit fractional derivative systems and applied to second generation CRONE control, the robustness was also studied. CRONE (the French acronym of C ommande Robuste d'Ordre Non Entier ) control system design is a frequency-domain based methodology using complex fractional integration.

  5. Emergence of multilateral proto-institutions in global health and new approaches to governance: analysis using path dependency and institutional theory.

    Science.gov (United States)

    Gómez, Eduardo J; Atun, Rifat

    2013-05-10

    The role of multilateral donor agencies in global health is a new area of research, with limited research on how these agencies differ in terms of their governance arrangements, especially in relation to transparency, inclusiveness, accountability, and responsiveness to civil society. We argue that historical analysis of the origins of these agencies and their coalition formation processes can help to explain these differences. We propose an analytical approach that links the theoretical literature discussing institutional origins to path dependency and institutional theory relating to proto institutions in order to illustrate the differences in coalition formation processes that shape governance within four multilateral agencies involved in global health. We find that two new multilateral donor agencies that were created by a diverse coalition of state and non-state actors, such as the Global Fund to Fight AIDS, Tuberculosis and Malaria and GAVI, what we call proto-institutions, were more adaptive in strengthening their governance processes. This contrasts with two well-established multilateral donor agencies, such as the World Bank and the Asian Development Bank, what we call Bretton Woods (BW) institutions, which were created by nation states alone; and hence, have different origins and consequently different path dependent processes.

  6. Methodological Bases for Ranking the European Union Countries in Terms of Macroeconomic Security

    Directory of Open Access Journals (Sweden)

    Tymoshenko Olena V.

    2015-11-01

    Full Text Available The fundamental contradictions of existing methodical approaches to assessing the level of the state economic security have been substantiated and proposals on the introduction of a unified methodology for its assessment, which would be acceptable for use at the international level or for a specific cluster of countries, have been developed. Based on the conducted researches it has been found that the there are no unified signs for such classification of countries. To determine the most significant coefficients and critical values of the indicators of economic security, it is appropriate that the countries should be grouped in terms of the level of the economic development proposed by the UN Commission and the IMF. Analysis of the economic security level has been conducted for the countries-members of the European Union as a separate cluster of countries on the example of macroeconomic security indicators. Based on the evaluation it has been found that the proposed list of indicators and their critical values is economically sound and built on the principle of adequacy, representativeness and comprehensiveness. In 2004 the most secure countries of the EU corresponding to the macroeconomic security standards were Austria, Denmark, Sweden, Finland, and as in 2014 the percentage of absolutely secure countries decreased from 14.3 to 7.1%, only Denmark and Sweden remained in the ranking. During the analyzed period Bulgaria and Croatia got into the risk zone, Estonia, Lithuania, Latvia, Romania were in a danger zone. In 2014 Ukraine in terms of its macroeconomic security was in a critical state, which testified about serious structural and system imbalances in its development.

  7. European Uunion Energy Security and Russia

    Directory of Open Access Journals (Sweden)

    Nodari A. Simonia

    2015-01-01

    Full Text Available The article deals with the retrospective of relations between Russia, USA and EU in the sphere of energy security, as well as their interaction regarding the current political crisis in the Ukraine. Particular attention is paid to the evolution of the key actors'positions and the development of their relations within the framework of the regulatory regimes established by the most significant agreements in the energy sphere. In conclusion the authors claim that what they say in their article not only does substantially reinforce the arguments set forth by Professor Giuseppe Guarino, who argues about the negative consequences caused by the dictatorship of the Brussels's bureaucracy within the EU, but also inflicts another blow on the Maastricht Treaty and the Treaty of Lisbon in terms of external policy and trade, since the both Treaties were designed to convert the EU in a real competitor of the United States in the then forming multipolar World. The Brussel's bureaucracy, having turned into a dutiful instrument of the US geopolitical strategy, hindered the movement of the EU in that direction, while its dictatorship in energy security aggravates the crisis situation of the EU, almost pushing the EU to the brink of collapse and disintegration. We have lately witnessed an evolving and growing phenomenon of the so called "Euroscepticism". The results of the Europarliament elections in late May, 2014, were a graphic demonstration of the symptoms of this alarming for the EU disease, when the anti-EU parties in the four out 22 EU countries won the elections (France, United Kingdom, Denmark, and Greece Those results, regardless of the panic headlines in mass media and statements like "shocking" or "earthquake" made by some politicians, were not able to significantly affect the nature of the European Parliament, though they can significantly complicate its work. This is so far the first "alarming bell" tolling for the EU.

  8. A review of national gas emergency plans in the European Union

    International Nuclear Information System (INIS)

    Zeniewski, Peter; Bolado-Lavin, Ricardo

    2012-01-01

    The purpose of this paper is to document and review existing national gas emergency plans in the European Union, following the guidelines and requirements set out by the EU's Regulation 994/2010 concerning measures to safeguard security of gas supply. Despite the great deal of attention paid to questions of natural gas security in an increasingly import-dependent European Union, the contingency plans of most of its member states have not been widely published or scrutinized. By reviewing TSO network codes and national legal and regulatory acts, this paper teases out the key similarities and differences between member states' emergency planning frameworks, tools and methods. A gas emergency operational template is subsequently proposed that conforms to EU legislation. This is followed by a discussion of emergency planning in the context of regional cooperation and the liberalizing European gas market. The paper concludes by advocating gas emergency measures which are proportionate to the crisis level, sensitive to the gas demand profile, aware of the regional context, inconsequential to normal market operation, transparent and non-discriminatory during implementation and verifiable during emergencies as well as under normal conditions. - Highlights: ► National gas emergency plans in the EU comprehensively assessed. ► Template for gas emergencies is created to measure conformity to Regulation 994/2010. ► Gas emergency measures are related to regional cooperation and liberal markets.

  9. THE ROLE OF THE COMPETITION POLICY IN FORGING THE EUROPEAN COMMON MARKET

    Directory of Open Access Journals (Sweden)

    Radu-Cristian Muşetescu

    2008-12-01

    Full Text Available The forging of the Single Market represents the most important dimension of the first pillar of the European Union, which is the European Community. It can be argued that, as compared to the other two pillars (the Common Foreign and Security Policy and the Police and Judicial Cooperation in the Criminal Matters, it has the most powerful impact on the welfare of European citizens. The European policy makers define however the Internal Market as not only an economic area where there are no more state-imposed barriers in the path of the freedom of movement of goods and services at the borders of the member-states but also a single business environment where there are a single currency, coordinated economic policies as well as homogeneous business practices of private undertakings. In this process, despite a large set of common policies, the competition policy has reached the status of the building block of the Common Market.

  10. Parton densities in quantum chromodynamics. Gauge invariance, path-dependence, and Wilson lines

    International Nuclear Information System (INIS)

    Cherednikov, Igor O.

    2017-01-01

    The purpose of this book is to give a systematic pedagogical exposition of the quantitative analysis of Wilson lines and gauge-invariant correlation functions in quantum chromodynamics. Using techniques from the previous volume (Wilson Lines in Quantum Field Theory, 2014), an ab initio methodology is developed and practical tools for its implementation are presented. Emphasis is put on the implications of gauge invariance and path-dependence properties of transverse-momentum dependent parton density functions. The latter are associated with the QCD factorization approach to semi-inclusive hadronic processes, studied at currently operating and planned experimental facilities.

  11. Parton densities in quantum chromodynamics. Gauge invariance, path-dependence, and Wilson lines

    Energy Technology Data Exchange (ETDEWEB)

    Cherednikov, Igor O. [Antwerpen Univ. (Belgium). Dept. Fysica; Veken, Frederik F. van der [CERN, Geneva (Switzerland)

    2017-05-01

    The purpose of this book is to give a systematic pedagogical exposition of the quantitative analysis of Wilson lines and gauge-invariant correlation functions in quantum chromodynamics. Using techniques from the previous volume (Wilson Lines in Quantum Field Theory, 2014), an ab initio methodology is developed and practical tools for its implementation are presented. Emphasis is put on the implications of gauge invariance and path-dependence properties of transverse-momentum dependent parton density functions. The latter are associated with the QCD factorization approach to semi-inclusive hadronic processes, studied at currently operating and planned experimental facilities.

  12. Prediction of Process-Induced Distortions in L-Shaped Composite Profiles Using Path-Dependent Constitutive Law

    Science.gov (United States)

    Ding, Anxin; Li, Shuxin; Wang, Jihui; Ni, Aiqing; Sun, Liangliang; Chang, Lei

    2016-10-01

    In this paper, the corner spring-in angles of AS4/8552 L-shaped composite profiles with different thicknesses are predicted using path-dependent constitutive law with the consideration of material properties variation due to phase change during curing. The prediction accuracy mainly depends on the properties in the rubbery and glassy states obtained by homogenization method rather than experimental measurements. Both analytical and finite element (FE) homogenization methods are applied to predict the overall properties of AS4/8552 composite. The effect of fiber volume fraction on the properties is investigated for both rubbery and glassy states using both methods. And the predicted results are compared with experimental measurements for the glassy state. Good agreement is achieved between the predicted results and available experimental data, showing the reliability of the homogenization method. Furthermore, the corner spring-in angles of L-shaped composite profiles are measured experimentally and the reliability of path-dependent constitutive law is validated as well as the properties prediction by FE homogenization method.

  13. The European Union, the ESDP, and the question of Turkey /

    OpenAIRE

    Taylor, Alistair

    2005-01-01

    This paper analyses the potential contribution in terms of crude capabilities that Turkey could bring to the European Union’s ESDP security framework. The history of the European Union’s security aspirations and the security policy preferences of the major actors in European security will also be examined as a way of framing the question of Turkey's potential role within the emerging European security and defense framework. The second chapter will look at how European security has evolved fro...

  14. Internal Security Cooperation under Functional Expectations: Initial Law Enforcement Europeanization - Case of Finland and Estonia

    Directory of Open Access Journals (Sweden)

    Ramon Loik

    2016-03-01

    Full Text Available Law enforcement cooperation as a central part of the EU internal security policy to combat cross-border organised crime and terrorism needs to be more effective by adopting specific provisions and tools. This paper argues that functional expectations require removal of barriers and construction of a common security area, but sometimes better cooperation in practice does not fit, as Europeanization of law enforcement still lacks understanding of objectives, values and principles for improving international trust, consensus, sincere cooperation and effective national coordination. The level of Europeanization of law enforcement could be evaluated as based on the level of implementation of the EU provisions on police cooperation related to practical enforcement, factors promoting or hindering law enforcement and changes in discursive practices due to EU provisions and professional socialisation processes. Some aspects of observed inertia characterizes the slow process of transition or tendencies for absorption in which resilience meets the necessary degree of flexibility allowing for some mutual learning and cooperation, but the result is expectedly a form of accommodation of needful policy requirements in the lack of substantial change perspective.

  15. Import dependence of industrial enterprises in the region as an economic security hazard

    Directory of Open Access Journals (Sweden)

    A. N. Makarov

    2010-12-01

    Full Text Available Import is traditionally considered as a source for saturation of a home market with scarce commodities or goods non-manufactured in an importing country. However, the larger is the share of import in the total volume of deliveries, the greater is the hazard for economic security of the region and for the state upon the whole. The analysis has revealed the fact that in the regional industry there is a real situation of absolute import dependence. It means that enterprises have been functioning only based on import deliveries to manufacture some single components for products of production-technical purposes.

  16. Controlling the optical path length in turbid media using differential path-length spectroscopy: fiber diameter dependence

    NARCIS (Netherlands)

    Kaspers, O. P.; Sterenborg, H. J. C. M.; Amelink, A.

    2008-01-01

    We have characterized the path length for the differential path-length spectroscopy (DPS) fiber optic geometry for a wide range of optical properties and for fiber diameters ranging from 200 mu m to 1000 mu m. Phantom measurements show that the path length is nearly constant for scattering

  17. Path Dependence and Institutional Change in Brazilian Development

    Directory of Open Access Journals (Sweden)

    Kleber Chagas Cerqueira

    2015-06-01

    Full Text Available The left turn in Latin American politics has been associated to a new consensus over the role of the state in fostering development. Brazil historically stands as one of the most socially and economically unequal countries in the world. However, data on poverty reduction and social mobility in the country in the last decade have brought back the recognition of Brazilian government's ability to conduct a development process, which was strongly questioned since the fiscal crisis of the 80s. Drawing on the literature of path dependency and institutional change, the paper presents an analysis of these changes, focusing on the central question: to what extent the rise of a left-wing party to power and mentioned changes represent a break with the legacy of institutional development of the country and to what extent are them conditioned by this legacy?

  18. Model-Based Security Testing

    Directory of Open Access Journals (Sweden)

    Ina Schieferdecker

    2012-02-01

    Full Text Available Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security testing (MBST is a relatively new field and especially dedicated to the systematic and efficient specification and documentation of security test objectives, security test cases and test suites, as well as to their automated or semi-automated generation. In particular, the combination of security modelling and test generation approaches is still a challenge in research and of high interest for industrial applications. MBST includes e.g. security functional testing, model-based fuzzing, risk- and threat-oriented testing, and the usage of security test patterns. This paper provides a survey on MBST techniques and the related models as well as samples of new methods and tools that are under development in the European ITEA2-project DIAMONDS.

  19. Institutional path dependence and environmental water recovery in Australia’s Murray-Darling Basin

    Directory of Open Access Journals (Sweden)

    Graham R. Marshall

    2016-10-01

    Full Text Available The concept of institutional path dependence offers useful ways of understanding the trajectories of water policy reforms and how past institutional arrangements, policy paradigms and development patterns constrain current and future choices and limit institutional adaptability. The value of this concept is demonstrated through an analysis of environmental water recovery in Australia’s Murray-Darling Basin, where while significant water volumes have been reallocated to the environment, the costs have also been significant. While there are significant lessons from the Australian experience, attempts to emulate the approach involve substantive risks and may be prohibitively costly for less wealthy nations. Context-specific institutional analysis is emphasised as fundamental to water reform and critical for reform architecture and sequencing. A key finding is that while crisis can provide powerful catalysts for institutional innovation, institutional path dependence in the absence of active and disruptive policy entrepreneurs fosters a strong tendency to reinforce the status quo and limit innovation, potentially exposing social-ecological systems to greater shocks due to climate change and other sources of escalating uncertainty.

  20. The energy divide: Integrating energy transitions, regional inequalities and poverty trends in the European Union

    Science.gov (United States)

    Bouzarovski, Stefan; Tirado Herrero, Sergio

    2016-01-01

    Energy poverty can be understood as the inability of a household to secure a socially and materially necessitated level of energy services in the home. While the condition is widespread across Europe, its spatial and social distribution is highly uneven. In this paper, the existence of a geographical energy poverty divide in the European Union (EU) provides a starting point for conceptualizing and exploring the relationship between energy transitions – commonly described as wide-ranging processes of socio-technical change – and existing patterns of regional economic inequality. We have undertaken a comprehensive analysis of spatial and temporal trends in the national-scale patterns of energy poverty, as well as gas and electricity prices. The results of our work indicate that the classic economic development distinction between the core and periphery also holds true in the case of energy poverty, as the incidence of this phenomenon is significantly higher in Southern and Eastern European EU Member States. The paper thus aims to provide the building blocks for a novel theoretical integration of questions of path-dependency, uneven development and material deprivation in existing interpretations of energy transitions. PMID:28690374

  1. Brexit na perspectiva do Path Dependency

    Directory of Open Access Journals (Sweden)

    Giorgio Romano Schutte

    2018-02-01

    Full Text Available Esta pesquisa analisou o Brexit em uma perspectiva histórica, focando a conturbada relação entre a Europa continental e o Reino Unido ao longo do século XX, com ênfase no período pós Segunda Guerra Mundial. Foi utilizado o conceito de path dependency para argumentar sobre o papel de fatores históricos e decisões do passado, embora tomados em outras circunstâncias, ainda com força para influenciar o presente, para entender o Brexit. A premissa básica que será apresentada no ensaio é que o Reino Unido nunca participou de fato da ideia da Europa e sempre se viu como um país diferente por sua história e seu papel no mundo. Quando entrou, foi com uma perna só, a outra sempre ficou atrás, inclusive devido às especificidades de sua estrutura econômica herdada do passado, em particular no que diz respeito à agricultura. Desta forma, defende-se que, embora longe de ter sido inevitável, se tratou de um fenômeno limitado ao Reino Unido que tinha pouquíssima probabilidade de se repetir em outros países da União Europeia.

  2. Time Dependence of Entropy Flux and Entropy Production of a Dissipative Dynamical System Driven by Non-Gaussian Noise

    International Nuclear Information System (INIS)

    Guo Yongfeng; Xu Wei; Li Dongxi; Xie Wenxian

    2008-01-01

    A stochastic dissipative dynamical system driven by non-Gaussian noise is investigated. A general approximate Fokker-Planck equation of the system is derived through a path-integral approach. Based on the definition of Shannon's information entropy, the exact time dependence of entropy flux and entropy production of the system is calculated both in the absence and in the presence of non-equilibrium constraint. The present calculation can be used to interpret the interplay of the dissipative constant and non-Gaussian noise on the entropy flux and entropy production

  3. US oil dependency and energy security

    International Nuclear Information System (INIS)

    Noel, P.

    2002-12-01

    As an introduction to the seminar of the 30 May 2002 on the US oil dependency and energy security, the author analyzes the different factors which characterize the american petroleum market situation today. A special interest is thus done to the price increase of 1999-2000 due to the legislation evolution, the gas market tensions, the impact and the power of the OPEC on the international markets, the 11 September 2001 attempts and their political and military consequences. The author also discusses about three papers written after the seminar. (A.L.B.)

  4. Path dependence, initial conditions, and routines in organizations : The Toyota production system re-examined

    NARCIS (Netherlands)

    Dolfsma, W.A.; van Driel, H.

    2009-01-01

    Purpose - The purpose of this paper is to disentangle and elaborate on the constitutive elements of the concept of path dependence (initial conditions and lock-in) for a concerted and in-depth application to the study of organizational change. Design/methodology/approach - The approach takes the

  5. Viii. Attachment and sleep among toddlers: disentangling attachment security and dependency.

    Science.gov (United States)

    Bélanger, Marie-Ève; Bernier, Annie; Simard, Valérie; Bordeleau, Stéphanie; Carrier, Julie

    2015-03-01

    Many scholars have proposed that parent-child attachment security should favor child sleep. Research has yet, however, to provide convincing support for this hypothesis. The current study used objective measures of sleep and attachment to assess the longitudinal links between mother-child attachment security and subsequent sleep, controlling for child dependency. Sixty-two middle-class families (30 girls) were met twice, when children were 15 months (Wave 1; W1) and 2 years of age (Wave 2; W2). At W1, mother-child attachment was assessed with the observer version of the Attachment Q-Sort. At W2, children wore an actigraph monitor for 72 hr. Results indicated that children more securely attached to their mothers subsequently slept more at night and had higher sleep efficiency, and these predictions were not confounded by child dependency. These findings suggest a unique role for secure attachment relationships in the development of young children's sleep regulation, while addressing methodological issues that have long precluded consensus in this literature. © 2015 The Society for Research in Child Development, Inc.

  6. Minimizing the Carbon Footprint for the Time-Dependent Heterogeneous-Fleet Vehicle Routing Problem with Alternative Paths

    Directory of Open Access Journals (Sweden)

    Wan-Yu Liu

    2014-07-01

    Full Text Available Torespondto the reduction of greenhouse gas emissions and global warming, this paper investigates the minimal-carbon-footprint time-dependent heterogeneous-fleet vehicle routing problem with alternative paths (MTHVRPP. This finds a route with the smallestcarbon footprint, instead of the shortestroute distance, which is the conventional approach, to serve a number of customers with a heterogeneous fleet of vehicles in cases wherethere may not be only one path between each pair of customers, and the vehicle speed differs at different times of the day. Inheriting from the NP-hardness of the vehicle routing problem, the MTHVRPP is also NP-hard. This paper further proposes a genetic algorithm (GA to solve this problem. The solution representedbyour GA determines the customer serving ordering of each vehicle type. Then, the capacity check is used to classify multiple routes of each vehicle type, and the path selection determines the detailed paths of each route. Additionally, this paper improves the energy consumption model used for calculating the carbon footprint amount more precisely. Compared with the results without alternative paths, our experimental results show that the alternative path in this experimenthas a significant impact on the experimental results in terms of carbon footprint.

  7. Commentary and contributions to green paper (alphabetical sort. Towards a European strategy for the security supply)

    International Nuclear Information System (INIS)

    2005-01-01

    This document provides the answers formulated by the nuclear industry operators to the thirteen following questions: 1. Can the European Union accept an increase in its dependence on external energy sources without undermining its security of supply and European competitiveness? If this were the case, for which sources of energy would it be appropriate to contemplate a framework policy for imports? In this case, is it appropriate to favour an economic approach, in terms of energy cost, or a geopolitical approach in terms of the risk of disruption? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Do tax and State aid policies in the energy sector impair competitiveness in the European Union or not? Given the failure of attempts to harmonize indirect taxation, should the whole issue of energy taxation not be re-examined in view, in particular, of the energy and environmental targets? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investment be guaranteed? 5. Should more reserves be stockpiled and should other energy sources be included, such as gas or coal? Should the Community take on a greater role in stock management and, if so, what should the objectives and modalities be? Does the risk of physical disruption to energy supply justify more onerous measures for access to resources? 6. How can we ensure the development and better operation of energy transport networks in the European Union and neighbouring countries that enable the internal market to function properly and guarantee security of supply? 7. The development of some renewable energy sources calls for

  8. Commentary and contributions to green paper (alphabetical sort. Towards a European strategy for the security supply)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This document provides the answers formulated by the nuclear industry operators to the thirteen following questions: 1. Can the European Union accept an increase in its dependence on external energy sources without undermining its security of supply and European competitiveness? If this were the case, for which sources of energy would it be appropriate to contemplate a framework policy for imports? In this case, is it appropriate to favour an economic approach, in terms of energy cost, or a geopolitical approach in terms of the risk of disruption? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Do tax and State aid policies in the energy sector impair competitiveness in the European Union or not? Given the failure of attempts to harmonize indirect taxation, should the whole issue of energy taxation not be re-examined in view, in particular, of the energy and environmental targets? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investment be guaranteed? 5. Should more reserves be stockpiled and should other energy sources be included, such as gas or coal? Should the Community take on a greater role in stock management and, if so, what should the objectives and modalities be? Does the risk of physical disruption to energy supply justify more onerous measures for access to resources? 6. How can we ensure the development and better operation of energy transport networks in the European Union and neighbouring countries that enable the internal market to function properly and guarantee security of supply? 7. The development of some renewable energy sources calls for

  9. European Security through EU-Russian Relations: Towards a New Multilateral Order?

    Directory of Open Access Journals (Sweden)

    Sandra Fernandes

    2011-05-01

    Full Text Available Since the end of the Cold War, the EU and Russia have managed to create an original framework for institutionalised cooperation despite asymmetric characteristics. Yet, the way these two main security actors interact has an impact on the (non-resolution of security issues in Europe, ranging from ‘‘frozen conflicts’’ to the discussion of the security architecture. Since the second mandate of President Putin, the relation has been characterised by two paradoxical features. On the one hand, the methodology and the domains of cooperation have reached a high degree of achievement. On the other hand, the political quality of the relationship has deteriorated and it is not able to achieve the desired ‘‘strategic partnership’’ that should be based on a common set of values and principles. This article aims to define multilateralism as a paradigm applicable to EU-Russian relations. It examines their relationship in the security and defence realm and the Union’s reactions to a new security approach by Russia since the 2008 Medvedev proposal. The article questions how the EU-Russian political dialogue impacts on multilateralism in the security field. The conclusion considers EU-Russian relations as a peculiar multilateral playground addressing common security challenges, which still needs to be developed further in order to be instrumental in the search for collective and legitimate solutions.

  10. The Nabucco Project and Communicating about Energy Security

    Directory of Open Access Journals (Sweden)

    Victor Negrescu

    2013-07-01

    Full Text Available Energy Security was considered by many of the Eastern European countries a priority in their fight for breaking the ties with the former Soviet Union. The dependence of the Eastern European countries to the Russian gas and petroleum generated for most of the local governments a feeling of inferiority that they were willing to replace if the opportunity will be offered. One of the main alternative projects to the Russian gas is the Nabucco Project designed to enable the access to Caspian gas for all the European countries. Knowing that a decision on the realization of the pipeline should be made by the end of June 2013, our article will try to illustrate the importance of the Nabucco Project for the regional and European energy security by studying the history of the project, the competing projects and the recent political evolutions of the project. This will enable researchers, decision makers and policy makers in the energy sector to better evaluate the Nabucco project and better act into promoting it.

  11. European energy supplies; some considerations

    International Nuclear Information System (INIS)

    Bahgat, G.

    2009-01-01

    European leaders are increasing conscious of their heavy dependence on energy supplies from Russia. In an attempt to articulate a strategy to improve energy security and Solidarity Action Plan in november 2008. This essay examines the E U-Russia energy partnership and argues that despite a number of supply-interruptions, of threats of interruptions, the interdependence between Brussels and Moscow is likely to endure, at least the foreseeable future. [it

  12. European Union concerns with its energy dependence

    International Nuclear Information System (INIS)

    Commeau, N.

    2001-01-01

    European Union (E.U.) produces only half its needs concerning energy. It is expected that by 2030, the energy balance will be 86% for fossil energies, 8% for renewable energies and 6% for nuclear energy. Different scenario show that the dependence of E.U will worsen and reach 70% unless a common strategy is launched to curb the tendency. E.U is elaborating a common policy concerning energy, this policy rests on 4 axis: 1) monitoring the increase of the energy consumption by promoting energy savings in housing and transport, 2) directing the energy demand towards less polluting energy by using taxes, public funding and European regulations as incentive tools, 3) sustaining a constant dialogues with energy exporting countries in order to get a more stable energy market and have a benefiting influence on prices, and 4) developing new routes of importation of energy by for instance contributing to the construction of new oil or gas pipeline networks. (A.C.)

  13. Fragmentation function in non-equilibrium QCD using closed-time path integral formalism

    International Nuclear Information System (INIS)

    Nayak, Gouranga C.

    2009-01-01

    In this paper we implement the Schwinger-Keldysh closed-time path integral formalism in non-equilibrium QCD in accordance to the definition of the Collins-Soper fragmentation function. We consider a high-p T parton in QCD medium at initial time τ 0 with an arbitrary non-equilibrium (non-isotropic) distribution function f(vector (p)) fragmenting to a hadron. We formulate the parton-to-hadron fragmentation function in non-equilibrium QCD in the light-cone quantization formalism. It may be possible to include final-state interactions with the medium via a modification of the Wilson lines in this definition of the non-equilibrium fragmentation function. This may be relevant to the study of hadron production from a quark-gluon plasma at RHIC and LHC. (orig.)

  14. Information Security Service Branding – beyond information security awareness

    Directory of Open Access Journals (Sweden)

    Rahul Rastogi

    2012-12-01

    Full Text Available End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, it is vital to improve the image of information security in the minds of end-users. This paper borrows the concepts of brands and branding from the domain of marketing to achieve this objective and applies these concepts to information security. The paper also describes a process for creating the information security service brand in the organization.

  15. Minimum deterrence and regional security. Section 2. Other regions

    International Nuclear Information System (INIS)

    Azikiwe, A.E.

    1993-01-01

    Compared to European political and security circumstance, minimum deterrence is less an illusion in other regions where weapon free zones already exist. It will continue to be relevant to the security of other regions. Strategic arms limitation should be pursued vigorously in a constructive and pragmatic manner, bearing in mind the need to readjust to new global challenges. The Comprehensive Test Ban Treaty is the linchpin on which the Non-proliferation Treaty rests

  16. European Security Organizations in the Post-Cold-War Security Environment. The New Frame of European Security

    National Research Council Canada - National Science Library

    Bugai, Veaceslav

    2006-01-01

    .... In particular, it gives an over view of the transformations that occurred within NATO and OSCE in the post-Cold War period, which have created and developed new security mechanisms and policies for dealing with crises...

  17. The strain path dependence of plastic deformation response of AA5754: Experiment and modeling

    International Nuclear Information System (INIS)

    Pham, Minh-Son; Hu, Lin; Iadicola, Mark; Creuziger, Adam; Rollett, Anthony D.

    2013-01-01

    This work presents modeling of experiments on a balanced biaxial (BB) pre-strained AA5754 alloy, subsequently reloaded uniaxially along the rolling direction and transverse direction. The material exhibits a complex plastic deformation response during the change in strain path due to 1) crystallographic texture, 2) aging (interactions between dislocations and Mg atoms) and 3) recovery (annihilation and re-arrangement of dislocations). With a BB prestrain of about 5 %, the aging process is dominant, and the yield strength for uniaxially deformed samples is observed to be higher than the flow stress during BB straining. The strain hardening rate after changing path is, however, lower than that for pre-straining. Higher degrees of pre-straining make the dynamic recovery more active. The dynamic recovery at higher strain levels compensates for the aging effect, and results in: 1) a reduction of the yield strength, and 2) an increase in the hardening rate of re-strained specimens along other directions. The yield strength of deformed samples is further reduced if these samples are left at room temperature to let static recovery occur. The synergistic influences of texture condition, aging and recovery processes on the material response make the modeling of strain path dependence of mechanical behavior of AA5754 challenging. In this study, the influence of crystallographic texture is taken into account by incorporating the latent hardening into a visco-plastic self-consistent model. Different strengths of dislocation glide interaction models in 24 slip systems are used to represent the latent hardening. Moreover, the aging and recovery effects are also included into the latent hardening model by considering strong interactions between dislocations and dissolved atom Mg and the microstructural evolution. These microstructural considerations provide a powerful capability to successfully describe the strain path dependence of plastic deformation behavior of AA5754

  18. Spatio-temporal aspects of gated residential security estates in non-metropolitan Western Cape

    CSIR Research Space (South Africa)

    Spocter, M

    2011-04-01

    Full Text Available . This research attempts to address this research gap by focusing on the spatio-temporal aspects of non-metropolitan gated residential security estates in the Western Cape Province. It was found that most non-metropolitan gated residential security estates were...

  19. Non-mechanical optical path switching and its application to dual beam spectroscopy including gas filter correlation radiometry

    Science.gov (United States)

    Sachse, Glen W. (Inventor); Wang, Liang-Guo (Inventor)

    1992-01-01

    A non-mechanical optical switch is developed for alternately switching a monochromatic or quasi-monochromatic light beam along two optical paths. A polarizer polarizes light into a single, e.g., vertical component which is then rapidly modulated into vertical and horizontal components by a polarization modulator. A polarization beam splitter then reflects one of these components along one path and transmits the other along the second path. In the specific application of gas filter correlation radiometry, one path is directed through a vacuum cell and one path is directed through a gas correlation cell containing a desired gas. Reflecting mirrors cause these two paths to intersect at a second polarization beam splitter which reflects one component and transmits the other to recombine them into a polarization modulated beam which can be detected by an appropriate single sensor.

  20. Implementing the Kyoto mechanisms. Political barriers and path dependence

    International Nuclear Information System (INIS)

    Woerdman, E.

    2002-01-01

    The objective of the research on the title thesis is to identify and explain political barriers as well as the opportunities to overcome them. Special attention is paid to permit trading, because it is the superior alternative according to neo-classical economic theory. The author's approach is a combination of (1) political science, (2) (neo-)institutional economics and (3) law and economics. An innovative theoretical framework is presented by transforming lock-in theory from a technological and economic context to an institutional context against the background of the political barrier model. This theoretical framework allows to explain the functioning of these political barriers (including institutional, legal and cultural ones), for instance in terms of path-dependencies, positive feedbacks and set-up costs. Empirical analyses are performed to test (parts of) the theory

  1. Surveillance and laboratory detection for non-polio enteroviruses in the European Union/European Economic Area, 2016

    Science.gov (United States)

    Harvala, Heli; Jasir, Aftab; Penttinen, Pasi; Pastore Celentano, Lucia; Greco, Donato; Broberg, Eeva

    2017-01-01

    Enteroviruses (EVs) cause severe outbreaks of respiratory and neurological disease as illustrated by EV-D68 and EV-A71 outbreaks, respectively. We have mapped European laboratory capacity for identification and characterisation of non-polio EVs to improve preparedness to respond to (re)-emerging EVs linked to severe disease. An online questionnaire on non-polio EV surveillance and laboratory detection was submitted to all 30 European Union (EU)/European Economic Area (EEA) countries. Twenty-nine countries responded; 26 conducted laboratory-based non-polio EV surveillance, and 24 included neurological infections in their surveillance. Eleven countries have established specific surveillance for EV-D68 via sentinel influenza surveillance (n = 7), typing EV-positive respiratory samples (n = 10) and/or acute flaccid paralysis surveillance (n = 5). Of 26 countries performing non-polio EV characterisation/typing, 10 further characterised culture-positive EV isolates, whereas the remainder typed PCR-positive but culture-negative samples. Although 19 countries have introduced sequence-based EV typing, seven still rely entirely on virus isolation. Based on 2015 data, six countries typed over 300 specimens mostly by sequencing, whereas 11 countries characterised under 50 EV-positive samples. EV surveillance activity varied between EU/EEA countries, and did not always specifically target patients with neurological and/or respiratory infections. Introduction of sequence-based typing methods is needed throughout the EU/EEA to enhance laboratory capacity for the detection of EVs. PMID:29162204

  2. Energy security in western Mediterranean: new factors, new policies. A Spanish perspective

    International Nuclear Information System (INIS)

    Mane-Estrada, Aurelia

    2008-01-01

    After having noticed that there are two typical approaches and models to address energy security, policies acting on the supply side and policies based on a market-and-institutions approach (like stated by the European Union), the author outlines the effects of this second approach for countries of the western Mediterranean Sea, and then analyses the evolutions of energetic relationships between Algeria (where the energy sector is the most open, which is the best equipped in terms of gas infrastructures, and which attracts foreign investors) and European countries of the region (France, Italy, Spain and Portugal). Thus, she analyses present exchanges in the region, the dependency of these European countries on Mediterranean producers, and the relationships between involved companies of the region. She discusses the issue of energy security policy for the region from the perspective of the governments of producing countries and of consuming countries, and of companies. She discusses whether the project of Union for the Mediterranean complies with these objectives of energy security

  3. Response of Non-Linear Systems to Renewal Impulses by Path Integration

    DEFF Research Database (Denmark)

    Nielsen, Søren R.K.; Iwankiewicz, R.

    The cell-to-cell mapping (path integration) technique has been devised for MDOF non-linear and non-hysteretic systems subjected to random trains of impulses driven by an ordinary renewal point process with gamma-distributed integer parameter interarrival times (an Erlang process). Since the renewal...... point process has not independent increments the state vector of the system, consisting of the generalized displacements and velocities, is not a Markov process. Initially it is shown how the indicated systems can be converted to an equivalent Poisson driven system at the expense of introducing...... additional discrete-valued state variables for which the stochastic equations are also formulated....

  4. European Gas Market Liberalisation. Competition versus security of supply?

    International Nuclear Information System (INIS)

    Haase, N.

    2009-01-01

    The problem statement encompasses two basic questions: (1) Which variables determine regulatory regimes and economic performance in European gas markets?; and (2) Can we empirically determine the effect of regulation-for-competition, as applied in the European Union, on the economic performance in the European gas markets? In the first part (chapters 1-5), the theoretical groundwork is laid out and conceptual clarifications are provided. In chapter 2, the main concepts such as governance and regulation, and their interrelations, are determined and the public regulation approach to be followed is outlined. The third chapter discusses our theoretical framework and the support required from other New Institutional approaches to deduce expectations regarding the convergence of regulatory regimes and its effect on economic performance. The fourth chapter contributes to answering our first research question by displaying the relevant variables and outlining how these can be operationalised. Based on the concepts of regulatory comprehensiveness and policy convergence, in chapter 5, a methodology is developed to measure best-practice in terms of regulation-for-competition. The second part (chapters 6-9) covers the first empirical analysis which is quantitative in design and emphasises effects originating at the Community level. Chapter 6 summarises the evolution of European gas policy at the Community level and searches for major changes in general or energy policy objectives and examines their prioritisation. Chapter 7 addresses the formal institutions on the second layer of the fourlayer model. Chapter 8 analyses converging and diverging trends within regulatory regimes in European gas markets. Chapter 9 sets out to assess the extent to which regulation-for-competition, as prescribed by the European provisions, can be empirically studied for its effect on economic performance in the European gas sector. To answer our second main research question, we discuss the effects

  5. Insights on the Security and Dependability of Industrial Control Systems

    NARCIS (Netherlands)

    Kargl, Frank; van der Heijden, R.; van der Heijden, Rens W.; König, Hartmut; Valdes, Alfonso; Dacier, Marc C.

    2014-01-01

    The authors discuss the findings of a recent research seminar on the security and dependability of industrial control systems and provide an overview of major challenges in the field and areas where current research should focus.

  6. Predictors of tanning dependence in white non-Hispanic females and males.

    Science.gov (United States)

    Cartmel, B; Bale, A E; Mayne, S T; Gelernter, J E; DeWan, A T; Spain, P; Leffell, D J; Pagoto, S; Ferrucci, L M

    2017-07-01

    Growing evidence suggests that some individuals may exhibit symptoms of dependence on ultraviolet (UV) light, a known carcinogen, in the context of tanning; however, few studies have investigated predictors of tanning dependence (TD). To identify predictors of TD. Non-Hispanics of European ancestry who had previously participated in a case-control study of early-onset basal cell carcinoma completed an online survey to ascertain TD and other behaviours (alcohol dependence, nicotine dependence, seasonal affective disorder (SAD), exercise 'addiction' and depression). Information on host factors, such as skin and eye colour and history of sunbathing and indoor tanning, was obtained from a study in which the participants were previously enrolled. Lifetime TD was assessed using the modified Cut down, Annoyed, Guilty, Eye-opener (mCAGE) and the modified Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision (mDSM-IV-TR) questionnaires. Participants were classified as 'TD' if positive on both questionnaires and not TD if negative on both questionnaires. In total, 499 individuals completed the online survey (81.9% participation rate), and 24.4% were classified as 'TD'. In the multivariate model, women were more likely to be TD [odds ratio (OR) 6.93; 95% confidence intervals (95% CI) (3.36-14.27)] than men. Alcohol dependence (OR 6.55: 95% CI 3.19-13.42), SAD (OR 2.77; 95% CI 1.26-6.09) and exercise 'addiction' (OR 5.47; 95% CI 1.15-26.06) were all significant predictors for TD. Increased knowledge of those at risk for TD will allow appropriate interventions to be designed. © 2017 European Academy of Dermatology and Venereology.

  7. European mobility cultures

    DEFF Research Database (Denmark)

    Haustein, Sonja; Nielsen, Thomas A. Sick

    2016-01-01

    More targeted European policies promoting green travel patterns require better knowledge on differing mobility cultures across European regions. As a basis for this, we clustered the EU population into eight mobility styles based on Eurobarometer data. The mobility styles - including, for example...... positions on the path towards sustainable mobility and therefore different requirements towards European platforms and support measures, e.g. for 'Sustainable Urban Mobility Plans'. The country clusters can provide a starting point for future communication and targeting of European efforts in sustainable...

  8. Britain, France and Germany: Priorities for the European Union’s Security and Defense Policy

    Science.gov (United States)

    2009-12-01

    David M. Triesman, “A Strong, Competitive Europe is Vital” ( Mansion House, London, 9 January 2007), Denis MacShane, “Enlarging the EU: Peace and...Europe” ( Humboldt University, Berlin, 16 May 2006), http://www.fco.gov.uk/en/newsroom/latest-news/?view=Speech&id=1893537 (accessed 18 April 2009... Humboldt University, Berlin, 16 May 2006. Howorth, Jolyon. Security and Defence Policy in the European Union. New York: Palgrave Macmillan, 2007

  9. Experience of the pilot implementation of the european information sharing and alerting system in the field of information security

    Directory of Open Access Journals (Sweden)

    Anatoly A. Malyuk

    2018-03-01

    Full Text Available The formation of a global information society poses a particular challenge to the development of an information security culture. In the Doctrine of Information Security of the Russian Federation, adopted in December 2016, one of the main threats is the low awareness of citizens in matters of ensuring personal information security. One of the most important mechanisms for increasing competence and forming an in-formation security culture, in addition to mass training of people, are methods of propaganda and creation of "hot lines". They allow the general public to take the initiative in monitoring and reporting computer incidents. The development of such approaches should be carried out taking into account the international experience accumulated today. To this end, the article examines the European experience of creating a system of information and advisory assistance in the field of preventing threats to the security of public and corporate information systems, primarily information and telecommunications networks, as well as eliminating the consequences of threats in the information sphere. The analysis of the experience of implementing the pilot project of the European Information Sharing and Alert System has revealed the advisability of designing such systems on the basis of a management model with four players that unites network operators, information producers (who are IT product suppliers or IT security specialists; local information intermediaries and consumers of information. As a model of the information flow, a node can be selected that runs a local web portal that provides information to end users, generates new information, adapts information to the constraints of various distribution channels, and to the characteristics of end-user target groups. The methodology of the pilot project can be used in the design and deployment of a notification and information exchange system aimed at end-users of several regions or countries

  10. Security dimension of the Canada-EU relationship

    Directory of Open Access Journals (Sweden)

    O. M. Antokhiv­Skolozdra

    2014-05-01

    In particular, it defines that the Canadian Government accepted the fact of strengthening the security part of the European Union activity in a reserved manner, as it could cause decrease in influence of this North American State in Euro­Atlantic area. It outlines the main directions of cooperation, scrutinizes institutional mechanisms of interaction and emphasizes the key challenges of security dimension of bilateral relations.  It deals with the peculiarities of Canada’s participation in military and civil actions under the auspices of the European Union and stresses that the limited military potential of Ottawa makes its effective participation in bilateral cooperation with the European partners less possible. It stresses the adherence of priority in relations between Canada and the United States in security sphere and underlines the significant role of the North Atlantic Treaty Organization in its interaction on the security and defense issues between Canada and the European Union. It emphasizes that the official Ottawa insists on NATO playing the leading role in providing security in Euro­Atlantic area. It illustrates, however, that due to a number of reasons, in particular, lack of initiative in advancing European security and defense policy, the Canadian Government on current stage don’t present particular interest in activating interaction with their European partners in this sphere. It depicts also that Canada and the European Union have started developing cooperation outside ESDP on domestic security, in particular, on struggle against organized crime and other challenges of current society, which has encouraged institutionalization in relationship of the European Union and the Europol.

  11. Post 9-11 Security Issues for Non-Power Reactor Facilities

    International Nuclear Information System (INIS)

    Zaffuts, P. J.

    2003-01-01

    This paper addresses the legal and practical issues arising out of the design and implementation of a security-enhancement program for non power reactor nuclear facilities. The security enhancements discussed are derived from the commercial nuclear power industry's approach to security. The nuclear power industry's long and successful experience with protecting highly sensitive assets provides a wealth of information and lessons that should be examined by other industries contemplating security improvements, including, but not limited to facilities using or disposing of nuclear materials. This paper describes the nuclear industry's approach to security, the advantages and disadvantages of its constituent elements, and the legal issues that facilities will need to address when adopting some or all of these elements in the absence of statutory or regulatory requirements to do so

  12. Post 9-11 Security Issues for Non-Power Reactor Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Zaffuts, P. J.

    2003-02-25

    This paper addresses the legal and practical issues arising out of the design and implementation of a security-enhancement program for non power reactor nuclear facilities. The security enhancements discussed are derived from the commercial nuclear power industry's approach to security. The nuclear power industry's long and successful experience with protecting highly sensitive assets provides a wealth of information and lessons that should be examined by other industries contemplating security improvements, including, but not limited to facilities using or disposing of nuclear materials. This paper describes the nuclear industry's approach to security, the advantages and disadvantages of its constituent elements, and the legal issues that facilities will need to address when adopting some or all of these elements in the absence of statutory or regulatory requirements to do so.

  13. The Europeanization of Welfare - The Domestic Impact of Intra-European Social Security

    DEFF Research Database (Denmark)

    Martinsen, Dorte Sindbjerg

    2005-01-01

    Studies of Europeanization have demonstrated that the impact of European integration differs between Member States and across policies. Although Europeanization research has been expanded and clarified in recent years, we still know relatively little about the factors mediating the national...... responses to integration. It is argued that these intervening variables are decisive for how common European demands are mediated nationally and are likely to explain impact variations referring to the same cause....

  14. ALARA issues arising for safety and security of radiation sources and security screening devices - Summary and recommendations of the 12. European ALARA network workshop

    International Nuclear Information System (INIS)

    Shaw, P.; Crouail, P.; Drouet, F.

    2010-01-01

    The 12. European ALARA Network (EAN) workshop on 'ALARA issues arising for safety and security of radiation sources and security screening devices' took place in Vienna (Austria) in October 2009. The aim of that workshop was to consider how the implementation of ALARA3, in terms of planned and emergency situations, involving worker and public doses, is affected by the introduction of security-related measures. In the case of new equipment and procedures, there was also the question of whether exposures arising from security screening devices can be justified and optimised. This workshop consisted of invited oral presentations, which highlighted the main issues, and half of the programme was devoted to discussions within working groups on specific topics. During their discussions, the working groups identified recommendations dealing with the following topics: the implementation of the Code of Conduct and HASS4 - ensuring ALARA; balancing security and safety - how to achieve an optimum solution; the management of an emergency exposure situation from an ALARA perspective; the justification and optimisation of the use of security devices. The objective of this paper is to present the main conclusions and recommendations produced during the workshop. Individual presentations (papers and slides) as well as the reports from the working groups are available to download on the EAN web site (http://www.eu-alara.net). (authors)

  15. The path dependence of district manager decision-space in Ghana

    Science.gov (United States)

    Kwamie, Aku; van Dijk, Han; Ansah, Evelyn K; Agyepong, Irene Akua

    2016-01-01

    The district health system in Ghana today is characterized by high resource-uncertainty and narrow decision-space. This article builds a theory-driven historical case study to describe the influence of path-dependent administrative, fiscal and political decentralization processes on development of the district health system and district manager decision-space. Methods included a non-exhaustive literature review of democratic governance in Ghana, and key informant interviews with high-level health system officials integral to the development of the district health system. Through our analysis we identified four periods of district health system progression: (1) development of the district health system (1970–85); (2) Strengthening District Health Systems Initiative (1986–93); (3) health sector reform planning and creation of the Ghana Health Service (1994–96) and (4) health sector reform implementation (1997–2007). It was observed that district manager decision-space steadily widened during periods (1) and (2), due to increases in managerial profile, and concerted efforts at managerial capacity strengthening. Periods (3) and (4) saw initial augmentation of district health system financing, further widening managerial decision-space. However, the latter half of period 4 witnessed district manager decision-space contraction. Formalization of Ghana Health Service structures influenced by self-reinforcing tendencies towards centralized decision-making, national and donor shifts in health sector financing, and changes in key policy actors all worked to the detriment of the district health system, reversing early gains from bottom-up development of the district health system. Policy feedback mechanisms have been influenced by historical and contemporary sequencing of local government and health sector decentralization. An initial act of administrative decentralization, followed by incomplete political and fiscal decentralization has ensured that the balance of

  16. The path dependence of district manager decision-space in Ghana.

    Science.gov (United States)

    Kwamie, Aku; van Dijk, Han; Ansah, Evelyn K; Agyepong, Irene Akua

    2016-04-01

    The district health system in Ghana today is characterized by high resource-uncertainty and narrow decision-space. This article builds a theory-driven historical case study to describe the influence of path-dependent administrative, fiscal and political decentralization processes on development of the district health system and district manager decision-space. Methods included a non-exhaustive literature review of democratic governance in Ghana, and key informant interviews with high-level health system officials integral to the development of the district health system. Through our analysis we identified four periods of district health system progression: (1) development of the district health system (1970-85); (2) Strengthening District Health Systems Initiative (1986-93); (3) health sector reform planning and creation of the Ghana Health Service (1994-96) and (4) health sector reform implementation (1997-2007). It was observed that district manager decision-space steadily widened during periods (1) and (2), due to increases in managerial profile, and concerted efforts at managerial capacity strengthening. Periods (3) and (4) saw initial augmentation of district health system financing, further widening managerial decision-space. However, the latter half of period 4 witnessed district manager decision-space contraction. Formalization of Ghana Health Service structures influenced by self-reinforcing tendencies towards centralized decision-making, national and donor shifts in health sector financing, and changes in key policy actors all worked to the detriment of the district health system, reversing early gains from bottom-up development of the district health system. Policy feedback mechanisms have been influenced by historical and contemporary sequencing of local government and health sector decentralization. An initial act of administrative decentralization, followed by incomplete political and fiscal decentralization has ensured that the balance of power has

  17. Study on the security of discrete-variable quantum key distribution over non-Markovian channels

    International Nuclear Information System (INIS)

    Huang Peng; Zhu Jun; He Guangqiang; Zeng Guihua

    2012-01-01

    The dynamic of the secret key rate of the discrete-variable quantum key distribution (QKD) protocol over the non-Markovian quantum channel is investigated. In particular, we calculate the secret key rate for the six-state protocol over non-Markovian depolarizing channels with coloured noise and Markovian depolarizing channels with Gaussian white noise, respectively. We find that the secure secret key rate for the non-Markovian depolarizing channel will be larger than the Markovian one under the same conditions even when their upper bounds of tolerable quantum bit error rate are equal. This indicates that this coloured noise in the non-Markovian depolarizing channel can enhance the security of communication. Moreover, we show that the secret key rate fluctuates near the secure point when the coupling strength of the system with the environment is high. The results demonstrate that the non-Markovian effects of the transmission channel can have a positive impact on the security of discrete-variable QKD. (paper)

  18. Selective Europeanization

    DEFF Research Database (Denmark)

    Hoch Jovanovic, Tamara; Lynggaard, Kennet

    2014-01-01

    and rules. The article examines the reasons for both resistance and selectiveness to Europeanization of the Danish minority policy through a “path dependency” perspective accentuating decision makers’ reluctance to deviate from existing institutional commitments, even in subsequently significantly altered...... political contexts at the European level. We further show how the “translation” of international norms to a domestic context has worked to reinforce the original institutional setup, dating back to the mid-1950s. The translation of European-level minority policy developed in the 1990s and 2000s works most...

  19. Non-dipolar gauge links for transverse-momentum-dependent pion wave functions

    International Nuclear Information System (INIS)

    Wang, Y.M.

    2016-01-01

    I discuss the factorization-compatible definitions of transverse-momentum-dependent (TMD) pion wave functions which are fundamental theory inputs entering QCD factorization formulae for many hard exclusive processes. I will first demonstrate that the soft subtraction factor introduced to remove both rapidity and pinch singularities can be greatly reduced by making the maximal use of the freedom to construct the Wilson-line paths when defining the TMD wave functions. I will then turn to show that the newly proposed TMD definition with non-dipolar Wilson lines is equivalent to the one with dipolar gauge links and with a complicated soft function, to all orders of the perturbative expansion in the strong coupling, as far as the infrared behavior is concerned. (author)

  20. Europol’s Cybercrime Centre (EC3), its Agreements with Third Parties and the Growing Role of Law Enforcement on the European Security Scene

    DEFF Research Database (Denmark)

    Vendius, Trine Thygesen

    2015-01-01

    The European Cyber Crime Centre, EC3, established under the umbrella of Europol, started operations on January 1 2013. It is to act as the focal point in the fight against cybercrime in the European Union. Using a “shared, cross-community approach” the EC3 is concluding partnerships with member...... states, European agencies, international partners and the private sector. This article describes the coming about of EC3 and its efforts to address cybercrime. Furthermore, the article is an attempt to assess the growing role of the European law enforcement community on the European security scene...

  1. The impact of the European insolvency regulation on lenders, lending decisions, the structuring of transactions and enforcement of security

    OpenAIRE

    Sharma, R

    2011-01-01

    This Thesis seeks to shed light on the issue of how far secured creditor rights are protected in EU cross-border insolvencies by focusing on the perspective and position of English lenders. The main thread throughout is the legal concerns faced by lenders when lending to a company incorporated in England and Wales which operates across the European Union and has assets and creditors spread across various Member States. The initial stages of the structuring of a cross-border security arrangeme...

  2. The surprisingly small but increasing role of international agricultural trade on the European Union’s dependence on mineral phosphorus fertiliser

    Science.gov (United States)

    Nesme, Thomas; Roques, Solène; Metson, Geneviève S.; Bennett, Elena M.

    2016-02-01

    Phosphorus (P) is subject to global management challenges due to its importance to both food security and water quality. The European Union (EU) has promoted policies to limit fertiliser over-application and protect water quality for more than 20 years, helping to reduce European P use. Over this time period, the EU has, however, become more reliant on imported agricultural products. These imported products require fertiliser to be used in distant countries to grow crops that will ultimately feed European people and livestock. As such, these imports represent a displacement of European P demand, possibly allowing Europe to decrease its apparent P footprint by moving P use to locations outside the EU. We investigated the effect of EU imports on the European P fertiliser footprint to better understand whether the EU’s decrease in fertiliser use over time resulted from P demand being ‘outsourced’ to other countries or whether it truly represented a decline in P demand. To do this, we quantified the ‘virtual P flow’ defined as the amount of mineral P fertiliser applied to agricultural soils in non-EU countries to support agricultural product imports to the EU. We found that the EU imported a virtual P flow of 0.55 Tg P/yr in 1995 that, surprisingly, decreased to 0.50 Tg P/yr in 2009. These results were contrary to our hypothesis that trade increases would be used to help the EU reduce its domestic P fertiliser use by outsourcing its P footprint abroad. Still, the contribution of virtual P flows to the total P footprint of the EU has increased by 40% from 1995 to 2009 due to a dramatic decrease in domestic P fertiliser use in Europe: in 1995, virtual P was equivalent to 32% of the P used as fertiliser domestically to support domestic consumption but jumped to 53% in 2009. Soybean and palm tree products from South America and South East Asia contributed most to the virtual P flow. These results demonstrate that, although policies in the EU have successfully

  3. WDM networking on a European Scale

    DEFF Research Database (Denmark)

    Parnis, Noel; Limal, Emmanuel; Hjelme, Dag R.

    1998-01-01

    Four different topological approaches to designing a pan-European optical network are discussed. For such an ultra-high capacity large-scale network, it is necessary to overcome physical path length limitations and to limit Optical Cross-Connect (OXC) complexity.......Four different topological approaches to designing a pan-European optical network are discussed. For such an ultra-high capacity large-scale network, it is necessary to overcome physical path length limitations and to limit Optical Cross-Connect (OXC) complexity....

  4. The joint European TEMPUS project 'Human Security (environment, quality of food, public health, and society) on territories contaminated by radioactive agents'

    International Nuclear Information System (INIS)

    Goncharova, N.; Butchenkow, I.; Maestri, E.

    2016-01-01

    Full text: The Joint European TEMPUS Project 'Human Security (environment, quality of food, public health, and society) on Territories Contaminated by Radioactive Agents', started in 2012. The EU project participants are the following: University of Cordoba (Spain) - Project Coordinator, University of Parma (Italy), University of Florence (Italy), Swedish University of Agricultural Sciences (Sweden) and Riga Technical University (Latvia). The project involves three partner countries - Belarus, Russia, Ukraine, represented by the following institutions: Belarusian State University, International Sakharov Environmental University, Grodno State Medical University, Grodno State Agrarian University, Voronezh State University, Tyumen State Medical Academy, Ural Federal University (Yekaterinburg), Chelyabinsk State University, Nuclear Cities Information-Education Centre, Vinnitsa National Medical University, Zhytomyr State Technological University, Kyiv International University, Sevastopol National University of Nuclear Energy and Industry, Polissya branch of G.M. Vysotsky Ukrainian Research Institute of Forestry and Forest Melioration. The main objectives of the project are: to develop interdisciplinary Master and Doctoral (PhD) programs in the field of Human Security of people living in areas affected by accidents at nuclear power plants / plant for processing nuclear fuel within the following specialties: Ecology and Environment Sciences - 'Human Security and Environment'; Food quality control - 'Human Security and Quality of Food'; Medicine - 'Human Security and Public Health'; Political and Social Sciences - 'Human Security and Society'. These programs will be implemented at 12 universities, 4 from each partner country. During the project implementation it is expected to achieve the following main results: modified interdisciplinary Master and Doctoral (PhD) programs taking into account the studied European experience and practice; joint system of upgrade of

  5. Path Dependencies and Institutional Bricolage in Post-Soviet Water Governance

    Directory of Open Access Journals (Sweden)

    Jenniver Sehring

    2009-02-01

    Based on empirical findings, four variables through which the neopatrimonial context in both countries impacts water governance are identified: the decision-making process, the agricultural sector, the local governance institutions, and internal water-institutional linkages. A historical-institutionalist perspective shows how path dependencies limit reform effectiveness: institutionalised Soviet and pre-Soviet patterns of behaviour still shape actors’ responses to new challenges. Consequently, rules and organisations established formally by the state or international donor organisations are undermined by informal institutions. Yet, informal institutions are not only an obstacle to reform, but can also support it. They are not static but dynamic. This is elucidated with the concept of 'institutional bricolage', which explains how local actors recombine elements of different institutional logics and thereby change their meaning.

  6. Non-transfusion-dependent thalassemias

    Science.gov (United States)

    Musallam, Khaled M.; Rivella, Stefano; Vichinsky, Elliott; Rachmilewitz, Eliezer A.

    2013-01-01

    Non-transfusion-dependent thalassemias include a variety of phenotypes that, unlike patients with beta (β)-thalassemia major, do not require regular transfusion therapy for survival. The most commonly investigated forms are β-thalassemia intermedia, hemoglobin E/β-thalassemia, and α-thalassemia intermedia (hemoglobin H disease). However, transfusion-independence in such patients is not without side effects. Ineffective erythropoiesis and peripheral hemolysis, the hallmarks of disease process, lead to a variety of subsequent pathophysiologies including iron overload and hypercoagulability that ultimately lead to a number of serious clinical morbidities. Thus, prompt and accurate diagnosis of non-transfusion-dependent thalassemia is essential to ensure early intervention. Although several management options are currently available, the need to develop more novel therapeutics is justified by recent advances in our understanding of the mechanisms of disease. Such efforts require wide international collaboration, especially since non-transfusion-dependent thalassemias are no longer bound to low- and middle-income countries but have spread to large multiethnic cities in Europe and the Americas due to continued migration. PMID:23729725

  7. SecureCore Software Architecture: Trusted Path Application (TPA) Requirements

    National Research Council Canada - National Science Library

    Clark, Paul C; Irvine, Cynthia E; Levin, Timothy E; Nguyen, Thuy D; Vidas, Timothy M

    2007-01-01

    .... The purpose of the SecureCore research project is to investigate fundamental architectural features required for the trusted operation of mobile computing devices so the security is built-in, transparent and flexible...

  8. Principle Of Non-Regression And Social Security: Security And Trust Protection, Reservation Of The Possible And Non-Regression In The Fundamental Social Rights

    Directory of Open Access Journals (Sweden)

    Rodrigo Garcia Schwarz

    2016-12-01

    Full Text Available This paper aims to explain and analyze, from the perspective of the material and effective dimensions of fundamental social rights, questions that concern the relevance of security and trust for the social pact and, as a consequence, to the non-regression in the fundamental social rights in general and in the social security in particular. It reveals that, while the retrogression is not absolute, retrogression must be fully justified. The research is descriptive and explanatory, documentary-bibliographical.

  9. A new context for cooperation between Russia an the European Union

    International Nuclear Information System (INIS)

    Belyi, A.V.

    2003-01-01

    The energy issue is assuming a strategic importance in relations between Russia and the European Union. Among other things, this is characterised by the debates concerning the energy Charter Treaty, by negotiations concerning Russia's application to join the WTO as well as by establishment of a dialogue between Europe and Russia concerning energy. This article analyses the new factors of this energy partnership which explain the potential for cooperation and at the same time its limits. These factors are: (1) the peripherization of Russia in the international labour market, (2) the enlargement of the European Union to take in countries dependent on Russia for imports of gas and oil, (3) the liberalization of the gas and electricity markets within the European Union which constitutes a challenge for short and long-term energy security and (4) the inclusion of sustainable development within the definition of energy security. (authors)

  10. On the path integral representation of the Wigner function and the Barker–Murray ansatz

    International Nuclear Information System (INIS)

    Sels, Dries; Brosens, Fons; Magnus, Wim

    2012-01-01

    The propagator of the Wigner function is constructed from the Wigner–Liouville equation as a phase space path integral over a new effective Lagrangian. In contrast to a paper by Barker and Murray (1983) , we show that the path integral can in general not be written as a linear superposition of classical phase space trajectories over a family of non-local forces. Instead, we adopt a saddle point expansion to show that the semiclassical Wigner function is a linear superposition of classical solutions for a different set of non-local time dependent forces. As shown by a simple example the specific form of the path integral makes the formulation ideal for Monte Carlo simulation. -- Highlights: ► We derive the quantum mechanical propagator of the Wigner function in the path integral representation. ► We show that the Barker–Murray ansatz is incomplete, explain the error and provide an alternative. ► An example of a Monte Carlo simulation of the semiclassical path integral is included.

  11. Europe, arms control and American security

    International Nuclear Information System (INIS)

    Burns, W.F.

    1992-01-01

    What has come to be called the Revolution of 1989 has swept away longstanding political and economic arrangements in Eastern Europe. Perhaps more important, it has also called into question the fundamental underpinnings of European security created during the nonpeace that followed World War II. In June 1990, the Warsaw Treaty Organization abandoned the notion that NATO was the ideological enemy. At the same time, NATO ministers agreed at Tunberry, Scotland, to consider defining the Atlantic Alliance as more of a partner of the Soviet Union than as an enemy. The Washington summit of May 1990 between president Mikhail Gorbachev and president George Bush further highlighted the recent changes in the Soviet Union and its former satellites. Issues going to the heart of the viability of the Soviet Union and the communist system of political and economic organization competed with German reunification as central themes. Arms control issues, particularly as they pertain in European military stability, became contingent and dependent on the development of a broader political and economic framework for a new Europe. Whether this framework is viable remains an open question as Gorbachev's role is challenged more and more within the Soviet Union. This paper deals with European arms control issues from the point of view of the United States and its own security interests. The United States involved its security inextricably with that of Western Europe as a conscious decision in the turmoil following World War II

  12. The imaginary-time path integral and non-time-reversal-invariant saddle points of the Euclidean action

    International Nuclear Information System (INIS)

    Dasgupta, I.

    1998-01-01

    We discuss new bounce-like (but non-time-reversal-invariant) solutions to Euclidean equations of motion, which we dub boomerons. In the Euclidean path integral approach to quantum theories, boomerons make an imaginary contribution to the vacuum energy. The fake vacuum instability can be removed by cancelling boomeron contributions against contributions from time reversed boomerons (anti-boomerons). The cancellation rests on a sign choice whose significance is not completely understood in the path integral method. (orig.)

  13. Reparametrization in the path integral

    International Nuclear Information System (INIS)

    Storchak, S.N.

    1983-01-01

    The question of the invariance of a measure in the n-dimensional path integral under the path reparametrization is considered. The non-invariance of the measure through the jacobian is suggeste. After the path integral reparametrization the representatioq for the Green's function of the Hamilton operator in terms of the path integral with the classical Hamiltonian has been obtained

  14. How Strong Is Europeanisation, Really? The Danish Defence Administration and the Opt-Out from the European Security and Defence Policy

    DEFF Research Database (Denmark)

    Olsen, Gorm Rye

    2011-01-01

    The article questions how strong Europeanisation is as an explanation of administrative changes in EU member states. Denmark has an opt-out from the European cooperation on defence, and, therefore, its defence administration represents a critical or a less likely case to test the Europeanisation...... thesis. The article shows that in spite of the opt-out, the administrative structures and the policy processes in the Ministry of Foreign Affairs (MFA) have adapted to the common foreign and security policy (CFSP) and the European security and defence policy (ESDP). Surprisingly, the administrative...... structures and the decision-making processes in the Ministry of Defence (MoD) have also adapted to the ESDP. The latter example emphasises the strength of top-down Europeanisation as a possible explanation of domestic administrative changes in member states. It is argued that Europeanisation per se...

  15. A decade of African Union and European Union trans-national ...

    African Journals Online (AJOL)

    The first decade of the new millennium saw the European Union deploy nine security missions to the African continent, quoting the European Security and. Defence Policy. Unlike the numerous United Nations security missions that. European states had previously contributed to, these were part of a grand strategy designed ...

  16. Sub-linear, Secure Comparison With Two Non-Colluding Parties

    DEFF Research Database (Denmark)

    Toft, Tomas

    2011-01-01

    The classic problem in the field of secure computation is Yao’s millionaires’ problem; we consider two new protocols solving a variation of this: a number of parties, P1, . . . , Pn, securely hold two - bit values, x and y – e.g. x and y could be encrypted or secret shared. They wish to obtain...... a bit stating whether x is greater than y using only secure arithmetic; this should be done without revealing any information, even the output should remain secret. The present setting is special in the sense that it is assumed that two specific parties, referred to as Alice and Bob, are non......-colluding. Though this assumption is not satisfied in general, it clearly is for the main example of this work: two-party computation based on Paillier encryption. The first solution requires O(log()(κ + loglog())) secure arithmetic operations in O(log()) rounds, where κ is a correctness parameter. The second...

  17. Communication from the commission to the council and the European parliament. Final report on the green paper: towards a European strategy for the security of energy supply

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-06-15

    energy saving in buildings, which provides a precise legislative framework for limiting energy consumption in this sector, representing 40% of the energy consumed in the European Union. Finally, the Commission has also made regulatory and fiscal proposals to promote biofuels. A wide debate also developed around the Green Paper proposal for a new approach to oil stocks. The debate on the Green Paper has shown the need to develop a Europe-wide security of supply concept which alone will enable Europe to control its energy future. Efforts to promote new and renewable energy sources, representing only 6% of the EU energy balance, have been too feeble so far: on present trends they will account for only 9% of total European consumption by 2030. The Green Paper's proposal for the development of these sources to be financed by conventional energy sources prompted a mitigated response. The nuclear factor remains an inseparable part of the debate. One major lesson to be drawn from the Green Paper debate is that the future of this industry depends on finding a clear and unequivocal answer to the question of the processing and transportation of radioactive waste. (A.L.B.)

  18. Communication from the commission to the council and the European parliament. Final report on the green paper: towards a European strategy for the security of energy supply

    International Nuclear Information System (INIS)

    2002-06-01

    energy saving in buildings, which provides a precise legislative framework for limiting energy consumption in this sector, representing 40% of the energy consumed in the European Union. Finally, the Commission has also made regulatory and fiscal proposals to promote biofuels. A wide debate also developed around the Green Paper proposal for a new approach to oil stocks. The debate on the Green Paper has shown the need to develop a Europe-wide security of supply concept which alone will enable Europe to control its energy future. Efforts to promote new and renewable energy sources, representing only 6% of the EU energy balance, have been too feeble so far: on present trends they will account for only 9% of total European consumption by 2030. The Green Paper's proposal for the development of these sources to be financed by conventional energy sources prompted a mitigated response. The nuclear factor remains an inseparable part of the debate. One major lesson to be drawn from the Green Paper debate is that the future of this industry depends on finding a clear and unequivocal answer to the question of the processing and transportation of radioactive waste. (A.L.B.)

  19. Study on the Evaluation of the European Union Agency for Network and Information Security

    DEFF Research Database (Denmark)

    Attström, Karin; Ludden, Vanessa; Lessmann, Franziska

    The European Union Agency for Network and Information Security (ENISA) was established in 2004. The Agency provides advice and recommendations, data analysis, and supports awareness raising and cooperation by the EU bodies and Member States in the field of cybersecurity. ENISA uses its expertise...... and assesses their financial implications. The findings of the evaluation study show that ENISA has made some important achievements towards increasing NIS in the EU. However, a fragmented approach to cybersecurity across the EU and issues internal to the Agency, including limited financial resources, hinder...

  20. Energy policy in the European Community: conflicts between the objectives of the unified single market, supply security and a clean environment

    International Nuclear Information System (INIS)

    Surrey, J.

    1992-01-01

    Policies for energy and the environment in Europe were previously the preserve of national governments, but the Commission of the European Community has gained a role in both policy areas in the past few years. This was due to the 1987 Single European Act which, in effect, extends the writ of competition law throughout the energy and other previously excluded sectors, expresses the desire to reduce acid rain and greenhouse gas emissions, and reaffirms Europe's renewed concern for long-term oil and gas supply security after the Gulf War and the disintegration of the USSR. The Commission's proposals for the unified internal energy market were driven by concern for competition and free market forces, and seemed to exclude any scope for long-term policy considerations. This paper argues that the implementation of those proposals will be uneven and protracted, and that the Commission's more recent proposals for reducing CO 2 emissions and the European Energy Charter appear to mark positive steps towards a long-term strategy for a clean environment, energy efficiency, and oil and gas supply security. 27 refs., 4 tabs

  1. Gazprom: the European idealism to the test of Russian realism

    International Nuclear Information System (INIS)

    Dasseleer, P.H.

    2009-01-01

    This geopolitical book analyses a major element of the future Russian-European relations. Gazprom is not only a giant gas company but a real 'centre of power' complementary to the Russian government. Gazprom is responsible for 86% of the Russian national production of gas and owns 70% of the reserves. It is involved in oil, power generation, and nuclear energy too and employs more than 300.000 people. It contributes to 25% of Russia's budget. This study tries to decipher the temporal and geographical approach of Gazprom with respect to its field of action which is the European continent. This analysis puts forward Gazprom's energy policy, with its logical and rational organization in front of an hesitating and idealistic Western Europe. It offers some paths of reflexion about the future intra-continental negotiations aiming at ensuring the security of gas supplies in Europe. The Russian exports, often considered as a threat, would easily become an opportunity for the geo-political consolidation of the Old Continent. (J.S.)

  2. The use of a path independent integral in non-linear fracture mechanics

    International Nuclear Information System (INIS)

    Hellen, T.K.

    1977-01-01

    The use of the Rice J-intergral to assess conditions at a crack tip in an elastic or non-linear elastic body is well known. The integral equals the energy release rate and is path independent for any contour surrounding the crack tip provided no other singularities are encompassed. The path independence propertiy breaks down, however, in more general situations such as in three dimensional stress systems, plasticity unloading, thermal or creep states. Hence the required crack tip characteristics represented by the value of the integral round a contour whose radius about the tip tends to zero, is not reproduced along contours away from the tip. Consequently, an alternative integral, designated J*, has been proposed which equals J for elastic cases and in the other cases cited above remains path independent. A computer program for calculating the J and J* integrals has been developed as an extension to the BERSAFE finite element system. A full analysis of the cracked structure including plasticity, creep and thermal strains is conducted and the results are stored on a permanent data set. The integral values may then be calculated using the post-processor program for any number of contours and load or time steps, without recourse to further expensive computations. (Auth. )

  3. Energy security and sustainability in Northeast Asia

    International Nuclear Information System (INIS)

    Hippel, David von; Suzuki, Tatsujiro; Williams, James H.; Savage, Timothy; Hayes, Peter

    2011-01-01

    'Energy Security' has typically, to those involved in making energy policy, meant mostly securing access to oil and other fossil fuels. With increasingly global, diverse energy markets, however, and increasingly transnational problems resulting from energy transformation and use, old energy security rationales are less salient, and other issues, including climate change and other environmental, economic, and international considerations are becoming increasingly important. As a consequence, a more comprehensive operating definition of 'Energy Security' is needed, along with a workable framework for analysis of which future energy paths or scenarios are likely to yield greater Energy Security in a broader, more comprehensive sense. Work done as a part of the Nautilus Institute's 'Pacific Asia Regional Energy Security' (PARES) project developed a broader definition of Energy Security, and described an analytical framework designed to help to compare the energy security characteristics - both positive and negative - of different quantitative energy paths as developed using software tools such as the LEAP (Long-range Energy Alternatives Planning) system.

  4. Gas markets and security of supply

    International Nuclear Information System (INIS)

    Gibot, G.

    1997-01-01

    In the natural gas business, some European states and companies seem to be concerned by security of supply. Security of supply for a governmental organisation is discussed, to share the author's conception and experience. The targets of a security of supply policy and the measures that can be set are described. The possible changes in implementing this policy are considered, according to recent developments in the field of gas security. The specificity of European gas markets justify the concern in security of supply, as concluded the Commission and the IEA. The integration of national gas markets in Europe will give new opportunities for managing this security of supply. (R.P.)

  5. Die Baltischen handels-beziehungen mit Russland: Pfadabhängigkeiten trotz EU-Integration? Challenging the Baltic states trade relations with Russia: caught in path dependencies?

    Directory of Open Access Journals (Sweden)

    Klaus Schrader

    2015-08-01

    Full Text Available Against the backdrop of the lingering Ukraine crisis, Russia retaliated against the EU sanctions imposed on selected Russian enterprises and representatives by boycotting import goods from European and North American suppliers. Russian politicians further threatened to restrict the export of raw materials, especially natural gas, provided that the EU-Russia relations further worsen and sanctions gather momen-tum. Hence, the paper deals with the question to what extent the EU economies Estonia, Latvia and Lithuania are vulnerable to Russian reprisals and would experience comparatively high costs of the EU sanction policy. The focus of the analysis is on the Baltic States’ trade relations with Russia because these countries were integrated in the Soviet division of labor before regaining independence. It is analyzed whether path dependencies in Baltic trade patterns still exist that could make Estonia, Latvia and Lithuania more vulnerable to political blackmail than other EU countries.

  6. Performativity and the project: enacting urban transport security in Europe

    NARCIS (Netherlands)

    Hoijtink, M.

    2015-01-01

    In April 2011, a large consortium of European rail and security suppliers, transport operators and research organisations launched the Secured Urban Transportation - European Demonstration (SECUR-ED) project with the objective of providing public transport operators with the means to enhance urban

  7. A nuclear facility Security Analyzer written in Prolog

    International Nuclear Information System (INIS)

    Zimmerman, B.D.

    1987-01-01

    The Security Analyzer project was undertaken to use the Prolog artificial intelligence programming language and Entity-Relationship database construction techniques to produce an intelligent database computer program capable of analyzing the effectiveness of a nuclear facility's security systems. The Security Analyzer program can search through a facility to find all possible surreptitious entry paths that meet various user-selected time and detection probability criteria. The program can also respond to user-formulated queries concerning the database information. The intelligent database approach allows the program to perform a more comprehensive path search than other programs that only find a single optimal path. The program also is more flexible in that the database, once constructed, can be interrogated and used for purposes independent of the searching function

  8. A nuclear facility Security Analyzer written in PROLOG

    International Nuclear Information System (INIS)

    Zimmerman, B.D.

    1987-08-01

    The Security Analyzer project was undertaken to use the Prolog ''artificial intelligence'' programming language and Entity-Relationship database construction techniques to produce an intelligent database computer program capable of analyzing the effectiveness of a nuclear facility's security systems. The Security Analyzer program can search through a facility to find all possible surreptitious entry paths that meet various user-selected time and detection probability criteria. The program can also respond to user-formulated queries concerning the database information. The intelligent database approach allows the program to perform a more comprehensive path search than other programs that only find a single ''optimal'' path. The program also is more flexible in that the database, once constructed, can be interrogated and used for purposes independent of the searching function

  9. Time-varying extreme value dependence with application to leading European stock markets

    KAUST Repository

    Castro-Camilo, Daniela; de Carvalho, Miguel; Wadsworth, Jennifer

    2018-01-01

    Extremal dependence between international stock markets is of particular interest in today’s global financial landscape. However, previous studies have shown this dependence is not necessarily stationary over time. We concern ourselves with modeling extreme value dependence when that dependence is changing over time, or other suitable covariate. Working within a framework of asymptotic dependence, we introduce a regression model for the angular density of a bivariate extreme value distribution that allows us to assess how extremal dependence evolves over a covariate. We apply the proposed model to assess the dynamics governing extremal dependence of some leading European stock markets over the last three decades, and find evidence of an increase in extremal dependence over recent years.

  10. Time-varying extreme value dependence with application to leading European stock markets

    KAUST Repository

    Castro-Camilo, Daniela

    2018-03-09

    Extremal dependence between international stock markets is of particular interest in today’s global financial landscape. However, previous studies have shown this dependence is not necessarily stationary over time. We concern ourselves with modeling extreme value dependence when that dependence is changing over time, or other suitable covariate. Working within a framework of asymptotic dependence, we introduce a regression model for the angular density of a bivariate extreme value distribution that allows us to assess how extremal dependence evolves over a covariate. We apply the proposed model to assess the dynamics governing extremal dependence of some leading European stock markets over the last three decades, and find evidence of an increase in extremal dependence over recent years.

  11. Context-dependent responses to neighbours and strangers in wild European rabbits (Oryctolagus cuniculus).

    Science.gov (United States)

    Monclús, Raquel; Saavedra, Irene; de Miguel, Javier

    2014-07-01

    Territorial animals defend their territories against intruders. The level of aggression directed to intruders depends on the familiarity and/or the relative threat they pose, and it could be modified by the context of the interaction. We explored in a wild social mammal, the European rabbit (Oryctolagus cuniculus), whether residents responded more aggressively to strangers or to neighbours (dear enemy or nasty neighbour effects, respectively). We simulated the intrusion of neighbours or strangers in different parts of the territory of wild European rabbits in a suburban area in central Spain. For that, we placed faecal pellets of neighbouring or stranger rabbits in the territory of 5 rabbit colonies. Resident rabbits counter-marked preferably the odour stations with stranger odour, compared to the ones with neighbour odour, and they did not make a difference between neighbour and a non-odour control stimuli. The results suggest that rabbits show a dear enemy effect. However, repeated intrusions escalated the responses of rabbits towards neighbours. The location within the territory or the sex of the stranger did not affect the level of response. We conclude that in rabbits the relative threat posed by the intruder triggers the intensity of the interaction. Copyright © 2014 Elsevier B.V. All rights reserved.

  12. Confidence- and security-building in North-East Asia. Working group I

    International Nuclear Information System (INIS)

    Cotton, J.

    1991-01-01

    In the discussions in Working Group I there were two general preoccupations which prevailed throughout the consideration of questions relating to North-East Asian confidence and security building: how much could North-East Asia learn from the European experience in Confidence Building measures, and could any of the underlying factors- economic, political and social which has moved Europe towards military and security accommodation be seen to work also in the Asia-Pacific region. The problem of North Korea is underlined in view of non acceptance of the IAEA safeguards regime although it had entered into multilateral set of obligations with other signatories by assenting the Non-proliferation Treaty

  13. All-optical, thermo-optical path length modulation based on the vanadium-doped fibers.

    Science.gov (United States)

    Matjasec, Ziga; Campelj, Stanislav; Donlagic, Denis

    2013-05-20

    This paper presents an all-fiber, fully-optically controlled, optical-path length modulator based on highly absorbing optical fiber. The modulator utilizes a high-power 980 nm pump diode and a short section of vanadium-co-doped single mode fiber that is heated through absorption and a non-radiative relaxation process. The achievable path length modulation range primarily depends on the pump's power and the convective heat-transfer coefficient of the surrounding gas, while the time response primarily depends on the heated fiber's diameter. An absolute optical length change in excess of 500 µm and a time-constant as short as 11 ms, were demonstrated experimentally. The all-fiber design allows for an electrically-passive and remote operation of the modulator. The presented modulator could find use within various fiber-optics systems that require optical (remote) path length control or modulation.

  14. Long-range dependence in returns and volatility of Central European Stock Indices

    Czech Academy of Sciences Publication Activity Database

    Krištoufek, Ladislav

    2010-01-01

    Roč. 2010, č. 3 (2010), s. 1-19 R&D Projects: GA ČR GD402/09/H045 Institutional research plan: CEZ:AV0Z10750506 Keywords : long-range dependence * rescaled range * modified rescaled range * bootstrapping Subject RIV: AH - Economics http://library.utia.cas.cz/separaty/2010/E/kristoufek-long-range dependence in returns and volatility of central european stock indices.pdf

  15. FREIGHTVISION. Sustainable European freight transport 2050. Forecast, vision and policy recommendation

    Energy Technology Data Exchange (ETDEWEB)

    Helmreich, Stephan [AustriaTech Federal Agency for Technological Measurements Ltd., Wien (Austria). Future of Transport; Keller, Hartmut (eds.) [TransVer GmbH-Transport Research and Consultancy, Muenchen (Germany)

    2011-07-01

    This book has been written on the basis of the research done between 2008 and 2010 as part of the European Commission funded FREIGHTVISION project. The ''FREIGHTVISION - Freight Transport 2050 Foresight'' project was funded by the Directorate General MOVE to design a long term vision for European freight transport in 2050 and to identify actions and research to progress appropriate freight transport measures in Europe. The project was carried out as a foresight process encompassing four conferences in which the project team identified and developed with the aid of more than 100 experts an action plan for securing long term freight transport in Europe. The book provides insights into the freight transport visions and Backcasts identified for 2035 and 2050, issues which need to be addressed and measures which were assessed to be part of future paths to assure an economical, environmental, and social freight transport system. (orig.)

  16. The European Crisis Management: An Organizational Narrative

    Directory of Open Access Journals (Sweden)

    Patrícia Kaplánová

    2016-12-01

    Full Text Available The debate of scholars in the field of international relations in last years has put the European Union’s role into the consideration. The European Foreign and Security Policy has positioned itself through its development to the constructive and normative line of research of world politics. With this respect, this article examines a character of crisis management of the European Common Foreign Policy based on the institutional development. Besides the European Union does not possess a unified foreign and security policy, regardless one army and single institutional mechanism, the recent crisis management actions have shaped the policies into a comprehensive nature. The paper overviews briefly the history of Common Foreign and Security Policy as well as Common Security and Defence Policy and focuses on crisis management of civilian and military missions. The author claims that the development has a significant impact on a character of crisis management analyzed from the institutional and financial capacities of the European Security and Defence Policy. Consequently, the character of crisis management performs complex mechanisms of responsive, political/administrative, legal, economic and human help to crisis-affected territories in the world. Respectfully, the character of crisis management has thus more pre-crisis nature of a resilience.

  17. Denmark and the European Union

    DEFF Research Database (Denmark)

    Manners, Ian

    2011-01-01

    Over the past two decades Morten Kelstrup’s work has been at the centre of three important intellectual innovations in political science – the study of the EU as a regional political system; European security studies; and small states in European integration. Kelstrup’s best known books (Buzan, K...... of this book, two of Kelstrup’s most important intellectual contributions come from his work on Denmark’s relations with the European Union, and his use of systems theory to understand the EU.......Over the past two decades Morten Kelstrup’s work has been at the centre of three important intellectual innovations in political science – the study of the EU as a regional political system; European security studies; and small states in European integration. Kelstrup’s best known books (Buzan...

  18. Material dependence of electron inelastic mean free paths at low energies

    International Nuclear Information System (INIS)

    Tanuma, S.; Powell, C.J.; Penn, D.R.

    1990-01-01

    We present and discuss electron inelastic mean free path (IMFP) data for aluminum and gold in the 50--200 eV range. These elements serve as examples of IMFP calculations that have been made for 50--2000 eV electrons in 31 materials (27 elements and 4 compounds). Substantial differences are found in the shapes of the IMFP versus energy curves for Al and Au and these can be understood in terms of the different inelastic scattering mechanisms in the two metals. The minimum IMFP value occurs at 40 eV in aluminum and at 120 eV in gold, a result which is consistent with the trends expected from free-electron IMFP calculations. This result differs, however, from that expected from the Seah and Dench attenuation length formula which shows essentially no material dependence at low energies. We have extended a general formula derived earlier to describe the calculated IMFPs over the 200--2000 eV energy range to give the IMFP dependences on material and energy from 50 to 2000 eV

  19. The externalisation of migration control in the European Union: first steps towards the external dimension of the space of freedom, security and justice

    Directory of Open Access Journals (Sweden)

    Ryabov Yuri

    2012-03-01

    Full Text Available The creation of an area of freedom, security and justice is one of the most rapidly developing aspects of European integration. It this paper, we take a look at the foreign policies involved in this process — aside from the internal development of the European Union, they concern a significant number of third countries, including Russia. In our view, the efforts to manage the flow of migrants and asylum seekers constitute a viable part of the external dimension within the AFSJ policies. Much of this article is based on the theoretical postulates introduced by the scholars of the Paris School, a school within the discipline of security studies that conceptualized the connection between migration, terrorism, asylum, crime and ethnic clashes, and its role as a major threat facing the European Union. Externalization of this complex threat (that is, externalization in relation to the European Union is thus seen as one of the key prerequisites to advancement of migration management activities beyond the EU (i. e. externalization of migration management. In this article, we analyze the role the EU plays at the international scene and categorize the actions it took to manage the influx of migrants and asylum seekers from the 1980s until the time when supranational administrative bodies were granted mandates in the spheres of Justice and Home Affairs (JHA of the EU Member States. We conclude that it was as early as the 1990-s that the EU launched the policy which later allowed to transfer part of its security concerns to third countries.

  20. Updated European Heart Rhythm Association practical guide on the use of non-vitamin-K antagonist anticoagulants in patients with non-valvular atrial fibrillation: Executive summary.

    Science.gov (United States)

    Heidbuchel, Hein; Verhamme, Peter; Alings, Marco; Antz, Matthias; Diener, Hans-Christoph; Hacke, Werner; Oldgren, Jonas; Sinnaeve, Peter; Camm, A John; Kirchhof, Paulus

    2017-07-14

    In 2013, the European Heart Rhythm Association (EHRA) published a Practical Guide on the use of non-VKA oral anticoagulants (NOACs) in patients with atrial fibrillation (AF) (Heidbuchel H, Verhamme P, Alings M, Antz M, Hacke W, Oldgren J, Sinnaeve P, Camm AJ, Kirchhof P, European Heart Rhythm A. European Heart Rhythm Association Practical Guide on the use of new oral anticoagulants in patients with non-valvular atrial fibrillation. Europace 2013;15:625-651; Heidbuchel H, Verhamme P, Alings M, Antz M, Hacke W, Oldgren J, Sinnaeve P, Camm AJ, Kirchhof P. EHRA practical guide on the use of new oral anticoagulants in patients with non-valvular atrial fibrillation: executive summary. Eur Heart J 2013;34:2094-2106). The document received widespread interest, not only from cardiologists but also from neurologists, geriatricians, and general practitioners, as became evident from the distribution of >350 000 copies of its pocket version (the EHRA Key Message Booklet) world-wide. Since 2013, numerous new studies have appeared on different aspects of NOAC therapy in AF patients. Therefore, EHRA updated the Practical Guide, including new information but also providing balanced guiding in the many areas where prospective data are still lacking. The outline of the original guide that addressed 15 clinical scenarios has been preserved, but all chapters have been rewritten. Main changes in the Update comprise a discussion on the definition of 'non-valvular AF' and eligibility for NOAC therapy, inclusion of finalized information on the recently approved edoxaban, tailored dosing information dependent on concomitant drugs, and/or clinical characteristics, an expanded chapter on neurologic scenarios (ischaemic stroke or intracranial haemorrhage under NOAC), an updated anticoagulation card and more specifics on start-up and follow-up issues. There are also many new flow charts, like on appropriate switching between anticoagulants (VKA to NOAC or vice versa), default scenarios for

  1. Comparing of the Reaction Time in Substance-Dependent and Non-Dependent Individuals

    Directory of Open Access Journals (Sweden)

    Mohammad Narimani

    2012-11-01

    Full Text Available Aim: The aim of this study was to compare the simple, selective, and discrimination reaction time in substance-dependent and non-dependent individuals. Method: In this causal-comparative study, the population included of 425 males (opium and crystal dependents who were referred to addiction rehabilitation centers in Tabriz. By random sampling, 16 opium dependents, 16 crystal dependents, and 16 non-dependent individuals with no history of dependency as the compare group were selected. All groups peered in age, and marital status. For gathering data, “Addicts Admit Questionnaire” and laboratory device known as the "Reaction Time Assay" have been used. Results: The results of this study showed that there are significant differences among all groups in simple reaction time, choice reaction time and reaction time to auditory stimuli, but no significant difference in discrimination reaction time and reaction time to visual stimulus observed. Conclusion: The reaction time of substance-dependent groups is slower than non-dependent groups.

  2. Energy planning and security of supply in Spain and their compliance with the European legal framework

    International Nuclear Information System (INIS)

    Dolader, J.

    2004-01-01

    The electricity and gas markets in Spain were liberalized by the 1997 Electricity Act and the 1998 Hydrocarbons Act, respectively. The final step of the liberalization process was completed in January 2003 with the full eligibility of Spanish electricity and gas consumers. The liberalization Acts include in addition a two-way long-term energy planning process within a ten-year time scope. On the one hand the planning process involves binding planning concerning the so called 'basic infrastructures' (which include the electricity and gas transmission networks plus the total re-gasification capacity), and on the other hand, an indicative energy planning aimed at facilitating the decision making of administrations and agents by forecasting energy demand, and analyzing its coverage under the premises of security of supply. The present paper describes the current energy planning system in Spain, the provisions to ensure the security of supply and their compliance with the new European legislation - both the proposed and the existent one - regarding the security of supply in the EU.(author)

  3. Verification of Security Policy Enforcement in Enterprise Systems

    Science.gov (United States)

    Gupta, Puneet; Stoller, Scott D.

    Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.

  4. The Early Career Paths of UK-Educated Intra-European Mobile Graduates

    Science.gov (United States)

    Behle, Heike

    2017-01-01

    Students and graduates alike are encouraged to enhance their skills and knowledge by moving to a different European country as both national governments and European institutions anticipate individual skill gains, closer European networks and a boost to national economies as a result. Using data from a longitudinal survey, this paper follows…

  5. POLICE OFFICE MODEL IMPROVEMENT FOR SECURITY OF SWARM ROBOTIC SYSTEMS

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-09-01

    Full Text Available This paper focuses on aspects of information security for group of mobile robotic systems with swarm intellect. The ways for hidden attacks realization by the opposing party on swarm algorithm are discussed. We have fulfilled numerical modeling of potentially destructive information influence on the ant shortest path algorithm. We have demonstrated the consequences of attacks on the ant algorithm with different concentration in a swarm of subversive robots. Approaches are suggested for information security mechanisms in swarm robotic systems, based on the principles of centralized security management for mobile agents. We have developed the method of forming a self-organizing information security management system for robotic agents in swarm groups implementing POM (Police Office Model – a security model based on police offices, to provide information security in multi-agent systems. The method is based on the usage of police station network in the graph nodes, which have functions of identification and authentication of agents, identifying subversive robots by both their formal characteristics and their behavior in the swarm. We have suggested a list of software and hardware components for police stations, consisting of: communication channels between the robots in police office, nodes register, a database of robotic agents, a database of encryption and decryption module. We have suggested the variants of logic for the mechanism of information security in swarm systems with different temporary diagrams of data communication between police stations. We present comparative analysis of implementation of protected swarm systems depending on the functioning logic of police offices, integrated in swarm system. It is shown that the security model saves the ability to operate in noisy environments, when the duration of the interference is comparable to the time necessary for the agent to overcome the path between police stations.

  6. Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion

    International Nuclear Information System (INIS)

    Lv, Haitao; Yin, Chao; Cui, Zongmin; Zhan, Qin; Zhou, Hongbo

    2015-01-01

    For a security system, the risk assessment is an important method to verdict whether its protection effectiveness is good or not. In this paper, a security system is regarded abstractly as a network by the name of a security network. A security network is made up of security nodes that are abstract functional units with the ability of detecting, delaying and responding. By the use of risk entropy and the Neyman–Pearson criterion, we construct a model to computer the protection probability of any position in the area where a security network is deployed. We provide a solution to find the most vulnerable path of a security network and the protection probability on the path is considered as the risk measure. Finally, we study the effect of some parameters on the risk and the breach protection probability of a security network. Ultimately, we can gain insight about the risk assessment of a security system. - Highlights: • A security system is regarded abstractly as a network made up of security nodes. • We construct a model to computer the protection probability provided by a security network. • We provide a better solution to find the most vulnerable path of a security network. • We build a risk assessment model for a security network based on the most vulnerable path

  7. Natural gas and energy security

    International Nuclear Information System (INIS)

    Saga, B.P.

    1996-01-01

    This paper relates to energy security by natural gas supply seen in an International Energy Agency perspective. Topics are: Security of supply, what is it; the role gas on the European energy scene; short term security of supply; long term security of supply; future structural and regulatory developments and possible implications for security of supply. 6 figs

  8. Studies on jet path length dependence in Pb+Pb Collisions with the ATLAS detector

    CERN Document Server

    Santos, Helena; The ATLAS collaboration

    2015-01-01

    The phenomenon of events containing highly asymmetric dijet pairs is one of the most striking results in heavy ion physics. It has provided the first direct observation of in-medium jet energy loss at the LHC. New results showing the variation of the dijet asymmetry with the angle between the leading jet and the second order event-plane are presented. This observable effectively probes the path-length dependence of the *dijet* asymmetry at fixed centrality. The variation of the dijet asymmetry with the soft particle $v_2$, at fixed centrality is also measured. These measurements can provide a better understanding of the correlation of the parton energy-loss with the underlying geometry. Correlated production of nearby jets is also shown. Two neighbouring jets originating from the same hard scattering should have more similar path lengths in the medium compared to the two jets in the dijet event topology, therefore measuring neighbouring jets may probe differences in quenching that do not result from different...

  9. Pathways to an East Asian Higher Education Area: A Comparative Analysis of East Asian and European Regionalization Processes

    Science.gov (United States)

    Chao, Roger Y., Jr.

    2014-01-01

    The Author argues that historical regional developments in Europe and East Asia greatly influence the formation of an East Asian Higher Education Area. As such, this article compares European and East Asian regionalization and higher education regionalization processes to show this path dependency in East Asian regionalization of higher education…

  10. Speaker's presentations. Energy supply security

    International Nuclear Information System (INIS)

    Pierret, Ch.

    2000-01-01

    This document is a collection of most of the papers used by the speakers of the European Seminar on Energy Supply Security organised in Paris (at the French Ministry of Economy, Finance and Industry) on 24 November 2000 by the General Direction of Energy and Raw Materials, in co-operation with the European Commission and the French Planning Office. About 250 attendees were present, including a lot of high level Civil Servants from the 15 European State members, and their questions have allowed to create a rich debate. It took place five days before the publication, on 29 November 2000, by the European Commission, of the Green Paper 'Towards a European Strategy for the Security of Energy Supply'. This French initiative, which took place within the framework of the European Presidency of the European Union, during the second half-year 2000. will bring a first impetus to the brainstorming launched by the Commission. (author)

  11. Regularizing Feynman path integrals using the generalized Kontsevich-Vishik trace

    Science.gov (United States)

    Hartung, Tobias

    2017-12-01

    A fully regulated definition of Feynman's path integral is presented here. The proposed re-formulation of the path integral coincides with the familiar formulation whenever the path integral is well defined. In particular, it is consistent with respect to lattice formulations and Wick rotations, i.e., it can be used in Euclidean and Minkowski space-time. The path integral regularization is introduced through the generalized Kontsevich-Vishik trace, that is, the extension of the classical trace to Fourier integral operators. Physically, we are replacing the time-evolution semi-group by a holomorphic family of operators such that the corresponding path integrals are well defined in some half space of C . The regularized path integral is, thus, defined through analytic continuation. This regularization can be performed by means of stationary phase approximation or computed analytically depending only on the Hamiltonian and the observable (i.e., known a priori). In either case, the computational effort to evaluate path integrals or expectations of observables reduces to the evaluation of integrals over spheres. Furthermore, computations can be performed directly in the continuum and applications (analytic computations and their implementations) to a number of models including the non-trivial cases of the massive Schwinger model and a φ4 theory.

  12. Functional dependency between the logistics security system and the MySAP ERP in metallurgy

    Directory of Open Access Journals (Sweden)

    P. Ranitović

    2013-10-01

    Full Text Available MySAP ERP - Enterprise Resource Planning (system - solution which provides a whole set of functions for the business analytics, finance, human resources management, logistics and corporate services has developed from SAP R/3. It is one of the main products of the SAP AG German multinational company and as such, it is a very important element of the international industrial and technological security system. By defining the functional dependency between the security systems (logistics security systems and the IT (My SAP ERP systems in metallurgy, a concept for designing MY SAP ERP system in metallurgic industry is defined, based on the security aspects.

  13. Measuring the effect of ethnic and non-ethnic discrimination on Europeans' self-rated health.

    Science.gov (United States)

    Alvarez-Galvez, Javier

    2016-04-01

    The study of perceived discrimination based on race and ethnic traits belongs to a long-held tradition in this field, but recent studies have found that non-ethnic discrimination based on factors such as gender, disability or age is also a crucial predictor of health outcomes. Using data from the European Social Survey (2010), and applying Boolean Factor Analysis and Ordered Logistic Regression models, this study is aimed to compare how ethnic and non-ethnic types of discrimination might affect self-rated health in the European context. We found that non-ethnic types of discrimination produce stronger differences on health outcomes. This result indicates that the probabilities of presenting a poor state of health are significantly higher when individuals feel they are being discriminated against for social or demographic conditions (gender, age, sexuality or disability) rather than for ethnic reasons (nationality, race, ethnicity, language or religiosity). This study offers a clear comparison of health inequalities based on ethnic and non-ethnic types of discrimination in the European context, overcoming analytical based on binary indicators and simple measures of discrimination.

  14. Elements of ESA's policy on space and security

    Science.gov (United States)

    Giannopapa, Christina; Adriaensen, Maarten; Antoni, Ntorina; Schrogl, Kai-Uwe

    2018-06-01

    In the past decade Europe has been facing rising security threats, ranging from climate change, migrations, nearby conflicts and crises, to terrorism. The demand to tackle these critical challenges is increasing in Member States. Space is already contributing, and could further contribute with already existing systems and future ones. The increasing need for security in Europe and for safety and security of Europe's space activities has led to a growing number of activities in ESA in various domains. It has also driven new and strengthened partnerships with security stakeholders in Europe. At the European level, ESA is collaborating closely with the main European institutions dealing with space security. In addition, as an organisation ESA has evolved to conduct security-related projects and programmes and to address the threats to its own activities, thereby securing the investments of the Member States. Over the past years the Agency has set up a comprehensive regulatory framework in order to be able to cope with security related requirements. Over the past years, ESA has increased its exchanges with its Member States. The paper presents main elements of the ESA's policy on space and security. It introduces the current European context for space and security, the European goals in this domain and the specific objectives to which the Agency intends to contribute. Space and security in the ESA context is set out under two components: a) security from space and b) security in space, including the security of ESA's own activities (corporate security and the security of ESA's space missions). Subsequently, ESA's activities are elaborated around these two pillars, composed of different activities conducted in the most appropriate frameworks and in coordination with the relevant stakeholders and shareholders.

  15. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  16. Return polynomials for non-intersecting paths above a surface on the directed square lattice

    Energy Technology Data Exchange (ETDEWEB)

    Brak, R. [Deartment of Mathematics, University of Melbourne, Parkville, VIC (Australia)]. E-mail: r.brak@ms.unimelb.edu.au; Essam, J.W. [Department of Mathematics, Royal Holloway College, University of London, Egham, Surrey (United Kingdom)]. E-mail: j.essam@alpha1.rhul.ac.uk

    2001-12-14

    We enumerate sets of n non-intersecting, t-step paths on the directed square lattice which are excluded from the region below the surface y=0 to which they are initially attached. In particular we obtain a product formula for the number of star configurations in which the paths have arbitrary fixed endpoints. We also consider the 'return' polynomial, R-'{sup W}{sub t}(y;k)={sigma}{sub m{>=}}{sub 0}r-'{sup W}{sub t}(y;m)k{sup m} where r-'{sup W}{sub t}(y;m) is the number of n-path configurations of watermelon type having deviation {gamma} for which the path closest to the surface returns to the surface m times. The 'marked return' polynomial is defined by u-'{sup W}{sub t}(y;k{sub 1}){identical_to}R-'{sup W}{sub 1}(y;k{sub 1}+l)={sigma}{sub m{>=}}{sub 0}u-'{sup W}{sub t}(y;m)k{sub 1}{sup m} where u-'{sup W}{sub t}(y;m) is the number of marked configurations having at least m returns, just m of which are marked. Both r-'{sup W}{sub t}(y;m) and u-'{sup W}(y;m) are expressed in terms of the numbers of paths ignoring returns but introducing a suitably modified endpoint condition. This enables u-'{sup W}{sub t}(y;m) to be written in product form for arbitrary y, but for r-'{sup W}{sub t}(y;m) this can only be done in the case y=0. (author)

  17. The Creation of an Energy Security Society as a Way to Decrease Securitization Levels between the European Union and Russia in Energy Trade

    Directory of Open Access Journals (Sweden)

    Olga Khrushcheva

    2011-05-01

    Full Text Available The energy trade between the European Union and Russia is securitized due to a combination of factors. First, there are securitizing agents within the European Union. Second, the domestic consolidation of the energy sector under governmental control, the Gazprom monopoly on transportation networks linking Central Asian gas with European markets and the state imposed-limits on foreign direct investment may also raise concerns in the European Union. Finally, Russia is also securitizing the energy sphere by claiming that the EU is trying to impose its values on Russia (for example through the Energy Charter Treaty, which contradicts Russian interests. This article combines securitization theory and the English School of thought and argues that the creation of an Energy Security Society could help de-securitize energy trade between the European Union and Russia.

  18. Constrained-path quantum Monte Carlo approach for non-yrast states within the shell model

    Energy Technology Data Exchange (ETDEWEB)

    Bonnard, J. [INFN, Sezione di Padova, Padova (Italy); LPC Caen, ENSICAEN, Universite de Caen, CNRS/IN2P3, Caen (France); Juillet, O. [LPC Caen, ENSICAEN, Universite de Caen, CNRS/IN2P3, Caen (France)

    2016-04-15

    The present paper intends to present an extension of the constrained-path quantum Monte Carlo approach allowing to reconstruct non-yrast states in order to reach the complete spectroscopy of nuclei within the interacting shell model. As in the yrast case studied in a previous work, the formalism involves a variational symmetry-restored wave function assuming two central roles. First, it guides the underlying Brownian motion to improve the efficiency of the sampling. Second, it constrains the stochastic paths according to the phaseless approximation to control sign or phase problems that usually plague fermionic QMC simulations. Proof-of-principle results in the sd valence space are reported. They prove the ability of the scheme to offer remarkably accurate binding energies for both even- and odd-mass nuclei irrespective of the considered interaction. (orig.)

  19. Quantum gravitation. The Feynman path integral approach

    International Nuclear Information System (INIS)

    Hamber, Herbert W.

    2009-01-01

    The book covers the theory of Quantum Gravitation from the point of view of Feynman path integrals. These provide a manifestly covariant approach in which fundamental quantum aspects of the theory such as radiative corrections and the renormalization group can be systematically and consistently addressed. The path integral method is suitable for both perturbative as well as non-perturbative studies, and is known to already provide a framework of choice for the theoretical investigation of non-abelian gauge theories, the basis for three of the four known fundamental forces in nature. The book thus provides a coherent outline of the present status of the theory gravity based on Feynman's formulation, with an emphasis on quantitative results. Topics are organized in such a way that the correspondence to similar methods and results in modern gauge theories becomes apparent. Covariant perturbation theory are developed using the full machinery of Feynman rules, gauge fixing, background methods and ghosts. The renormalization group for gravity and the existence of non-trivial ultraviolet fixed points are investigated, stressing a close correspondence with well understood statistical field theory models. Later the lattice formulation of gravity is presented as an essential tool towards an understanding of key features of the non-perturbative vacuum. The book ends with a discussion of contemporary issues in quantum cosmology such as scale dependent gravitational constants and quantum effects in the early universe. (orig.)

  20. Fatigue crack paths under the influence of changes in stiffness

    Directory of Open Access Journals (Sweden)

    G. Kullmer

    2016-02-01

    Full Text Available An important topic of the Collaborative Research Centre TRR 30 of the Deutsche Forschungsgemeinschaft (DFG is the crack growth behaviour in graded materials. In addition, the growth of cracks in the neighbourhood of regions and through regions with different material properties belongs under this topic. Due to the different material properties, regions with differing stiffness compared to the base material may arise. Regions with differing stiffness also arise from ribs, grooves or boreholes. Since secure findings on the propagation behaviour of fatigue cracks are essential for the evaluation of the safety of components and structures, the growth of cracks near changes in stiffness has to be considered, too. Depending on the way a crack penetrates the zone of influence of such a change in stiffness and depending on whether this region is more compliant or stiffer than the surrounding area the crack may grow towards or away from this region. Both cases result in curved crack paths that cannot be explained only by the global loading situation. To evaluate the influence of regions with differing stiffness on the path of fatigue cracks the paths and the stress intensity factors of cracks growing near and through regions with differing stiffness are numerically determined with the program system ADAPCRACK3D. Therefore, arrangements of changes in stiffness modelled as material inclusions with stiffness properties different from the base material or modelled as ribs and grooves are systematically varied to develop basic conclusions about the crack growth behaviour near and through changes in stiffness.

  1. Russia and the European Union: an elusive quest for common values?

    Directory of Open Access Journals (Sweden)

    Ryngaert Cedric

    2012-12-01

    Full Text Available This article focuses on the dialogue between the Russian Federation and the European Union based on “common values” (legal sphere and the rule of law, which form the framework for the EU-Russia “common spaces” — on the economy, freedom, security and justice, as well as in the field of research and education (including cultural aspects. The author analyses the current state of the EU-Russia dialogue (section 1, East-West cooperation in the framework of the Organisation for Security and Cooperation in Europe (section 2, and the position of the Council of Europe member states on the European Court for Human Rights (section 3. The author comes to a conclusion that the concept of “common values” is to a great degree fictitious, and its viability depends on whether Russia behaves as a European country. The complete internalisation of democratic values, human rights, and good governance is still unattainable for the Russian Federation, which uses the platform of common values predominantly to achieve strategic goals (section 4.

  2. 20 CFR 404.1402 - When are railroad industry services by a non-vested worker covered under Social Security?

    Science.gov (United States)

    2010-04-01

    ...-vested worker covered under Social Security? 404.1402 Section 404.1402 Employees' Benefits SOCIAL... When are railroad industry services by a non-vested worker covered under Social Security? If you are a non-vested worker, we (the Social Security Administration) will consider your services in the railroad...

  3. Learning from “Shadow Security”: Why understanding non-compliance provides the basis for effective security

    OpenAIRE

    Kirlappos, I.; Parkin, S.; Sasse, M. A.

    2014-01-01

    Over the past decade, security researchers and practitioners have tried to understand why employees do not comply with organizational security policies and mechanisms. Past re-search has treated compliance as a binary decision: people comply, or they do not. From our analysis of 118 in-depth interviews with individuals (employees in a large multinational organization) about security non-compliance, a 3rd response emerges: shadow security. This describes the instances where security-conscious ...

  4. Mobility Partnerships and Security Subcomplexes in the Mediterranean

    DEFF Research Database (Denmark)

    Seeberg, Peter

    2017-01-01

    issues, the article analyses the MPs by looking at the strategic significance of migration in the context of EU’s foreign and security policy cooperation with the five Arab Mediterranean states. The MPs are seen as an important element in the EU’s overall migration strategy, but have been met......The present article discusses the negotiating and implementing of Mobility Partnership (MP) agreements between the European Union (EU) and Egypt, Jordan, Lebanon, Morocco, and Tunisia. Taking its starting point in the conceptual notions of subregional security complexes and non-traditional security...... with reluctance by the Arab partner states. The article concludes that so far only to a limited degree have the MPs developed into well-functioning tools for managing the migration policies of the EU and its partners states, and that they seem mainly to play a role as instruments for the EU’s foreign and security...

  5. EMP Threats to US National Security: Congressional Responses

    Science.gov (United States)

    Huessy, Peter

    2011-04-01

    The US Congress is considering how best to respond to concerns that EMP is a real and present danger to US security. The threats come from a variety of areas: solar storms, non-nuclear EMP from man-made machines and devices; and nuclear EMP from a nuclear device exploded above CONUS or other critical areas important to the United States and its allies. Responses have to date included passage in the House of legislation to protect the electrical grid in the United States from such threats and hearings before the Homeland Security Committee. Additional efforts include examining missile defense responses, protection of the maritime domain, and hardening of US military and related civilian infrastructure. The House of Representatives has also examined what Europe, the European Union and NATO, both government and private industry, have done in these areas. Complicating matters are related issues of cyber-security and overall homeland security priorities.

  6. Nuclear non-proliferation and security culture within EDF nuclear fleet

    International Nuclear Information System (INIS)

    Debes, M.

    2013-01-01

    This document describes the nuclear non-proliferation strategy and the safety culture of EDF. The author lists all the mandatory rules and regulations at international and national levels EDF has to comply with. All these requirements are applied in EDF nuclear facilities through adequate procedures that assure a nuclear material accountancy, a follow-up of any item containing nuclear material in the facility, and internal controls. External independent controls are also performed. The EDF security policy goal is to protect human, material and knowledge assets, and to preserve operational capacity, competitiveness and public confidence, within national regulatory framework and regulation on 'vital importance facilities'. The treatment of events or incident (detection, analysis, lessons drawn, experience feedback) is a tool to progress, along with reporting, internal control process and audits. The security requirements cover the different related domains important to EDF industrial assets: security of employees against assaults; security of data according to their sensibility level; security of the information system and telecom; awareness and training of employees; relations with external suppliers or contractors; business premises; security of staff and projects abroad. For industrial facilities and grids (facilities of 'vital importance'...), the defense in depth principles are applied against the different threat scenarios. Security measures are studied at the design stage in a consistent way with nuclear safety measures, while taking into account the protective means deployed by public authorities. These risk analysis are periodically reassessed. The paper is followed by the slides of the presentation. (A.C.)

  7. Environmental impact assessment of european non-ferro mining industries through life-cycle assessment

    Science.gov (United States)

    Hisan Farjana, Shahjadi; Huda, Nazmul; Parvez Mahmud, M. A.

    2018-05-01

    European mining industries are the vast industrial sector which contributes largely on their economy which constitutes of ferro and non-ferro metals and minerals industries. The non-ferro metals extraction and processing industries require focus of attention due to sustainability concerns as their manufacturing processes are highly energy intensive and impacts globally on environment. This paper analyses major environmental effects caused by European metal industries based on the life-cycle impact analysis technologies. This research work is the first work in considering the comparative environmental impact analysis of European non-ferro metal industries which will reveal their technological similarities and dissimilarities to assess their environmental loads. The life-cycle inventory datasets are collected from the EcoInvent database while the analysis is done using the CML baseline and ReCipe endpoint method using SimaPro software version 8.4. The CML and ReCipe method are chosen because they are specialized impact assessment methods for European continent. The impact categories outlined for discussion here are human health, global warming and ecotoxicity. The analysis results reveal that the gold industry is vulnerable for the environment due to waste emission and similar result retained by silver mines a little bit. But copper, lead, manganese and zinc mining processes and industries are environment friendly in terms of metal extraction technologies and waste emissions.

  8. Tackling Dependency: The EU and its Energy Security Challenges

    Energy Technology Data Exchange (ETDEWEB)

    Larsson, Robert L

    2007-10-15

    Europe is facing a future of augmenting energy demands, domestic depletion, high prices and other energy-political challenges. Climate change, infrastructure resilience, producers' coercive energy policy and the EU's internal market failures have put stress on the EU's emerging energy policy and inspired the union to address its challenges with greater enthusiasm than before. Some of the EU's challenges call for strategic choices of a magnitude that EU is not used to handle. The aim of this report is therefore to identify, analyse and assess the political side of Europe's energy predicament and import dependency. Against the background of increasing dependence on energy imports, the report tries to answer questions: what are the key dimensions of Europe's energy security and what are their consequences?

  9. Tackling Dependency: The EU and its Energy Security Challenges

    International Nuclear Information System (INIS)

    Larsson, Robert L.

    2007-10-01

    Europe is facing a future of augmenting energy demands, domestic depletion, high prices and other energy-political challenges. Climate change, infrastructure resilience, producers' coercive energy policy and the EU's internal market failures have put stress on the EU's emerging energy policy and inspired the union to address its challenges with greater enthusiasm than before. Some of the EU's challenges call for strategic choices of a magnitude that EU is not used to handle. The aim of this report is therefore to identify, analyse and assess the political side of Europe's energy predicament and import dependency. Against the background of increasing dependence on energy imports, the report tries to answer questions: what are the key dimensions of Europe's energy security and what are their consequences?

  10. Masters in Nuclear Security

    International Nuclear Information System (INIS)

    Rickwood, Peter

    2013-01-01

    Continuing global efforts to improve the security of nuclear and other radioactive material against the threat of malicious acts are being assisted by a new initiative, the development of a corps of professional experts to strengthen nuclear security. The IAEA, the European Commission, universities, research institutions and other bodies working in collaboration have established an International Nuclear Security Education Network (INSEN). In 2011, six European academic institutions, the Vienna University of Technology, the Brandenburg University of Applied Sciences, the Demokritos National Centre for Scientific Research in Greece, the Reactor Institute Delft of the Delft University of Technology in the Netherlands, the University of Oslo, and the University of Manchester Dalton Nuclear Institute, started developing a European Master of Science Programme in Nuclear Security Management. In March 2013, the masters project was inaugurated when ten students commenced studies at the Brandenburg University of Applied Sciences in Germany for two weeks. In April, they moved to the Delft University of Technology in the Netherlands for a further two weeks of studies. The pilot programme consists of six teaching sessions in different academic institutions. At the inauguration in Delft, IAEA Director General Yukiya Amano commended this effort to train a new generation of experts who can help to improve global nuclear security. ''It is clear that we will need a new generation of policy-makers and nuclear professionals - people like you - who will have a proper understanding of the importance of nuclear security,'' Mr. Amano told students and faculty members. ''The IAEA's goal is to support the development of such programmes on a global basis,'' said David Lambert, Senior Training Officer in the IAEA's Office of Nuclear Security. ''An existing postgraduate degree programme focused on nuclear security at Naif Arab University for Security Sciences (NAUSS) is currently supported by

  11. ROMANIA ON THE PATH TO SUSTAINABLE DEVELOPMENT. COMPARATIVE ANALYSIS WITHIN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Kardos Mihaela

    2012-12-01

    Full Text Available Nowadays, the issues of sustainable development are of great interest and importance, as countries, organisations, institutions worldwide are still searching for the right solutions leading to human well-being and life quality in a society socially acceptable, economically viable and environmentally sustainable, in an integrated vision between states and generations. Due to the difficulties of measuring such a complex, multi-dimensioned concept, one of the main questions refers to necessity and the possibility of determining countries’ progress towards sustainable development. In this respect, there are a very large number of initiatives and efforts to develop the appropri¬ate indicators; yet, there is no one agreed method. In this generous context of analysis, the paper aims to offer some answers regarding Romania’s progress towards sustainable development, based on a comparative analysis within the European Union, using data provided by three of the most widely used indicators for measuring sustainable development: Human Development Index, Environmental Performance Index and Ecological Footprint. The research methodology uses the comparative analysis and synthesis of data, followed by a dissemination of the results in order to express a personal opinion on the topic. The research results are far from being optimistic, highlighting a serious gap between Romania and the other member states in terms of progress towards sustainable development. Therefore, they call for immediate action and increased efforts, so that European Union’s objectives of real cohesion and of becoming one of the global leaders in supporting sustainable development can be reached. The merit of this study is its contribution with an original research to the efforts of assessing Romania’s progress on the path to sustainable development, which may be particularly important for both researchers and policy makers. Due to some limitations induced by

  12. Sweden and the NEGP: A Pilot Study of the North European Gas Pipeline and Sweden's Dependence on Russian Energy

    Energy Technology Data Exchange (ETDEWEB)

    Larsson, Robert L

    2006-06-15

    Developments between 2004 and 2006 indicate that a North European Gas Pipeline (NEGP) through the Baltic Sea, from Russia to Germany, may be realised in the coming decade. This would provide Europe with yet another opportunity to diversify its import channels of gas. It is however reasonable to assume that the NEGP also could change the strategic pattern and be a source of friction. The NEGP may rock the regional stability and reduce the potential of the new EU members to become security providers in Europe's northern dimension. It also gives increased leverage and influence to Russia, a state that has moved in an authoritarian direction under President Putin. The aim of this pilot study is to elucidate on the NEGP pipeline and Sweden's increasing dependence on Russian energy. A subsidiary aim is to outline a set of concerns that have bearing on the situation for the EU and Baltic Sea Region and that need to be further addressed. In conclusion, the NEGP will enhance Russia's direct leverage on Poland, Ukraine, and Belarus, as it will allow Russia to turn off gas supplies without affecting exports to other parts of Europe. Russia will also increase its leverage over the states that will or may be connected to the NEGP (Germany, and possibly Belgium, Denmark, the Netherlands and the UK). Even if Sweden is not embracing the NEGP, it is today highly sensitive as it imports most of its energy. It is increasingly dependent on Russian oil and is partly dependent on imports of electricity from Russia. Should the NEGP materialise and Sweden becomes connected in the future, it would likely be dependent also on natural gas. It is of paramount importance for the energy security of the connected states how the pipeline is constructed and operated. If there will be technical possibilities for Russia to tamper with the flow of gas to individual states without affecting supply to others, there are tangible threats to the importing states.

  13. Sweden and the NEGP: A Pilot Study of the North European Gas Pipeline and Sweden's Dependence on Russian Energy

    International Nuclear Information System (INIS)

    Larsson, Robert L.

    2006-06-01

    Developments between 2004 and 2006 indicate that a North European Gas Pipeline (NEGP) through the Baltic Sea, from Russia to Germany, may be realised in the coming decade. This would provide Europe with yet another opportunity to diversify its import channels of gas. It is however reasonable to assume that the NEGP also could change the strategic pattern and be a source of friction. The NEGP may rock the regional stability and reduce the potential of the new EU members to become security providers in Europe's northern dimension. It also gives increased leverage and influence to Russia, a state that has moved in an authoritarian direction under President Putin. The aim of this pilot study is to elucidate on the NEGP pipeline and Sweden's increasing dependence on Russian energy. A subsidiary aim is to outline a set of concerns that have bearing on the situation for the EU and Baltic Sea Region and that need to be further addressed. In conclusion, the NEGP will enhance Russia's direct leverage on Poland, Ukraine, and Belarus, as it will allow Russia to turn off gas supplies without affecting exports to other parts of Europe. Russia will also increase its leverage over the states that will or may be connected to the NEGP (Germany, and possibly Belgium, Denmark, the Netherlands and the UK). Even if Sweden is not embracing the NEGP, it is today highly sensitive as it imports most of its energy. It is increasingly dependent on Russian oil and is partly dependent on imports of electricity from Russia. Should the NEGP materialise and Sweden becomes connected in the future, it would likely be dependent also on natural gas. It is of paramount importance for the energy security of the connected states how the pipeline is constructed and operated. If there will be technical possibilities for Russia to tamper with the flow of gas to individual states without affecting supply to others, there are tangible threats to the importing states

  14. Report of the international forum on nuclear energy, nuclear non-proliferation and nuclear security. Measures to ensure nuclear non-proliferation and nuclear security for the back end of nuclear fuel cycle and regional cooperation in Asia

    International Nuclear Information System (INIS)

    Tazaki, Makiko; Yamamura, Tsukasa; Suzuki, Mitsutoshi; Kuno, Yusuke; Mochiji, Toshiro

    2013-03-01

    The Japan Atomic Energy Agency (JAEA) held 'International Forum on Nuclear Energy, Nuclear Non-proliferation and Nuclear Security - Measures to ensure nuclear non-proliferation and nuclear security for the back end of nuclear fuel cycle and regional cooperation in Asia-' on 12 and 13 December 2012, co-hosted by the Japan Institute of International Affairs (JIIA) and School of Engineering, The University of Tokyo. In the forum, keynote speakers from Japan, International Atomic Energy Agency (IAEA), the U.S., France and Republic of Korea (ROK), respectively explained their efforts regarding peaceful use of nuclear energy and nuclear non-proliferation. In two panel discussions, entitled 'Measures to ensure nuclear non-proliferation and nuclear security of nuclear fuel cycle back end' and 'Measures to ensure nuclear non-proliferation and nuclear security for nuclear energy use in the Asian region and a multilateral cooperative framework', active discussions were made among panelists from Japan, IAEA, the U.S., France, ROK, Russia and Kazakhstan. This report includes abstracts of keynote speeches, summaries of two panel discussions and materials of the presentations in the forum. The editors take full responsibility for the wording and content of this report except presentation materials. (author)

  15. Non-equibiaxial deformation of W/Cu nanocomposite thin films on stretchable substrate: Effect of loading path

    Energy Technology Data Exchange (ETDEWEB)

    Renault, Pierre-Olivier, E-mail: pierre.olivier.renault@univ-poitiers.fr [Institut Pprime, CNRS-Université de Poitiers, Bd Marie et Pierre Curie, 86962 Futuroscope (France); Le Bourhis, Eric; Goudeau, Philippe [Institut Pprime, CNRS-Université de Poitiers, Bd Marie et Pierre Curie, 86962 Futuroscope (France); Thiaudière, Dominique [Synchrotron SOLEIL, L' Orme des Merisiers, 91192 Gif sur Yvette (France); Faurie, Damien [LSPM, CNRS-Université Paris13, 93430 Villetaneuse (France)

    2013-12-31

    In situ biaxial tensile tests were carried out on W/Cu nanocomposite thin films deposited on a polyimide cruciform substrate. A biaxial testing machine developed on the DiffAbs beamline at the French SOLEIL synchrotron allows for scrutinizing the mechanical behaviour of crystalline thin films at the micro-scale and the macro-scale using simultaneously synchrotron X-ray diffraction and digital image correlation techniques. Both strain analyses have been performed for two controlled non-equibiaxial loading paths: loading ratios of 0.8 and 0.33. The mechanical response is analysed and compared for the two loading ratios. - Highlights: • Non-equibiaxial tensile tests are performed on metallic film-substrate composite. • Two different loading paths have been performed. • Applied strains are measured in situ by X-ray diffraction and image correlation. • Lattice strain and elastic stress–true strain curves are plotted. • The different mechanical behaviours in the two directions of applied load are revealed.

  16. External dimension of Ukraine’s security policy

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2015-07-01

    Full Text Available Investigation of the external dimension of security policy of Ukraine is stipulated for the need to analyse the current state of relations with organizations such as the Organization for Security and Co-operation in Europe and The Collective Security Treaty Organization, and relations within the Common European Security and Defence Policy. Ukraine’s European Integration means inclusion in the global space security with countries that it shares common values and principles. It does not exclude the collaboration with the countries that belong to other systems of collective security in the scope that is appropriate to basic national interests of Ukraine. It is proved that the activities of the OSCE Special Monitoring Mission is an important contribution to the process of peaceful conflict resolution, and helps to develop democratic principles and foundations of foreign policy. It is determined that the further development of the constructive cooperation between the EU advisory mission under CSDP will provide an opportunity to improve and increase the security of national borders from external threats and challenges, and help to accelerate the process of integration into the European security space. The attention is paid to the fact that, taken into consideration the state of relations with Russia, the further cooperation with the Collective Security Treaty Organization (CSTO may adversely affect the overall security situation in Ukraine and lead to further tension with Russia today.

  17. Path to Prosperity

    OpenAIRE

    Wolfowitz,Paul

    2006-01-01

    Paul Wolfowitz, President of the World Bank, discussed Singapore's remarkable progress along the road from poverty to prosperity which has also been discovered by many other countries in East Asia and around the world. He spoke of how each country must find its own path for people to pursue the same dreams of the chance to go to school, the security of a good job, and the ability to provide a better future for their children. Throughout the world, and importantly in the developing world, ther...

  18. New Paths to Capitalist Agricultural Production in Africa

    DEFF Research Database (Denmark)

    Whitfield, Lindsay

    2017-01-01

    their own export marketing arrangements. This article examines Ghanaian commercial farmers producing and exporting fresh pineapples to European markets. This group of pineapple producer–exporters represents a path to capitalist agricultural production that can be conceptualized as capitalism from outside...

  19. The security analyzer: A security analyzer program written in Prolog

    International Nuclear Information System (INIS)

    Zimmerman, B.D.; Densley, P.J.

    1986-09-01

    The Security Analyzer is a software tool capable of analyzing the effectiveness of a facility's security system. It is written in the Prolog logic programming computer language, using entity-relationship data modeling techniques. The program performs the following functions: (1) provides descriptive, locational and operational status information about intrusion detectors and assessment devices (i.e., ''sensors'' and ''cameras'') upon request; (2) provides for storage and retrieval of maintenance history information for various components of the security system (including intrusion detectors), and allows for changing that information as desired; (3) provides a ''search'' mode, wherein all paths are found from any specified physical location to another specified location which satisfy user chosen ''intruder detection'' probability and elapsed time criteria (i.e., the program finds the ''weakest paths'' from a security point of view). The first two of these functions can be provided fairly easily with a conventional database program; the third function could be provided using Fortran or some similar language, though with substantial difficulty. In the Security Analyzer program, all these functions are provided in a simple and straight-forward manner. This simplicity is possible because the program is written in the symbolic (as opposed to numeric) processing language Prolog, and because the knowledge base is structured according to entity-relationship modeling principles. Also, the use of Prolog and the entity-relationship modeling technique allows the capabilities of the Security analyzer program, both for knowledge base interrogation and for searching-type operations, to be easily expanded in ways that would be very difficult for a numeric and more algorithmically deterministic language such as Fortran to duplicate. 4 refs

  20. ITS Multi-path Communications Access Decision Scheme

    Directory of Open Access Journals (Sweden)

    Miroslav Svitek

    2008-02-01

    Full Text Available Intelligent Transport Systems (ITS require widely spread and guarantied quality communications services. Method of ITS decomposition to set of subsystems and quantification of communications subsystems parameters is introduced. Due to typical complexity of the IST solution and mobility as the typical system elements property idea of communications systems with multipath multivendor structures is adopted. Resolution of seamless switching within a set of available wireless access solutions is presented. CALM based system or specifically designed and configured L3/L2 switching can be relevant solution for multi-path access communication system. These systems meet requirements of the seamless secure communications functionality within even extensive cluster of moving objects. Competent decision processes based on precisely quantified system requirements and each performance indicator tolerance range must be implemented to keep service up and running with no influence of continuously changing conditions in time and served space. Method of different paths service quality evaluation and selection of the best possible active communications access path is introduced. Proposed approach is based on Kalman filtering, which separates reasonable part of noise and also allows prediction of the individual parameters near future behavior. Presented classification algorithm applied on filtered measured data combined with deterministic parameters is trained using training data, i.e. combination of parameters vectors line and relevant decisions. Quality of classification is dependent on the size and quality of the training sets. This method is studied within projects e-Ident, DOTEK and SRATVU which are elaborating results of project CAMNA.

  1. Effects of T-type Channel on Natural Convection Flows in Airflow-Path of Concrete Storage Cask

    Energy Technology Data Exchange (ETDEWEB)

    Kang, Gyeong Uk; Kim, Hyoung Jin; Cho, Chun Hyung [KORAD, Daejeon (Korea, Republic of)

    2016-05-15

    The natural convection flows occurring in airflow-path are not simple due to complex flow-path configurations such as horizontal ducts, bent tube and annular flow-path. In addition, 16 T type channels acting as the shroud are attached vertically and 16 channel supporting the canister are attached horizontally on the inner surface of over-pack. The existence and nonexistence of T type channels have influences on the flow fields in airflow- path. The concrete storage cask has to satisfy the requirements to secure the thermal integrity under the normal, off-normal, and accident conditions. The present work is aiming at investigating the effects of T type channels on the flows in airflow-path under the normal conditions using the FLUENT 16.1 code. In order to focus on the flows in airflow-path, fuel regions in the canister are regarded as a single cylinder with heat sources and other components are fully modeled. This study investigated the flow fields in airflow-path of concrete storage cask, numerically. It was found that excepting for the fuel regions, maximum temperatures on other components were evaluated below allowable values. The location of maximum velocities depended on support channels, T type channels and flow area. The flows through air inlets developed along annular flow- path with forming the hot plumes. According to the existence and nonexistence of T type channel, the plume behavior showed the different flow patterns.

  2. A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments

    Directory of Open Access Journals (Sweden)

    Yun Chen

    2018-01-01

    Full Text Available Currently, many methods are available to improve the target network’s security. The vast majority of them cannot obtain an optimal attack path and interdict it dynamically and conveniently. Almost all defense strategies aim to repair known vulnerabilities or limit services in target network to improve security of network. These methods cannot response to the attacks in real-time because sometimes they need to wait for manufacturers releasing corresponding countermeasures to repair vulnerabilities. In this paper, we propose an improved Q-learning algorithm to plan an optimal attack path directly and automatically. Based on this path, we use software-defined network (SDN to adjust routing paths and create hidden forwarding paths dynamically to filter vicious attack requests. Compared to other machine learning algorithms, Q-learning only needs to input the target state to its agents, which can avoid early complex training process. We improve Q-learning algorithm in two aspects. First, a reward function based on the weights of hosts and attack success rates of vulnerabilities is proposed, which can adapt to different network topologies precisely. Second, we remove the actions and merge them into every state that reduces complexity from O(N3 to O(N2. In experiments, after deploying hidden forwarding paths, the security of target network is boosted significantly without having to repair network vulnerabilities immediately.

  3. Tackling Dependency: The EU and its Energy Security Challenges

    Energy Technology Data Exchange (ETDEWEB)

    Larsson, Robert L.

    2007-10-15

    Europe is facing a future of augmenting energy demands, domestic depletion, high prices and other energy-political challenges. Climate change, infrastructure resilience, producers' coercive energy policy and the EU's internal market failures have put stress on the EU's emerging energy policy and inspired the union to address its challenges with greater enthusiasm than before. Some of the EU's challenges call for strategic choices of a magnitude that EU is not used to handle. The aim of this report is therefore to identify, analyse and assess the political side of Europe's energy predicament and import dependency. Against the background of increasing dependence on energy imports, the report tries to answer questions: what are the key dimensions of Europe's energy security and what are their consequences?

  4. Straight Gods, White Devils: Exploring Paths to Non-Religion in the Lives of Black LGBTQ People

    Directory of Open Access Journals (Sweden)

    Simone Kolysh

    2017-01-01

    Full Text Available To examine paths to non-religion in the lives of black LGBTQ people, I analyze 10 interviews of black LGBTQ people who were raised Christian. Utilizing an intersectional lens, I conclude that lessons of the Christian home, reinforced in religious school and at church, drew a connection between Christianity, one’s racial and ethnic identity, and heterosexuality in such a way that being LGBTQ was marked un-Christian and foreign, and sometimes associated with whiteness. This further shaped how my participants navigated the urban public sphere, one of the only spheres where they could ‘be LGBTQ’ – some neighborhoods were constructed as Christian, connected to one’s childhood and hostile to LGBTQ people, while others were LGBTQ-friendly, albeit largely white and gentrified. The overall impact of Christianity across multiple spheres influenced which non-religious paths my participants took. One remained with a Christian denomination of her childhood and one remained with a Christian denomination of her mother but not her father. The other eight left Christianity behind, with one choosing a different religion and seven becoming non-religious, holding identities from Unitarian Universalist to atheist. Overall, black LGBTQ people struggle to find acceptance of their LGBTQ identities by people closest to them and acceptance of their racial, ethnic and non-religious identities in largely white and often non-religious LGBTQ spaces. In response, they use different strategies to find community and live coherent lives, whenever possible.

  5. Network perimeter security building defense in-depth

    CERN Document Server

    Riggs, Cliff

    2003-01-01

    PREFACEWho is this Book For?The Path to Network SecurityWho Should Read This Book?MANAGING NETWORK SECURITYThe Big Picture: Security Policies from A to ZAdministrative CountermeasuresPhysical CountermeasuresTechnological CountermeasuresCreating the Security Standards DocumentCreating the Configuration Guide DocumentPulling it All Together: Sample Security Policy CreationProteris Security Standards and ProceduresTHE NETWORK STACK AND SECURITYConnecting the NetworkProtocolsServers and HostsCRYPTOGRAPHY AND VPN TERMINOLOGYKeysCertificatesHashingDigital SignaturesCommon Encryption AlgorithmsSplit

  6. A new paradigm for the European energy policy?

    International Nuclear Information System (INIS)

    Veyrenc, Thomas

    2010-01-01

    As the European Union adopted in 2009 an organisational framework for the energy sector (the third energy package), the author analyses and discusses the progressive evolutions of the European energy policy during the last decades. He first addresses the process of liberalization of electricity and natural gas markets (or network industries) which has been launched by the European Commission from the middle of the 1990's and has been almost achieved. He comments the break created by the emergence of the climate challenge during the 2000's which had an impact on the objectives of the European energy policy, on the environmental policy and on competitiveness. The author then addresses the emergence of concerns related to the security of energy supplies (a coherence challenge for the European policy): definition of the concept of supply security, dilemma of security of supply, discussion of the content of the Lisbon Treaty as a remedy to coherence challenge). The author then discusses these evolutions in terms of new content and continuity, questions the emergence of a European federalism and the lack of great projects

  7. Mean free path dependent phonon contributions to interfacial thermal conductance

    Energy Technology Data Exchange (ETDEWEB)

    Tao, Yi; Liu, Chenhan; Chen, Weiyu; Cai, Shuang; Chen, Chen; Wei, Zhiyong; Bi, Kedong; Yang, Juekuan; Chen, Yunfei, E-mail: yunfeichen@seu.edu.cn

    2017-06-15

    Interfacial thermal conductance as an accumulation function of the phonon mean free path is rigorously derived from the thermal conductivity accumulation function. Based on our theoretical model, the interfacial thermal conductance accumulation function between Si/Ge is calculated. The results show that the range of mean free paths (MFPs) for phonons contributing to the interfacial thermal conductance is far narrower than that for phonons contributing to the thermal conductivity. The interfacial thermal conductance is mainly contributed by phonons with shorter MFPs, and the size effects can be observed only for an interface constructed by nanostructures with film thicknesses smaller than the MFPs of those phonons mainly contributing to the interfacial thermal conductance. This is why most experimental measurements cannot detect size effects on interfacial thermal conductance. A molecular dynamics simulation is employed to verify our proposed model. - Highlights: • A model to account for the interfacial thermal conductance as an accumulation function of phonon mean free path is proposed; • The model predicts that the range of mean free paths (MFPs) for phonons contributing to the interfacial thermal conductance is far narrower than that contributing to the thermal conductivity; • This model can be conveniently implemented to estimate the size effects on the interfacial thermal conductance for the interfaces formed by a nanostructure contacting a substrate.

  8. Integrated energy and climate policy. Securing the supply of natural energy. An investigation of the German and European law; Integrierte Energie- und Klimapolitik. Die Sicherstellung der Erdgasversorgung. Eine Untersuchung deutschen und europaeischen Rechts

    Energy Technology Data Exchange (ETDEWEB)

    Nordmann, Henning

    2012-07-01

    Due to the extreme importance of natural gas as an energy source within an integrated energy policy and climate policy at national and European level, and due to the specific risks associated with the supply of natural gas, the contribution under consideration reports on the security of supply of natural gas. The following aspects are examined: To what extent are regulations on security of the natural gas supply provided in the German and European law. Which actors have the responsibility for the security of supply? What are the weaknesses in the legal arrangement of security of supply? The contribution also reports on the increasing importance of the EU as an actor of guarantee. The contribution of the EU to the security of supply in the supply of natural gas also is analysed.

  9. Reanalysis and semantic persistence in native and non-native garden-path recovery.

    Science.gov (United States)

    Jacob, Gunnar; Felser, Claudia

    2016-01-01

    We report the results from an eye-movement monitoring study investigating how native and non-native speakers of English process temporarily ambiguous sentences such as While the gentleman was eating the burgers were still being reheated in the microwave, in which an initially plausible direct-object analysis is first ruled out by a syntactic disambiguation (were) and also later on by semantic information (being reheated). Both participant groups showed garden-path effects at the syntactic disambiguation, with native speakers showing significantly stronger effects of ambiguity than non-native speakers in later eye-movement measures but equally strong effects in first-pass reading times. Ambiguity effects at the semantic disambiguation and in participants' end-of-trial responses revealed that for both participant groups, the incorrect direct-object analysis was frequently maintained beyond the syntactic disambiguation. The non-native group showed weaker reanalysis effects at the syntactic disambiguation and was more likely to misinterpret the experimental sentences than the native group. Our results suggest that native language (L1) and non-native language (L2) parsing are similar with regard to sensitivity to syntactic and semantic error signals, but different with regard to processes of reanalysis.

  10. New secure communication-layer standard for medical image management (ISCL)

    Science.gov (United States)

    Kita, Kouichi; Nohara, Takashi; Hosoba, Minoru; Yachida, Masuyoshi; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1999-07-01

    This paper introduces a summary of the standard draft of ISCL 1.00 which will be published by MEDIS-DC officially. ISCL is abbreviation of Integrated Secure Communication Layer Protocols for Secure Medical Image Management Systems. ISCL is a security layer which manages security function between presentation layer and TCP/IP layer. ISCL mechanism depends on basic function of a smart IC card and symmetric secret key mechanism. A symmetry key for each session is made by internal authentication function of a smart IC card with a random number. ISCL has three functions which assure authentication, confidently and integrity. Entity authentication process is done through 3 path 4 way method using functions of internal authentication and external authentication of a smart iC card. Confidentially algorithm and MAC algorithm for integrity are able to be selected. ISCL protocols are communicating through Message Block which consists of Message Header and Message Data. ISCL protocols are evaluating by applying to regional collaboration system for image diagnosis, and On-line Secure Electronic Storage system for medical images. These projects are supported by Medical Information System Development Center. These project shows ISCL is useful to keep security.

  11. A path integral approach to the Hodgkin-Huxley model

    Science.gov (United States)

    Baravalle, Roman; Rosso, Osvaldo A.; Montani, Fernando

    2017-11-01

    To understand how single neurons process sensory information, it is necessary to develop suitable stochastic models to describe the response variability of the recorded spike trains. Spikes in a given neuron are produced by the synergistic action of sodium and potassium of the voltage-dependent channels that open or close the gates. Hodgkin and Huxley (HH) equations describe the ionic mechanisms underlying the initiation and propagation of action potentials, through a set of nonlinear ordinary differential equations that approximate the electrical characteristics of the excitable cell. Path integral provides an adequate approach to compute quantities such as transition probabilities, and any stochastic system can be expressed in terms of this methodology. We use the technique of path integrals to determine the analytical solution driven by a non-Gaussian colored noise when considering the HH equations as a stochastic system. The different neuronal dynamics are investigated by estimating the path integral solutions driven by a non-Gaussian colored noise q. More specifically we take into account the correlational structures of the complex neuronal signals not just by estimating the transition probability associated to the Gaussian approach of the stochastic HH equations, but instead considering much more subtle processes accounting for the non-Gaussian noise that could be induced by the surrounding neural network and by feedforward correlations. This allows us to investigate the underlying dynamics of the neural system when different scenarios of noise correlations are considered.

  12. 17 CFR 240.15Ba2-2 - Application for registration of non-bank municipal securities dealers whose business is...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Application for registration of non-bank municipal securities dealers whose business is exclusively intrastate. 240.15Ba2-2... registration of non-bank municipal securities dealers whose business is exclusively intrastate. (a) An...

  13. Long-range dependence in returns and volatility of Central European Stock Indices

    Czech Academy of Sciences Publication Activity Database

    Krištoufek, Ladislav

    2010-01-01

    Roč. 17, č. 27 (2010), s. 50-67 ISSN 1212-074X R&D Projects: GA ČR GD402/09/H045; GA ČR GA402/09/0965 Grant - others:GA UK(CZ) 5183/2010 Institutional research plan: CEZ:AV0Z10750506 Keywords : long-range dependence * bootstrapping * rescaled range analysis * rescaled variance analysis Subject RIV: AH - Economics http://library.utia.cas.cz/separaty/2010/E/kristoufek-long-range dependence in returns and volatility of central european stock indices bces.pdf

  14. 76 FR 66937 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-003 Non...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security/United States Secret Service--003 Non-Criminal Investigation... Security/United States Secret Service--003 Non-Criminal Investigation Information System.'' As a result of... Secret Service, 245 Murray Lane SW., Building T-5, Washington, DC 20223. For privacy issues please...

  15. Freedom of contract, mandatory and non-mandatory law in European contract law

    OpenAIRE

    Storme, M.

    2008-01-01

    Abstract: The purpose of this article is to reflect on the position and function of common European rules in respect of limitations to freedom of contract, and more specifically on the role of mandatory and non-mandatory rules in general. After dealing with this more generally in the first part, the article addresses in its second part the different techniques restricting freedom of contract that we find in the Principles of European Contract Law,(1) the acquis communautaire of the law of the...

  16. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  17. Microbiological and chemical contamination in different types of food of non-European origin

    Directory of Open Access Journals (Sweden)

    Francesco Casalinuovo

    2013-10-01

    Full Text Available In the markets of the European Union (EU the presence of food imported from non-European countries such as Asia, Africa and America is increasingly more widespread. Non-European countries, indeed, are much more competitive in terms of prices compared to European countries. For these reasons, EU has issued important laws. The purpose of this study was to assess the effectiveness of these regulations, estimating the levels of microbiological and chemical contamination of food samples of 91 different matrices imported from third countries. The microbiological methods used are those required by the UNI EN ISO, while for the determination of chemical parameters validated methods according to the Standard UNI EN ISO 16140:2003 were used. Our investigation revealed qualitative or quantitative microbial contamination in 23 out of 91 samples analysed (25.2%. We found high total microbial loads in alimentary conserves, multiple bacterial contamination (Salmonella thiphymurium, Escherichia coli and Vibrio alginolyticus and viral contamination (Norovirus in shellfish of the species Cassostrea gigas, and the presence of other pathogens in various products such as hamburgers (Yersinia enterocolitica, frozen fish (Listeria monocytogenes and honey (Bacillus cereus. With regard to chemical contamination, 24 samples of different food products were analysed. In 9 samples (37.5%, the levels of the following substances exceeded the permitted limits: histamine (fish conserves, mercury (crab meat, cadmium (crab meat and fish conserves, lead (cheese and honey and polyphosphates (chicken meat. Despite the limited number of samples analysed, these data prompt reflection on the need to implement a more detailed and rigorous activity of monitoring and control in order to guarantee adequate levels of safety with regard to the consumption of foodstuffs imported into the EU from non-European countries.

  18. Security engineering a guide to building dependable distributed systems

    CERN Document Server

    Anderson, Ross

    2008-01-01

    The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

  19. Preliminary test of cigarette nicotine discrimination threshold in non-dependent versus dependent smokers.

    Science.gov (United States)

    Perkins, Kenneth A; Kunkle, Nicole; Karelitz, Joshua L; Perkins, K A; Kunkle, N; Karelitz, J L

    2017-06-01

    Despite its potential for understanding tobacco dependence, behavioral discrimination of nicotine via smoking has not been formally examined as a function of nicotine dependence level. Spectrum research cigarettes were used to compare non-dependent with dependent smokers on the lowest content of nicotine they could discriminate (i.e., "threshold"). Dependent (n=21; 16M, 5F) or non-dependent (n=7; 4M, 3F) smokers were tested on ability to discriminate between cigarettes with nicotine contents of 17, 11, 5, 2, and 1mg/g, one per session, from an "ultra-low" cigarette with 0.4mg/g (all had 9-10mg "tar"). All abstained from smoking overnight prior to sessions, and number of sessions was determined by the lowest nicotine content they could reliably discriminate from the ultra-low on >80% of trials (i.e., ≥5 of 6). Subjective perceptions and cigarette choice behavior were also assessed and related to discrimination behavior. Discrimination thresholds (and most perceptions) did not differ between dependent and non-dependent smokers, with median thresholds of 11mg/g for both subgroups. Yet, "liking" and puff choice for threshold cigarettes were greater in dependent but not non-dependent smokers, while cigarettes with nicotine contents below threshold did not support "liking" or choice in both groups. In sum, this preliminary study suggests threshold for discriminating nicotine via smoking may not vary by dependence level, and further study is needed to confirm that cigarettes unable to be discriminated are also not reinforcing. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. Twenty-First Century Europe: Emergence of Baltic States into European Alliances

    National Research Council Canada - National Science Library

    Brasier, Patricia

    2003-01-01

    ...), the European Union (EU) and the Organization for Security and Cooperation in Europe (OSCE), upon completing their membership obligations will enhance stability and security within the European continent. The U.S...

  1. The effect of European integration on exchange rate dependence: the Polish accession to the EU

    NARCIS (Netherlands)

    Thiel, J.H.; van Giersbergen, N.P.A.

    2010-01-01

    This paper investigates the effect of the Polish accession to the European Union (EU) on the dependence between the euro-US dollar and Polish zloty-US dollar exchange rate. The dependence is estimated by means of copulas as suggested by Patton (2006). This approach allows to first specify and

  2. Energy supply security and geopolitics: A European perspective

    International Nuclear Information System (INIS)

    Correlje, Aad; Linde, Coby van der

    2006-01-01

    The security of energy supply to the EU is examined in the context of two storylines. Markets and Institutions exemplifies an economically and politically integrated, multilateral world with effective institutions and markets. Regions and Empires involves a world broken up in rival political and economic blocks, competing for resources and markets via political, economic and military power. It is shown that these storylines have a significant impact on the development of the energy market, on the way in which energy supply may be secured and on the effect and applicability of the several types of instruments available. The current EU is geared towards enlargement and a deepening of economic integration, based on the tenets of the post-1945 multilateral world system. The present world tends towards Regions and Empires and suggests that the EU may have to reorient its energy security policy. Energy policy must become an integral part of EU external trade and foreign relations and security policy. The EU should develop its own strategy, actively investing in dialogues with producer countries in the Persian Gulf and Africa and with Russia. Sustainable prosperity and governance in these regions will support EU energy security

  3. European ability to cope with a gas crisis. Comparison between 2009 and 2014

    International Nuclear Information System (INIS)

    Rodríguez-Gómez, Nuria; Zaccarelli, Nicola; Bolado-Lavín, Ricardo

    2016-01-01

    Regulation (EU) No 994/2010 concerning measures to safeguard security of gas supply was adopted following the 2009 commercial dispute between Ukraine and Russia which yield to a gas disruption. Since then, new infrastructure and cooperation measures have being implemented in order to reinforce the European gas system to better cope with gas shortages. Joint Research Centre has developed GEMFLOW, a country-based model of the European gas network, to simulate gas disruptions of different duration and to estimate the survival time and gas non-served per country. In this paper an analysis and comparison of the improvements carried out in the European gas system between 2009 and 2014 is presented and GEMFLOW model is used to evaluate the progress being made to strengthen the security of gas supply at European level. - Highlights: • We analyse the improvements in the EU gas infrastructure between 2009 and 2014. • A model of the EU gas grid is used to study the disruption of the major importers. • We find that Europe has greatly improved its ability to cope with a gas disruption. • We find that Eastern Europe, though enhanced, remains the most vulnerable area.

  4. Mediterranean Diet and Its Correlates among Adolescents in Non-Mediterranean European Countries: A Population-Based Study.

    Science.gov (United States)

    Novak, Dario; Štefan, Lovro; Prosoli, Rebeka; Emeljanovas, Arunas; Mieziene, Brigita; Milanović, Ivana; Radisavljević-Janić, Snežana

    2017-02-22

    Little is known about the factors which might influence the adherence to a Mediterranean diet in non-Mediterranean European countries. Thus, the main purpose of this study was to determine the associations between socioeconomic, psychological, and physical factors on a Mediterranean diet. In this cross-sectional study, participants were 14-18-year-old adolescents ( N = 3071) from two non-Mediterranean countries: Lithuania ( N = 1863) and Serbia ( N = 1208). The dependent variable was Mediterranean diet, and was assessed with the Mediterranean Diet Quality Index for children and adolescents questionnaire. Independent variables were gender, body-mass index, self-rated health, socioeconomic status, psychological distress, physical activity, and sedentary behavior. The associations between dependent and independent variables were analyzed by using logistic regression. Results showed that higher adherence to a Mediterranean diet was associated with higher self-rated health, socioeconomic status, and physical activity, yet low adherence to a Mediterranean diet was associated with being female, having higher body-mass index, psychological distress, and sedentary behavior. Our findings suggest that future studies need to explore associations between lifestyle habits-especially in target populations, such as primary and secondary school students.

  5. Functional dependency between the logistics security system and the MySAP ERP in metallurgy

    OpenAIRE

    Ranitović, P.; Tepić, G.; Matić, B.; Sremac, S.; Vukadinović, V.

    2013-01-01

    MySAP ERP - Enterprise Resource Planning (system - solution which provides a whole set of functions for the business analytics, finance, human resources management, logistics and corporate services) has developed from SAP R/3. It is one of the main products of the SAP AG German multinational company and as such, it is a very important element of the international industrial and technological security system. By defining the functional dependency between the security systems (logistics securit...

  6. Temperature dependence of CO2-enhanced primary production in the European Arctic Ocean

    KAUST Repository

    Holding, J. M.; Duarte, Carlos M.; Sanz-Martí n, M.; Mesa, E.; Arrieta, J M; Chierici, M.; Hendriks, I.  E.; Garcí a-Corral, L. S.; Regaudie-de-Gioux, A.; Delgado, A.; Reigstad, M.; Wassmann, P.; Agusti, Susana

    2015-01-01

    production (GPP) may be temperature dependent, using data from several oceanographic cruises and experiments from both spring and summer in the European sector of the Arctic Ocean. Results confirm that CO2 enhances GPP (by a factor of up to ten) over a range

  7. Validation of non-formal and informal learning from a European perspective – linking validation arrangements with national qualifications frameworks

    Directory of Open Access Journals (Sweden)

    Borut Mikulec

    2015-12-01

    Full Text Available The paper analyses European policy on the validation of non-formal and informal learning, which is presented as a “salvation narrative” that can improve the functioning of the labour market, provide a way out from unemployment and strengthen the competitiveness of the economy. Taking as our starting point recent findings in adult education theory on the validation of non-formal and informal learning, we aim to prove the thesis that what European validation policy promotes is above all economic purpose and that it establishes a “Credential/Credit-exchange” model of validation of non-formal and informal learning. We proceed to ecxamine the effect of European VNIL policy in selected European countries where validation arrangements are linked to the qualifications framework. We find that the “Credential/ Credit-exchange” validation model was first established in a few individual European countries and then transferred, as a “successful” model, to the level of common European VNIL policy.

  8. European Court of Justice Secures Fundamental Rights from UN Security Council Resolutions

    Directory of Open Access Journals (Sweden)

    Sebastian Recker

    2009-02-01

    ="MsoFootnoteReference">[4]. The Court of First Instance held that in principle it had no jurisdiction to review the lawfulness of regulations based on Security Council resolutions. The European Court of Justice stated that acts of the Sanctions Committee under Chapter VII of the UN Charter must be reviewable if restrictions infringe general principles of Community law[5]. This decision creates a new balance of power in international law. Obligations from international agreements cannot prejudice fundamental rights as general principles of the EC Treaty.

    Until this judgment, it seemed that the UN Security Council had the unconfined power to determine binding instructions to States under Chapter VII of the UN Charter without the possibility of judicial review by Member States. The conflict between the status quo demanded by the United Nations and the requirement of the European Communities in securing their general principles shows the purpose and at the same time abashment of international law. Who determines the rules in international law and who is to decide when the rules have been violated? This question is contentious, because the standing of rules in international law is dependent on the consent of the parties. In this regard, European Union Member States, institutions, citizens and courts were not agreed on how to balance the competence in these cases[6

  9. The common European flexicurity principles

    DEFF Research Database (Denmark)

    Mailand, Mikkel

    2010-01-01

    This article analyses the decision-making process underlying the adoption of common EU flexicurity principles. Supporters of the initiative succeeded in convincing the sceptics one by one; the change of government in France and the last-minute support of the European social partner organizations...... were instrumental in this regard. However, the critics succeeded in weakening the initially strong focus on the transition from job security to employment security and the divisions between insiders and outsiders in the labour market. In contrast to some decision-making on the European Employment...

  10. LNG REGASIFICATION TERMINALS ACCESS CAPACITY ANALYSIS FOR SECURITY OF EUROPEAN NATURAL GAS SUPPLY

    Directory of Open Access Journals (Sweden)

    Matija Veselić

    2011-12-01

    Full Text Available Increasing natural gas consumption, declining North Sea gas reserves, increased production costs and the deregulation of European gas and electricity markets have all combined to create new opportunities for LNG in Europe. In these circumstances, LNG represents an opportunity for many European countries to diversify their natural gas supply, while decreasing their dependence on Russian natural gas import at the same time. The largest exporters of LNG to Europe are Qatar, Algeria, Nigeria, Trinidad & Tobago, Egypt and Oman. Spain, Great Britain and France are the largest European importers of LNG. Spain has six LNG regasification terminals, followed by four in Great Britain, three in France, two in Italy and Turkey and finally Greece and Portugal with one terminal each. New LNG regasification terminals are currently under construction in Italy, Spain, Sweden and Netherlands. In addition, more than 30 new LNG terminal projects have been proposed around Europe. Italy plans to construct as many as 10 new regasification terminals, due to the strong orientation of its national energy policy towards LNG. Many European countries are strongly considering participating in the LNG chain for the first time, namely Albania, Cyprus, Ireland, Lithuania, Germany, Poland, Romania, Ukraine and Croatia. This paper focuses on a specific aspect of the LNG supply chain: the import facility (the paper is published in Croatian.

  11. Stress path dependent hydromechanical behaviour of heterogeneous carbonate rock

    Directory of Open Access Journals (Sweden)

    Dimanov A.

    2010-06-01

    Full Text Available The influence of stress paths, representative of reservoir conditions, on the hydromechanical behavior of a moderately heterogeneous carbonate has been investigated. Multiscale structural heterogeneities, common for instance in carbonate rocks, can strongly alter the mechanical response and significantly influence the evolution of flow properties with stress. Using a triaxial cell, the permeability evolutions during compression and the effects of brittle (fracture and plastic (pore collapse deformations at yield, were measured. A strong scattering was observed on the mechanical response both in term of compressibility and failure threshold. Using the porosity scaling predicted by an adapted effective medium theory (based on crack growth under Hertzian contact, we have rescaled the critical pressures by the normalized porosity deviation. This procedure reduces efficiently the scattering, revealing in the framework of proportional stress path loading, a linear relation between the critical pressures and the stress path parameter through all the deformation regimes. It leads to a new formulation for the critical state envelope in the 'mean stress, deviatoric stress' diagram. The attractive feature of this new yield envelope formulation relies on the fact that only the two most common different mechanical tests 'Uniaxial Compression' and 'Hydrostatic Compression', are needed to define entirely the yield envelope. Volumic strains and normalized permeabilities are finally mapped in the stresses diagram and correlated.

  12. Vapor nucleation paths in lyophobic nanopores.

    Science.gov (United States)

    Tinti, Antonio; Giacomello, Alberto; Casciola, Carlo Massimo

    2018-04-19

    In recent years, technologies revolving around the use of lyophobic nanopores gained considerable attention in both fundamental and applied research. Owing to the enormous internal surface area, heterogeneous lyophobic systems (HLS), constituted by a nanoporous lyophobic material and a non-wetting liquid, are promising candidates for the efficient storage or dissipation of mechanical energy. These diverse applications both rely on the forced intrusion and extrusion of the non-wetting liquid inside the pores; the behavior of HLS for storage or dissipation depends on the hysteresis between these two processes, which, in turn, are determined by the microscopic details of the system. It is easy to understand that molecular simulations provide an unmatched tool for understanding phenomena at these scales. In this contribution we use advanced atomistic simulation techniques in order to study the nucleation of vapor bubbles inside lyophobic mesopores. The use of the string method in collective variables allows us to overcome the computational challenges associated with the activated nature of the phenomenon, rendering a detailed picture of nucleation in confinement. In particular, this rare event method efficiently searches for the most probable nucleation path(s) in otherwise intractable, high-dimensional free-energy landscapes. Results reveal the existence of several independent nucleation paths associated with different free-energy barriers. In particular, there is a family of asymmetric transition paths, in which a bubble forms at one of the walls; the other family involves the formation of axisymmetric bubbles with an annulus shape. The computed free-energy profiles reveal that the asymmetric path is significantly more probable than the symmetric one, while the exact position where the asymmetric bubble forms is less relevant for the free energetics of the process. A comparison of the atomistic results with continuum models is also presented, showing how, for simple

  13. Cloud Security Requirements - A checklist with security and privacy requirements for public cloud services

    OpenAIRE

    Bernsmed, Karin; Meland, Per Håkon; Jaatun, Martin Gilje

    2015-01-01

    - This document contains a checklist that can be used to develop or evaluate security and privacy requirements for Cloud computing services. The content has been gathered from established industry standards and best practices, supplemented with requirements from European data protection legislation, and taking into account security issues identified in recent research on Cloud security. The document is intended to be used by potential cloud customers that need to assess the security of a c...

  14. The security of energy supplies in Europe

    International Nuclear Information System (INIS)

    Vuillemin, Francois

    2002-01-01

    As an attempt occurred against a French oil tanker in the Persian Gulf (in 2002), and showed that security of oil supplies is not only related to oil shock or to political environment such as the Cold War, this article discusses issues of security for European energy supplies. It first addresses the situation and the evolution of energy needs and resources in the World and in Europe: predictions of evolution of consumption and production, major role of fossil fuels in the European consumption. It discusses the outage risks: the supply security can be analysed with respect to consumption per sector, per usage or per energy product, and Europe must face three major risks (no more hydrocarbon resources at a reasonable cost, economic risk due to market volatility, geopolitical risk). The next part discusses the perspective of a European strategy. It identifies several elements of choice for Europe in terms of energy demand management, of opening up to competition of electricity and gas markets. It discusses European ambitions in terms of supply security: need of a community framework, actual propositions of a directive for oil and gas

  15. The effect of solar and lunar currents on simultaneous phase path, group path and amplitude measurements

    International Nuclear Information System (INIS)

    Baulch, R.N.E.; Butcher, E.C.

    1984-01-01

    The solar and lunar variations in the phase path, group path and amplitude of a fixed frequency transmission were obtained at the September equinox over a slightly oblique path. The phase of the lunar semi-diurnal tide in the phase path and amplitude were similar, the maxima occurring near 0200 lunar time, whereas the group path had a maximum near 0800 lunar time. These results were compared with other results obtained near the same location. The results suggest a complex situation in the E-region, where the height of the lunar current depends on season, and also suggest that the location and distribution of the solar and lunar currents may be different. (author)

  16. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  17. Preparing tomorrow's network today: RTE at the crossroads of the European electricity system. Cross-border electricity interconnections Key issues and figures - 2014 Edition

    International Nuclear Information System (INIS)

    2014-10-01

    The interconnected electricity transmission network is a key element for ensuring security of supply, the creation of a single market and the integration of renewable energies. RTE and its European partners provide strengthened coordination by the use of interconnections to ensure solidarity between European countries. Interconnections also allow an electricity supplier to sell its energy to a customer located in another country in Europe. They contribute on a European scale to optimising the use of production means and in particular the integration of variable renewable energies. RTE, within the EnTSo-E (European Network of Transmission System Operators for Electricity), contributes to the publication of a common vision of the future of networks by 2030. The needs for new interconnection capacity are identified in the ten-year European network development plan (TYnDP) on the basis of a cost-benefit analysis. France is interconnected to all its neighbours via many cross-border links. However interconnection capacity with the various countries and its use differ widely. The usage profile of the interconnections is specific to each border and varies according to: - the characteristics of the production mix of each country, and in particular the level of production of renewable energies. - the level of consumption, which depends on the season, the type of day (working or non-working) the time of day, etc. - import and export capacity, which may be different depending on the internal constraints of the networks of each country

  18. Arms Control and European Security

    Science.gov (United States)

    2012-08-01

    appraisals; • The nature of land warfare; • Matters affecting the Army’s future; • The concepts, philosophy, and theory of strategy; and • Other issues of...sophisticated Marxist theories of conflict, the balance or “correlation” of forces: political and psy- chological force fields generated in peacetime or...wider political 18 and economic considerations, within hygienic, legally enforceable, Kantian “Euro Atlantic Security Struc- tures,” the Holy Grail

  19. Network Security Validation Using Game Theory

    Science.gov (United States)

    Papadopoulou, Vicky; Gregoriades, Andreas

    Non-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the distributed systems that depended on these networks. Security requirements specification need a proactive approach. Networks' infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. This paper presents a game-theoretic approach to security requirements validation. An introduction to game theory is presented along with an example that demonstrates the application of the approach.

  20. Nuclear non-proliferation: Global security in a rapidly changing world. Carnegie International Non-Proliferation Conference, 21 June 2004, Washington, DC, USA

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    This statement outlines what the IAEA and the international community has learned, what are the problems faced and the nature of the required reforms in the field of non-proliferation, security, safeguards inspection. The proposals are mostly fucued on international/collective cooperation in arms control, improvements of security and effectiveness of safeguards

  1. Nuclear non-proliferation: Global security in a rapidly changing world. Carnegie International Non-Proliferation Conference, 21 June 2004, Washington, DC, USA

    Energy Technology Data Exchange (ETDEWEB)

    ElBaradei, M

    2004-06-21

    This statement outlines what the IAEA and the international community has learned, what are the problems faced and the nature of the required reforms in the field of non-proliferation, security, safeguards inspection. The proposals are mostly fucued on international/collective cooperation in arms control, improvements of security and effectiveness of safeguards.

  2. Non-uniqueness of quantum transition state theory and general dividing surfaces in the path integral space.

    Science.gov (United States)

    Jang, Seogjoo; Voth, Gregory A

    2017-05-07

    Despite the fact that quantum mechanical principles do not allow the establishment of an exact quantum analogue of the classical transition state theory (TST), the development of a quantum TST (QTST) with a proper dynamical justification, while recovering the TST in the classical limit, has been a long standing theoretical challenge in chemical physics. One of the most recent efforts of this kind was put forth by Hele and Althorpe (HA) [J. Chem. Phys. 138, 084108 (2013)], which can be specified for any cyclically invariant dividing surface defined in the space of the imaginary time path integral. The present work revisits the issue of the non-uniqueness of QTST and provides a detailed theoretical analysis of HA-QTST for a general class of such path integral dividing surfaces. While we confirm that HA-QTST reproduces the result based on the ring polymer molecular dynamics (RPMD) rate theory for dividing surfaces containing only a quadratic form of low frequency Fourier modes, we find that it produces different results for those containing higher frequency imaginary time paths which accommodate greater quantum fluctuations. This result confirms the assessment made in our previous work [Jang and Voth, J. Chem. Phys. 144, 084110 (2016)] that HA-QTST does not provide a derivation of RPMD-TST in general and points to a new ambiguity of HA-QTST with respect to its justification for general cyclically invariant dividing surfaces defined in the space of imaginary time path integrals. Our analysis also offers new insights into similar path integral based QTST approaches.

  3. A path-level exact parallelization strategy for sequential simulation

    Science.gov (United States)

    Peredo, Oscar F.; Baeza, Daniel; Ortiz, Julián M.; Herrero, José R.

    2018-01-01

    Sequential Simulation is a well known method in geostatistical modelling. Following the Bayesian approach for simulation of conditionally dependent random events, Sequential Indicator Simulation (SIS) method draws simulated values for K categories (categorical case) or classes defined by K different thresholds (continuous case). Similarly, Sequential Gaussian Simulation (SGS) method draws simulated values from a multivariate Gaussian field. In this work, a path-level approach to parallelize SIS and SGS methods is presented. A first stage of re-arrangement of the simulation path is performed, followed by a second stage of parallel simulation for non-conflicting nodes. A key advantage of the proposed parallelization method is to generate identical realizations as with the original non-parallelized methods. Case studies are presented using two sequential simulation codes from GSLIB: SISIM and SGSIM. Execution time and speedup results are shown for large-scale domains, with many categories and maximum kriging neighbours in each case, achieving high speedup results in the best scenarios using 16 threads of execution in a single machine.

  4. Modeling and Solving the Train Pathing Problem

    Directory of Open Access Journals (Sweden)

    Chuen-Yih Chen

    2009-04-01

    Full Text Available In a railroad system, train pathing is concerned with the assignment of trains to links and tracks, and train timetabling allocates time slots to trains. In this paper, we present an optimization heuristic to solve the train pathing and timetabling problem. This heuristic allows the dwell time of trains in a station or link to be dependent on the assigned tracks. It also allows the minimum clearance time between the trains to depend on their relative status. The heuristic generates a number of alternative paths for each train service in the initialization phase. Then it uses a neighborhood search approach to find good feasible combinations of these paths. A linear program is developed to evaluate the quality of each combination that is encountered. Numerical examples are provided.

  5. A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog

    Directory of Open Access Journals (Sweden)

    Ashish Rauniyar

    2018-01-01

    Full Text Available With the advent of Internet of things (IoT and cloud computing technologies, we are in the era of automation, device-to-device (D2D and machine-to-machine (M2M communications. Automated vehicles have recently gained a huge attention worldwide, and it has created a new wave of revolution in automobile industries. However, in order to fully establish automated vehicles and their connectivity to the surroundings, security, privacy, and dependability always remain a crucial issue. One cannot deny the fact that such automatic vehicles are highly vulnerable to different kinds of security attacks. Also, today’s such systems are built from generic components. Prior analysis of different attack trends and vulnerabilities enables us to deploy security solutions effectively. Moreover, scientific research has shown that a “group” can perform better than individuals in making decisions and predictions. Therefore, this paper deals with the measurable security, privacy, and dependability of automated vehicles through the crowd-based intelligence approach that is inspired from swarm intelligence. We have studied three use case scenarios of automated vehicles and systems with vehicular fog and have analyzed the security, privacy, and dependability metrics of such systems. Our systematic approaches to measuring efficient system configuration, security, privacy, and dependability of automated vehicles are essential for getting the overall picture of the system such as design patterns, best practices for configuration of system, metrics, and measurements.

  6. Toward Shared Working Space of Human and Robotic Agents Through Dipole Flow Field for Dependable Path Planning.

    Science.gov (United States)

    Trinh, Lan Anh; Ekström, Mikael; Cürüklü, Baran

    2018-01-01

    Recent industrial developments in autonomous systems, or agents, which assume that humans and the agents share the same space or even work in close proximity, open for new challenges in robotics, especially in motion planning and control. In these settings, the control system should be able to provide these agents a reliable path following control when they are working in a group or in collaboration with one or several humans in complex and dynamic environments. In such scenarios, these agents are not only moving to reach their goals, i.e., locations, they are also aware of the movements of other entities to find a collision-free path. Thus, this paper proposes a dependable, i.e., safe, reliable and effective, path planning algorithm for a group of agents that share their working space with humans. Firstly, the method employs the Theta * algorithm to initialize the paths from a starting point to a goal for a set of agents. As Theta * algorithm is computationally heavy, it only reruns when there is a significant change of the environment. To deal with the movements of the agents, a static flow field along the configured path is defined. This field is used by the agents to navigate and reach their goals even if the planned trajectories are changed. Secondly, a dipole field is calculated to avoid the collision of agents with other agents and human subjects. In this approach, each agent is assumed to be a source of a magnetic dipole field in which the magnetic moment is aligned with the moving direction of the agent. The magnetic dipole-dipole interactions between these agents generate repulsive forces to help them to avoid collision. The effectiveness of the proposed approach has been evaluated with extensive simulations. The results show that the static flow field is able to drive agents to the goals with a small number of requirements to update the path of agents. Meanwhile, the dipole flow field plays an important role to prevent collisions. The combination of

  7. Toward Shared Working Space of Human and Robotic Agents Through Dipole Flow Field for Dependable Path Planning

    Directory of Open Access Journals (Sweden)

    Lan Anh Trinh

    2018-06-01

    Full Text Available Recent industrial developments in autonomous systems, or agents, which assume that humans and the agents share the same space or even work in close proximity, open for new challenges in robotics, especially in motion planning and control. In these settings, the control system should be able to provide these agents a reliable path following control when they are working in a group or in collaboration with one or several humans in complex and dynamic environments. In such scenarios, these agents are not only moving to reach their goals, i.e., locations, they are also aware of the movements of other entities to find a collision-free path. Thus, this paper proposes a dependable, i.e., safe, reliable and effective, path planning algorithm for a group of agents that share their working space with humans. Firstly, the method employs the Theta* algorithm to initialize the paths from a starting point to a goal for a set of agents. As Theta* algorithm is computationally heavy, it only reruns when there is a significant change of the environment. To deal with the movements of the agents, a static flow field along the configured path is defined. This field is used by the agents to navigate and reach their goals even if the planned trajectories are changed. Secondly, a dipole field is calculated to avoid the collision of agents with other agents and human subjects. In this approach, each agent is assumed to be a source of a magnetic dipole field in which the magnetic moment is aligned with the moving direction of the agent. The magnetic dipole-dipole interactions between these agents generate repulsive forces to help them to avoid collision. The effectiveness of the proposed approach has been evaluated with extensive simulations. The results show that the static flow field is able to drive agents to the goals with a small number of requirements to update the path of agents. Meanwhile, the dipole flow field plays an important role to prevent collisions. The

  8. Asylum migration and the construction of the European Common Foreign and Security Policy: evidence from the Greek case

    Directory of Open Access Journals (Sweden)

    Silvia Lucía Forero Castañeda

    2015-12-01

    Full Text Available This article examines how the recent evolution of asylum migration has affected the construction of the European Common Foreign and Security Policy (EU-CFSP, taking the Greek case during the 2001-2012 period as a starting point. With this in mind, the normative progress of the EU-CFSP facing the reception of asylum seekers in Greece is analyzed, under the scope of what Barry Buzan and Ole Waever would call Securitization Process. Both legal and political frameworks on asylum migration in Greece and in the European Union are approached, in the context of the evolution of the EU-CFSP in three main areas: Neighborhood Policy, Development and Cooperation Policy, and Human Rights Protection. The conclusión points toward the partial influence of asylum migration in the configuration of the UE-CFSP during the studied period.

  9. Remarks on nuclear non-proliferation and nuclear disarmament, United Nations Security Council, 24 September 2009, New York, USA

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2009-01-01

    IAEA Director General Dr. Mohamed ElBaradei, Director General of the International Atomic Energy Agency (IAEA) limited his speech to a few key issues. First he stated that the global nuclear non-proliferation regime is fragile and has many shortcomings because the IAEA's legal authority is severely limited in some countries and the IAEA verification mandate is centred on nuclear material and not on weaponization activities. Secondly there is a growing number of states that have mastered uranium enrichment or plutonium reprocessing. Any one of these states could develop nuclear weapons in a short span of time, if, for example, it decided to withdraw from the NPT. There is a need to move from national to multinational control of the nuclear fuel cycle. Thirdly the highest level of protection for nuclear and radioactive material has to be provided. A fourth issue is the need to strengthen the IAEA. A fifth issue is that the IAEA cannot do its work in isolation but depends on a supportive political process, with the Security Council at its core. A sixth issue is that the Security Council must put more emphasis on addressing the insecurities that lie behind many cases of proliferation, such as endemic conflicts, security imbalances and lack of trust. Finally, Dr. Mohamed ElBaradei is gratified to see nuclear disarmament back at the top of the international agenda, as well as recognition of the intrinsic link between nuclear disarmament and non-proliferation

  10. Ductile Damage Evolution and Strain Path Dependency

    International Nuclear Information System (INIS)

    Tasan, C. C.; Hoefnagels, J. M. P.; Peerlings, R. H. J.; Geers, M. G. D.; ten Horn, C. H. L. J.; Vegter, H.

    2007-01-01

    Forming limit diagrams are commonly used in sheet metal industry to define the safe forming regions. These diagrams are built to define the necking strains of sheet metals. However, with the rise in the popularity of advance high strength steels, ductile fracture through damage evolution has also emerged as an important parameter in the determination of limit strains. In this work, damage evolution in two different steels used in the automotive industry is examined to observe the relationship between damage evolution and the strain path that is followed during the forming operation

  11. Developing and Validating Path-Dependent Uncertainty Estimates for use with the Regional Seismic Travel Time (RSTT) Model

    Science.gov (United States)

    Begnaud, M. L.; Anderson, D. N.; Phillips, W. S.; Myers, S. C.; Ballard, S.

    2016-12-01

    The Regional Seismic Travel Time (RSTT) tomography model has been developed to improve travel time predictions for regional phases (Pn, Sn, Pg, Lg) in order to increase seismic location accuracy, especially for explosion monitoring. The RSTT model is specifically designed to exploit regional phases for location, especially when combined with teleseismic arrivals. The latest RSTT model (version 201404um) has been released (http://www.sandia.gov/rstt). Travel time uncertainty estimates for RSTT are determined using one-dimensional (1D), distance-dependent error models, that have the benefit of being very fast to use in standard location algorithms, but do not account for path-dependent variations in error, and structural inadequacy of the RSTTT model (e.g., model error). Although global in extent, the RSTT tomography model is only defined in areas where data exist. A simple 1D error model does not accurately model areas where RSTT has not been calibrated. We are developing and validating a new error model for RSTT phase arrivals by mathematically deriving this multivariate model directly from a unified model of RSTT embedded into a statistical random effects model that captures distance, path and model error effects. An initial method developed is a two-dimensional path-distributed method using residuals. The goals for any RSTT uncertainty method are for it to be both readily useful for the standard RSTT user as well as improve travel time uncertainty estimates for location. We have successfully tested using the new error model for Pn phases and will demonstrate the method and validation of the error model for Sn, Pg, and Lg phases.

  12. Social Progress in Romania and other Central and Eastern European Non- Eurozone States

    Directory of Open Access Journals (Sweden)

    VIRGINIA CÂMPEANU

    2016-06-01

    Full Text Available Our research paper refers to the social progress achieved in the last 10 years by Romania, Bulgaria, Czech Republic, Croatia, Poland and Hungary as non- Eurozone members (CEE-6, compared to the minimum and maximum levels in the EU-28, depending on their economic development levels. This analysis isa part of the larger-scale study regarding the readinessassessment of Romania and other five Central and Eastern European countries (CEE-6 for accession to the Eurozone in terms of the real convergence. We extended the analysis of the real economic convergence to the sphere of social convergence. The purpose of the extended analysis is to compare the living standards in Romania, CEE-6 and other European Union member states (EU-28 and to draw conclusions on the social convergence as a complement to real economic convergence. Using a new analytical tool, the global composite index “Social Progress Index” at different levels of disaggregation, this article reveals the social gaps between CEE-6 and the EU and identifies strengths, and weaknesses for these countries to achieve social progress on the road to real economic and social convergence with the EU.The aim is to provide to the national decision-makers some milestones to remove weaknesses and to turn threats into opportunities in the future social and economic policies.

  13. Delay discounting of oral morphine and sweetened juice rewards in dependent and non-dependent rats.

    Science.gov (United States)

    Harvey-Lewis, Colin; Perdrizet, Johnna; Franklin, Keith B J

    2014-07-01

    Opioid-dependent humans are reported to show accelerated delay discounting of opioid rewards when compared to monetary rewards. It has been suggested that this may reflect a difference in discounting of consumable and non-consumable goods not specific to dependent individuals. Here, we evaluate the discounting of similar morphine and non-morphine oral rewards in dependent and non-dependent rats We first tested the analgesic and rewarding effects of our morphine solution. In a second experiment, we assigned rats randomly to either dependent or non-dependent groups that, 30 min after daily testing, received 30 mg/kg subcutaneous dose of morphine, or saline, respectively. Delay discounting of drug-free reward was examined prior to initiation of the dosing regimen. We tested discounting of the morphine reward in half the rats and retested the discounting of the drug-free reward in the other half. All tests were run 22.5 h after the daily maintenance dose. Rats preferred the morphine cocktail to the drug-free solution and consumed enough to induce significant analgesia. The control quinine solution did not produce these effects. Dependent rats discounted morphine rewards more rapidly than before dependence and when compared to discounting drug-free rewards. In non-dependent rats both reward types were discounted similarly. These results show that morphine dependence increases impulsiveness specifically towards a drug reward while morphine experience without dependence does not.

  14. Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication

    Directory of Open Access Journals (Sweden)

    Reihaneh Safavi-Naini

    2018-01-01

    Full Text Available Moving target defense (MTD strategies have been widely studied for securing computer systems. We consider using MTD strategies to provide long-term cryptographic security for message transmission against an eavesdropping adversary who has access to a quantum computer. In such a setting, today’s widely used cryptographic systems including Diffie-Hellman key agreement protocol and RSA cryptosystem will be insecure and alternative solutions are needed. We will use a physical assumption, existence of multiple communication paths between the sender and the receiver, as the basis of security, and propose a cryptographic system that uses this assumption and an MTD strategy to guarantee efficient long-term information theoretic security even when only a single path is not eavesdropped. Following the approach of Maleki et al., we model the system using a Markov chain, derive its transition probabilities, propose two security measures, and prove results that show how to calculate these measures using transition probabilities. We define two types of attackers that we call risk-taking and risk-averse and compute our proposed measures for the two types of adversaries for a concrete MTD strategy. We will use numerical analysis to study tradeoffs between system parameters, discuss our results, and propose directions for future research.

  15. The European idea in Central Europe and Scandinavia as a part of the security and peaceful co-existence policy in the framework of the postwar planning

    Directory of Open Access Journals (Sweden)

    Chernyshev Yevgeny

    2011-12-01

    Full Text Available This article is dedicated to the development of European unity in Central Europe and Scandinavia as a mechanism of collective security and intergovernmental cooperation development. The cultural and historical features of Central Europe and Scandinavia emphasize the need for a comparative study into the European idea. This article considers the tendencies and factors which affected the development of the European idea in the framework of the post-war planning. This research sets out to compare and identify similar or analogous features and elements of the theoretical bases of movements for European unity in Central and Northern Europe. The author comes to the conclusion about the correlation between the “Europe of regions” model and the European unity concept. The ideas of Scandinavian and Central European integration rested on national, cultural and historical connections of the neighbouring countries were expected to constitute such formations, which contradicted and were opposed to by the theoretical framework of Western European integration. On the other hand, regional integration implied that a federation or union of the neighbouring states could be considered a step towards a more universal organisation, which would not mean the isolation of Scandinavia and Central Europe from the rest of the world. The theoretical and practical significance of this work lies in the comparative approach to the analysis of the phenomena which have been considered individually in the framework of historiography. It is the major contribution of the article to the research on history of ideas and European diplomacy. Moreover, the subject of research is immediately connected to the problem of security in the Baltic region and the Soviet factor, as well as political stereotypes produced in this field. The author employed historical comparative and inductive types of the historical typological method.

  16. Development of archetypes for non-ranking classification and comparison of European National Health Technology Assessment systems.

    Science.gov (United States)

    Allen, Nicola; Pichler, Franz; Wang, Tina; Patel, Sundip; Salek, Sam

    2013-12-01

    European countries are increasingly utilising health technology assessment (HTA) to inform reimbursement decision-making. However, the current European HTA environment is very diverse, and projects are already underway to initiate a more efficient and aligned HTA practice within Europe. This study aims to identify a non-ranking method for classifying the diversity of European HTA agencies process and the organisational architecture of the national regulatory review to reimbursement systems. Using a previously developed mapping methodology, this research created process maps to describe national processes for regulatory review to reimbursement for 33 European jurisdictions. These process maps enabled the creation of 2 HTA taxonomic sets. The confluence of the two taxonomic sets was subsequently cross-referenced to identify 10 HTA archetype groups. HTA is a young, rapidly evolving field and it can be argued that optimal practices for performing HTA are yet to emerge. Therefore, a non-ranking classification approach could objectively characterise and compare the diversity observed in the current European HTA environment. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  17. Changing principles in European social security

    NARCIS (Netherlands)

    van Oorschot, W.J.H.; Clasen, J.J.

    2002-01-01

    The provision of social security benefits rests on normative principles of social justice. Most strongly manifest in earnings-related social insurance, the principle of reciprocity has been increasingly questioned on grounds of equity, adequacy and fiscal viability, in the wake of socio-economic

  18. Authentication and Data Security in ITS Telecommunications Solutions

    Directory of Open Access Journals (Sweden)

    Tomas Zelinka

    2014-04-01

    Full Text Available Paper presents telecommunications security issues with dynamically changing networking. Paper also presents performance indicators of authentication as an integral part of the approach to non-public information. Expected level of security depend on relevant ITS services requirements, different solutions require different levels of quality. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure or other vehicles significantly and progressively grow. This trend leads to increase of the fatal problems if security of the wide area networks is not relevantly treated. Relevant communications security treatment becomes crucial part of the ITS telecommunications solution because probability of hazards appearances grow if vehicles networks are integrated in the dynamically organized wide area networks. Besides of available "off shelf" security tools solution based on non-public universal identifier with dynamical extension and data selection according to actor role or category is presented including performances indicators for the authentication process.

  19. The European Union’s Aviation Security Mission in South Sudan

    DEFF Research Database (Denmark)

    Højstrup Christensen, Gitte; Kammel, Arnold; Rodt, Annemarie Peen

    of the security situation in the country, all EU personnel were evacuated in January 2014, and the mission was (informally) terminated after fulfilling its mandated deployment period. Even though the mission had succeeded in training 350 personnel prior to the evacuation, its contribution to the overall security......When South Sudan gained independence in 2011, the new country needed assistance from external actors during the transition to prevent the security situation from deteriorating. In 2012 the EU launched its Aviation Security Mission (EUAVSEC) in South Sudan as part of its Common Security and Defence...... Policy. This came in response to a South Sudanese request for EU support and assistance in strengthening the security in Juba International Airport, as it had proven difficult for South Sudan to establish a fully operational transport hub. The EU estimated that an improvement of the airport security...

  20. Reforming the South African Social Security Adjudication System: Innovative Experiences from South African Non-Social Security Jurisdictions

    Directory of Open Access Journals (Sweden)

    Mathias Ashu Tako Nyenti

    2016-08-01

    Full Text Available There is currently no uniform social security dispute resolution system in South Africa due to the piecemeal fashion in which schemes were established or protection against individual risks regulated. The result is that each statute provides for its own dispute resolution institution(s and processes. There are also various gaps and challenges in the current social security dispute resolution systems, some of these relating to the uncoordinated and fragmented nature of the system; inaccessibility of some social security institutions; inappropriateness of some current appeal institutions; the lack of a systematic approach in establishing appeal institutions; a limited scope of jurisdiction and powers of adjudication institutions; inconsistencies in review and/or appeal provisions in various laws; an unavailability of alternative dispute resolution procedures; and an absence of institutional independence of adjudication institutions or forums. The system is therefore in need of reform. In developing an appropriate system, much can be learned from innovative experiences in comparative South African non-social security jurisdictions on the establishment of effective and efficient dispute resolution frameworks. Dispute resolution systems in the labour relations, business competition regulation and consumer protection jurisdictions have been established to realise the constitutional rights of their users (especially the rights of access to justice, to a fair trial and to just administrative action. They thus provide a benchmark for the development of the South African social security dispute resolution system.

  1. Sweden and the NEGP: A Pilot Study of the North European Gas Pipeline and Sweden's Dependence on Russian Energy

    Energy Technology Data Exchange (ETDEWEB)

    Larsson, Robert L.

    2006-06-15

    Developments between 2004 and 2006 indicate that a North European Gas Pipeline (NEGP) through the Baltic Sea, from Russia to Germany, may be realised in the coming decade. This would provide Europe with yet another opportunity to diversify its import channels of gas. It is however reasonable to assume that the NEGP also could change the strategic pattern and be a source of friction. The NEGP may rock the regional stability and reduce the potential of the new EU members to become security providers in Europe's northern dimension. It also gives increased leverage and influence to Russia, a state that has moved in an authoritarian direction under President Putin. The aim of this pilot study is to elucidate on the NEGP pipeline and Sweden's increasing dependence on Russian energy. A subsidiary aim is to outline a set of concerns that have bearing on the situation for the EU and Baltic Sea Region and that need to be further addressed. In conclusion, the NEGP will enhance Russia's direct leverage on Poland, Ukraine, and Belarus, as it will allow Russia to turn off gas supplies without affecting exports to other parts of Europe. Russia will also increase its leverage over the states that will or may be connected to the NEGP (Germany, and possibly Belgium, Denmark, the Netherlands and the UK). Even if Sweden is not embracing the NEGP, it is today highly sensitive as it imports most of its energy. It is increasingly dependent on Russian oil and is partly dependent on imports of electricity from Russia. Should the NEGP materialise and Sweden becomes connected in the future, it would likely be dependent also on natural gas. It is of paramount importance for the energy security of the connected states how the pipeline is constructed and operated. If there will be technical possibilities for Russia to tamper with the flow of gas to individual states without affecting supply to others, there are tangible threats to the importing states.

  2. How is health a security issue? Politics, responses and issues.

    Science.gov (United States)

    Lo Yuk-ping, Catherine; Thomas, Nicholas

    2010-11-01

    In the closing decade of the 20th century the myriad challenges posed by infectious disease in a globalized environment began to be re-conceptualized as threats to national and human security. The most widely applied model for identifying and responding to such threats is securitization theory, as proposed by the Copenhagen School. Although its analytical framework is generally accepted, its utility remains contested; especially in non-European and non-state settings. The papers in this special edition have several aims: (1) to analyse ways by which Asian states and international organizations have identified health challenges as security threats, (2) to draw upon the securitization model as a way of understanding the full extent to which these states and international organizations have responded to the health threat, and (3) to identify areas where the theory might be strengthened so as to provide greater analytical clarity in areas of health security. This paper acts as a broad introduction to a set of papers on 'Unhealthy governance' and explores some of the key findings from the subsequent papers.

  3. Feynman path integral application on deriving black-scholes diffusion equation for european option pricing

    International Nuclear Information System (INIS)

    Utama, Briandhika; Purqon, Acep

    2016-01-01

    Path Integral is a method to transform a function from its initial condition to final condition through multiplying its initial condition with the transition probability function, known as propagator. At the early development, several studies focused to apply this method for solving problems only in Quantum Mechanics. Nevertheless, Path Integral could also apply to other subjects with some modifications in the propagator function. In this study, we investigate the application of Path Integral method in financial derivatives, stock options. Black-Scholes Model (Nobel 1997) was a beginning anchor in Option Pricing study. Though this model did not successfully predict option price perfectly, especially because its sensitivity for the major changing on market, Black-Scholes Model still is a legitimate equation in pricing an option. The derivation of Black-Scholes has a high difficulty level because it is a stochastic partial differential equation. Black-Scholes equation has a similar principle with Path Integral, where in Black-Scholes the share's initial price is transformed to its final price. The Black-Scholes propagator function then derived by introducing a modified Lagrange based on Black-Scholes equation. Furthermore, we study the correlation between path integral analytical solution and Monte-Carlo numeric solution to find the similarity between this two methods. (paper)

  4. Secure cloud computing

    CERN Document Server

    Jajodia, Sushil; Samarati, Pierangela; Singhal, Anoop; Swarup, Vipin; Wang, Cliff

    2014-01-01

    This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters addres

  5. The Path to a Culturally Relevant National Security Strategy

    National Research Council Canada - National Science Library

    Frappler, John

    2008-01-01

    .... In an attempt to remain ahead of its enemies in the prosecution of the GWOT, the United States has proceeded with an extensive review of its National Security Strategy and an historic transformation...

  6. Canonical transformations and hamiltonian path integrals

    International Nuclear Information System (INIS)

    Prokhorov, L.V.

    1982-01-01

    Behaviour of the Hamiltonian path integrals under canonical transformations produced by a generator, is investigated. An exact form is determined for the kernel of the unitary operator realizing the corresponding quantum transformation. Equivalence rules are found (the Hamiltonian formalism, one-dimensional case) enabling one to exclude non-standard terms from the action. It is shown that the Hamiltonian path integral changes its form under cononical transformations: in the transformed expression besides the classical Hamiltonian function there appear some non-classical terms

  7. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  8. Challenge for the national security of the Republic of Serbia in the concept of common European values

    Directory of Open Access Journals (Sweden)

    Stevanović Miroslav

    2016-01-01

    Full Text Available Peaceful future based on common values, as a motive for the integration of the peoples of Europe, implies discontinuity with value-concepts that were the cause of conflicts. When the European Union and its member states ignore the promotion of the Ustasha's ideological concept which caused great evil to Serbia, as a neighboring country and a candidate for EU membership, the doubt arises whether the current value concept contains elements of challenge for the candidate's national security. In this article, we assume that the historical legacy of Nazism has influenced the shaping of European values. The analysis starts from the Nazi views embodied in the root of the interest for unity of Europe, and the factors of influence of the Nazi value order after World War II. The idea of unified Europe can be attributed to Nazis, who had territorial ambitions in terms of Europe as the living space of the Germanic race, under the dominance of Germany. During the war, there was a significant level of collaboration in European states, while Nazis basically aimed to annihilate Jews, Slavs and Gypsies. After the war, anti-Nazism was marginalized, due to the Cold War against communism and the Soviet Union. The identified trends are analyzed in the context of shaping the value system at the time of neo-liberalism and globalization. After the undermining of the international financial system in 1971, and the rise of neo-liberalism, globalization has generated a trend of centralization and financial domination. This is accompanied by neo-conservative doctrine and politics, which promote realism in international relations, and 'desovereignization' of nation states. The example of the coup d'état and civil conflict in Ukraine exposed tolerance for ultra-nationalistic and neo-Nazi ideas. We find that elitism and imperialism remain as value similarities between the Nazi and the current neo-liberal European value discourse, and that there is an essentially identical

  9. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  10. The Future of the European Security and Defence Policy

    National Research Council Canada - National Science Library

    Alt, Josef

    2006-01-01

    ...) at the European Union's (EU's) Helsinki summit in December 1999. They created the ESDP to allow the European Union to play a more comprehensive role in civilian and military international crisis management backed by credible military power...

  11. Restrictions on European Union Citizens’ Freedom of Movement and Residence in the Country on Grounds of Public Policy, Public Security and Public Health

    Directory of Open Access Journals (Sweden)

    Junevičius Algis

    2016-02-01

    Full Text Available The free movement of persons is one of the most successful European Union projects, serving as a majorly important factor promoting the European integration processes. The adoption of the Treaty on the European Union and the creation of EU citizenship implemented significant changes: the status of EU citizens and their right to move and reside freely within the territory of the Member States can no longer be interpreted in the way it was before the adoption of the Treaty on the European Union. There are no requirements for EU citizens within the Treaty to pursue professional or independent activities or to work under an employment contract in order to access provided rights. However, the right of free movement is not unlimited. The administrations of the Member State governments are authorized to impose restictions on the free movement of citizens. In the light of these facts, this article examines exceptions in the field of free movement of persons and indentifies concepts of public policy, public security and public health. Special attention is given to so-called rule limitation of restrictions and to the mechanism of protection against expulsion from the country. The article concludes by saying that the institutions of Member State governments have the right to evaluate threats within the territory of the country and to decide on the content of public security by themselves. However, their discretion can not be used as an instrument to treat the conduct of other Member State citizens in a worse way than that of their own local citizens.

  12. The strictest energy requirements in the world: An analysis of the path dependencies of a self-proclaimed success

    International Nuclear Information System (INIS)

    Hagelskjær Lauridsen, Erik; Stissing Jensen, Jens

    2013-01-01

    50 years of progressively strengthened energy requirements in the Danish building code appear to be a success, as the energy consumption has remained constant despite an increase in the total area in requirement of heating. This article however argues that the building code mechanism is heavily influenced by path dependent regime structuration processes, and that the mechanism constitutes a barrier to more radical developments within low energy housing. Few and poorly organized frontrunner activities within low energy housing have accordingly taken place in a Danish context during the past decades. Finally it is proposed that the current development within the energy system provides opportunities for cultivating an improved transitional awareness and for carrying out experimental activities that may challenge the path dependencies of prevailing regime structuration processes. - Highlights: ► We analyze the role of the building code energy strategy as an incumbent regime. ► Regime independent development activities such as passive houses are retained. ► Industry is characterized by adaptive capacity to support radical development. ► Adaptive capacity needs to be mobilized and configure by regime problematizations. ► Governance capabilities to achieve such a mobilization are presently in short supply.

  13. Study of development paths of dairy farmers in Slovenia

    NARCIS (Netherlands)

    Klopcic, M.; Verhees, F.J.H.M.; Kuipers, A.; Koops, W.J.

    2014-01-01

    As part of the Central and Eastern European project of Wageningen UR (Wageningen, the Netherlands) combined with a Leonardo da Vinci project coordinated by Warsaw University of Life Sciences (Warsaw, Poland), an analysis was performed in year 2012 of future development paths of dairy farmers in

  14. Roles of Impulsivity, Motivation, and Emotion Regulation in Procrastination - Path Analysis and Comparison Between Students and Non-students.

    Science.gov (United States)

    Wypych, Marek; Matuszewski, Jacek; Dragan, Wojciech Ł

    2018-01-01

    Procrastination - an irrational delay of intended actions despite expecting to be worse off - is a complex and non-homogenous phenomenon. Previous studies have found a number of correlates of procrastination, some of which seem to be particularly important. Impulsivity is closely connected to procrastination on behavioral, genetic, and neuronal levels. Difficulties in emotion regulation have also been shown to be strongly related to procrastination. Procrastination can also be considered as a motivation-based problem. To try to disentangle the connections of impulsivity, emotion regulation, and motivation to procrastination we collected data from over 600 subjects using multiple questionnaires (PPS - Pure Procrastination Scale; UPPSP - Impulsive Behavior Scale, ERQ - Emotion Regulation Questionnaire and MDT - Motivational Diagnostic Test). Structural equation modeling was performed to test several possible relationships between the measured variables. The effects of student status and age have also been investigated. The final path model was a directional model based on six explanatory variables and accounted for 70% of the variance in procrastination. Path analysis revealed that the strongest contributions to procrastination came from lack of value, delay discounting, and lack of perseverance, suggesting the involvement of motivation and impulsivity. The model also revealed the moderating role of expressive suppression between several aspects of impulsivity and procrastination. Close inspection of the paths' weights suggests that there may be two partly competing strategies for dealing with impulsivity and negative emotions: either to suppress emotions and impulsive reactions or to react impulsively, discarding previous plans, and to procrastinate. Path invariance analysis showed the significant moderating roles of student status and age. Both in non-students and high-age groups, the path leading from suppression to procrastination was insignificant. This suggests

  15. Detection of molecular paths associated with insulitis and type 1 diabetes in non-obese diabetic mouse.

    Directory of Open Access Journals (Sweden)

    Erno Lindfors

    Full Text Available Recent clinical evidence suggests important role of lipid and amino acid metabolism in early pre-autoimmune stages of type 1 diabetes pathogenesis. We study the molecular paths associated with the incidence of insulitis and type 1 diabetes in the Non-Obese Diabetic (NOD mouse model using available gene expression data from the pancreatic tissue from young pre-diabetic mice. We apply a graph-theoretic approach by using a modified color coding algorithm to detect optimal molecular paths associated with specific phenotypes in an integrated biological network encompassing heterogeneous interaction data types. In agreement with our recent clinical findings, we identified a path downregulated in early insulitis involving dihydroxyacetone phosphate acyltransferase (DHAPAT, a key regulator of ether phospholipid synthesis. The pathway involving serine/threonine-protein phosphatase (PP2A, an upstream regulator of lipid metabolism and insulin secretion, was found upregulated in early insulitis. Our findings provide further evidence for an important role of lipid metabolism in early stages of type 1 diabetes pathogenesis, as well as suggest that such dysregulation of lipids and related increased oxidative stress can be tracked to beta cells.

  16. The Limits of Epistemic Communities: EU Security Agencies

    Directory of Open Access Journals (Sweden)

    Mai'a K. Davis Cross

    2015-03-01

    Full Text Available This article examines the cases of the European Defence Agency (EDA and EU Intelligence Analysis Centre (IntCen to argue that although they are comprised of high-level security experts, they do not constitute epistemic communities. Research on other groups of security experts based in Brussels has shown that epistemic communities of diplomats, military experts, security researchers, and civilian crisis management experts, among others, have been able to influence the trajectory of security integration by virtue of their shared knowledge. Importantly, these security epistemic communities have been shown to significantly impact outcomes of EU security policy beyond what would be expected by looking only at member-states’ initial preferences. In exploring two examples of “non-cases” that are at the same time very similar to the other examples, the author seeks to shed light on why some expert groups do not form epistemic communities, and how this changes the nature of their influence. In so doing, the goal is to sharpen the parameters of what constitutes epistemic communities, and to add to our understanding of why they emerge. The argument advanced in this article is that institutional context and the nature of the profession matter as preconditions for epistemic community emergence.

  17. Russia's and the European union's gas interdependence. What balance between the market and geopolitics

    International Nuclear Information System (INIS)

    Finon, D.

    2006-01-01

    The purpose of this paper is to review the interdependence relation-ship between Russia and the European Union in the area of gas, by distinguishing the Russian seller's power risk from the issue of short term security, which are often mistaken one for the other The goal is to measure the economic risk associated with the seller's dominant position in the European market to appreciate the relevance of responses that can be made by European countries or the European Union. Firstly, the basically different nature of Russia and of the European Union is described, as well as the role played by its energy resources in the assertion of Russia's political power Secondly there is an analysis of the Russian seller's elements of dependence on the European market, before reviewing, thirdly, the risk of exercising Gazprom's market power in Europe. In closing is a review of the relevance of possible actions by the European Union and member countries to reduce that risk by facilitating the densification of the Pan-european Network, the establishment of entry points and market integration. (author)

  18. The Long and Winding Road: Grades, Psychological Disengagement and Motivation among Female Students in (Non-)Traditional Career Paths

    Science.gov (United States)

    Rinfret, Natalie; Tougas, Francine; Beaton, Ann M.; Laplante, Joelle; Ngo Manguelle, Christiane; Lagacé, Marie Claude

    2014-01-01

    The purpose of this study was to evaluate the links between grades, psychological disengagement mechanisms (discounting evaluative feedback and devaluing school), and motivation among female students in traditional and non-traditional career paths. We predicted that the association between grades and discounting is affected by the importance of…

  19. Do needs for security and certainty predict cultural and economic conservatism? A cross-national analysis.

    Science.gov (United States)

    Malka, Ariel; Soto, Christopher J; Inzlicht, Michael; Lelkes, Yphtach

    2014-06-01

    We examine whether individual differences in needs for security and certainty predict conservative (vs. liberal) position on both cultural and economic political issues and whether these effects are conditional on nation-level characteristics and individual-level political engagement. Analyses with cross-national data from 51 nations reveal that valuing conformity, security, and tradition over self-direction and stimulation (a) predicts ideological self-placement on the political right, but only among people high in political engagement and within relatively developed nations, ideologically constrained nations, and non-Eastern European nations, (b) reliably predicts right-wing cultural attitudes and does so more strongly within developed and ideologically constrained nations, and (c) on average predicts left-wing economic attitudes but does so more weakly among people high in political engagement, within ideologically constrained nations, and within non-Eastern European nations. These findings challenge the prevailing view that needs for security and certainty organically yield a broad right-wing ideology and that exposure to political discourse better equips people to select the broad ideology that is most need satisfying. Rather, these findings suggest that needs for security and certainty generally yield culturally conservative but economically left-wing preferences and that exposure to political discourse generally weakens the latter relation. We consider implications for the interactive influence of personality characteristics and social context on political attitudes and discuss the importance of assessing multiple attitude domains, assessing political engagement, and considering national characteristics when studying the psychological origins of political attitudes.

  20. The need to qualify Non Destructive Tests (NDT) has been recognized for many years in the European countries engaged in nuclear power generation

    International Nuclear Information System (INIS)

    Walczak, M.; Wojas, M.

    2008-01-01

    The European Network for Inspection Qualification, ENIQ, which groups the major part of the nuclear power plant operators in the European Union and in the Applicant Countries, has developed the European methodology for Qualification of Non Destructive Tests. As qualification of NDT is nowadays a standard method in the nuclear industry and in other industries. CEN (European Committee for Standardization) Technical Committee 138 '' Non Destructive Testing '' has established a Working Group, which is responsible for developing a Standard document detailing the CEN Methodology for the qualification of Non Destructive Tests applicable to all industries carrying out Non-Destructive Tests. This Standard document sets out basic principles and provides recommendations and general guidelines for carrying out qualification of NDT. It describes a methodology for qualification of Non-Destructive Tests, applicable to all NDT methods and considers qualification of equipment, procedure and personnel training. This paper presents a short background of the European Methodology for Qualification of Non-Destructive Tests and the Standard document CEN/TR 14748 '' Non-destructive testing - Methodology for qualification of non-destructive tests ''. (author)

  1. An Empirical Path-Loss Model for Wireless Channels in Indoor Short-Range Office Environment

    Directory of Open Access Journals (Sweden)

    Ye Wang

    2012-01-01

    Full Text Available A novel empirical path-loss model for wireless indoor short-range office environment at 4.3–7.3 GHz band is presented. The model is developed based on the experimental datum sampled in 30 office rooms in both line of sight (LOS and non-LOS (NLOS scenarios. The model is characterized as the path loss to distance with a Gaussian random variable X due to the shadow fading by using linear regression. The path-loss exponent n is fitted by the frequency using power function and modeled as a frequency-dependent Gaussian variable as the standard deviation σ of X. The presented works should be available for the research of wireless channel characteristics under universal indoor short-distance environments in the Internet of Things (IOT.

  2. Non-Stationary Dependence Structures for Spatial Extremes

    KAUST Repository

    Huser, Raphaë l; Genton, Marc G.

    2016-01-01

    been developed, and fitted to various types of data. However, a recurrent problem is the modeling of non-stationarity. In this paper, we develop non-stationary max-stable dependence structures in which covariates can be easily incorporated. Inference

  3. Material and Non-material Determinants of European Youth's Life Quality

    OpenAIRE

    Gawlik, Remigiusz

    2013-01-01

    The paper confronts chosen approaches to quality of life studies with recent changes in post-crisis socio-economic environment. The focus is on European Youth at verge of entry into adult life. Presented research is a preliminary study for “The Application of Artificial Intelligence Methods for Analyzing Material and Non-material Determinants of Life Satisfaction between Young People from Developing Countries” project. Identifying and grouping the determinants of their life satisfaction could...

  4. The European Expression Of Interest For High Purity U-233 Materials

    Energy Technology Data Exchange (ETDEWEB)

    Giaquinto, Joseph M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Younkin, James R. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-04-01

    The purpose of this letter report is to document the response for an Expression of Interest (EOI) sent to the European Safeguards and research and development (R&D) scientific communities for the distribution of small amounts of high purity 233U materials for use in safeguards, nonproliferation, and basic R&D in the nuclear disciplines. The intent for the EOI was to gauge the level of international interest for these materials from government and research institutions with programmatic missions in the nuclear security or nuclear R&D arena. The information contained herein is intended to provide information to assist key decision makers in DOE as to the ultimate disposition path for the high purity materials currently being recovered at Oak Ridge National Laboratory (ORNL) and only those items for which there is no United States (U.S.) sponsor identified.

  5. Determinants of non-performing loans in Central and Eastern European countries

    Directory of Open Access Journals (Sweden)

    Bruna Škarica

    2014-03-01

    Full Text Available This paper analyses the determinants of the changes in the non-performing loan (NPL ratio in selected European emerging markets. The model was estimated on a panel dataset using a fixed effects estimator for seven Central and Eastern European (CEE countries between Q3:2007 and Q3:2012. The countries analyzed are Bulgaria, Croatia, Czech Republic, Hungary, Latvia, Romania and Slovakia. Although the literature on NPLs is quite extensive, this is the first empirical research on the countries of CEE region using aggregate, country-level data on problem loans. The results suggest that the primary cause of high levels of NPLs is the economic slowdown, which is evident from statistically significant and economically large coefficients on GDP, unemployment and the inflation rate.

  6. Defence electro-optics: European perspective

    Science.gov (United States)

    Hartikainen, Jari

    2011-11-01

    In 2009 the United States invested in defence R&T 3,6 times and in defence research and development 6,8 times as much as all member states of the European Defence Agency (EDA) combined while the ratio in the total defence expenditure was 2,6 in the US' favour. The European lack of investments in defence research and development has a negative impact on the competitiveness of European defence industry and on the European non-dependence. In addition, the efficiency of investment is reduced due to duplication of work in different member states. The Lisbon Treaty tasks EDA to support defence technology research, and coordinate and plan joint research activities and the study of technical solutions meeting future operational needs. This paper gives an overview how EDA meets the challenge of improving the efficiency of European defence R&T investment with an emphasis on electro-optics and describes shortly the ways that governmental and industrial partners can participate in the EDA cooperation. Examples of joint R&T projects addressing electro-optics are presented.

  7. Interaction of dependent and non-dependent regions of the acutely injured lung during a stepwise recruitment manoeuvre

    International Nuclear Information System (INIS)

    Gómez-Laberge, Camille; Rettig, Jordan S; Arnold, John H; Wolf, Gerhard K; Smallwood, Craig D; Boyd, Theonia K

    2013-01-01

    The benefit of treating acute lung injury with recruitment manoeuvres is controversial. An impediment to settling this debate is the difficulty in visualizing how distinct lung regions respond to the manoeuvre. Here, regional lung mechanics were studied by electrical impedance tomography (EIT) during a stepwise recruitment manoeuvre in a porcine model with acute lung injury. The following interaction between dependent and non-dependent regions consistently occurred: atelectasis in the most dependent region was reversed only after the non-dependent region became overdistended. EIT estimates of overdistension and atelectasis were validated by histological examination of lung tissue, confirming that the dependent region was primarily atelectatic and the non-dependent region was primarily overdistended. The pulmonary pressure–volume equation, originally designed for modelling measurements at the airway opening, was adapted for EIT-based regional estimates of overdistension and atelectasis. The adaptation accurately modelled the regional EIT data from dependent and non-dependent regions (R 2 > 0.93, P < 0.0001) and predicted their interaction during recruitment. In conclusion, EIT imaging of regional lung mechanics reveals that overdistension in the non-dependent region precedes atelectasis reversal in the dependent region during a stepwise recruitment manoeuvre. (paper)

  8. The Security of Energy Supply and the Contribution of Nuclear Energy

    International Nuclear Information System (INIS)

    2011-01-01

    What contribution can nuclear energy make to improve the security of energy supply? This study, which examines a selection of OECD member countries, qualitatively and quantitatively validates the often intuitive assumption that, as a largely domestic source of electricity with stable costs and no greenhouse gas emissions during production, nuclear energy can make a positive contribution. Following an analysis of the meaning and context of security of supply, the study uses transparent and policy-relevant indicators to show that, together with improvements in energy efficiency, nuclear energy has indeed contributed significantly to enhanced energy supply security in OECD countries over the past 40 years. Content: Foreword; Executive Summary; 1. The Security of Energy Supply and the Contribution of Nuclear Energy - Concepts and Issues: - Energy supply security: An introduction, - Why security of energy supply remains a policy issue in OECD countries, - The external dimension: import dependence, resource exhaustion and carbon policy, - The internal dimension: economic, financial and technical considerations for energy supply security - Orientations for government policies to enhance the security of energy supply, - Conclusions; 2. Indicators and Models for Measuring Security of Energy Supply Risks: - Introduction, - Different approaches towards designing the Supply/Demand Index, - A detailed review of selected security of supply indicators, - Comprehensive models for assessing the security of energy supply, - The Supply/Demand Index, - Concluding observations; 3. Evolution of the Security of Energy Supply in OECD Countries: - Time-dependent quantification of the security of energy supply, - Changes in security of supply in selected OECD countries, - Electricity generation and the security of energy supply, - The contribution of nuclear energy and energy intensity to the security of energy supply, - The geographical distribution of SSDI values, - Conclusions; 4. Public

  9. Recent advances to address European Union Health Security from cross border chemical health threats.

    Science.gov (United States)

    Duarte-Davidson, R; Orford, R; Wyke, S; Griffiths, M; Amlôt, R; Chilcott, R

    2014-11-01

    The European Union (EU) Decision (1082/2013/EU) on serious cross border threats to health was adopted by the European Parliament in November 2013, in recognition of the need to strengthen the capacity of Member States to coordinate the public health response to cross border threats, whether from biological, chemical, environmental events or events which have an unknown origin. Although mechanisms have been in place for years for reporting cross border health threats from communicable diseases, this has not been the case for incidents involving chemicals and/or environmental events. A variety of collaborative EU projects have been funded over the past 10 years through the Health Programme to address gaps in knowledge on health security and to improve resilience and response to major incidents involving chemicals. This paper looks at the EU Health Programme that underpins recent research activities to address gaps in resilience, planning, responding to and recovering from a cross border chemical incident. It also looks at how the outputs from the research programme will contribute to improving public health management of transnational incidents that have the potential to overwhelm national capabilities, putting this into context with the new requirements as the Decision on serious cross border threats to health as well as highlighting areas for future development. Crown Copyright © 2014. Published by Elsevier Ltd. All rights reserved.

  10. Cultures, Conditions, and Cognitive Closure: Breaking Intelligence Studies’ Dependence on Security Studies

    Directory of Open Access Journals (Sweden)

    Matthew Crosston

    2015-09-01

    Full Text Available This paper is about how the conceptualization of ‘culture’ in intelligence studies has taken on too powerful a role, one that has become too restrictive in its impact on thinking about other intelligence communities, especially non-Western ones. This restriction brings about unintentional cognitive closure that damages intelligence analysis. The argument leans heavily in many ways on the fine work of Desch and Johnston in the discipline of Security Studies, who cogently brought to light over fifteen years ago how ultra-popular cultural theories were best utilized as supplements to traditional realist approaches, but were not in fact capable of supplanting or replacing realist explanations entirely. The discipline of Intelligence Studies today needs a similar ‘intellectual intervention’ as it has almost unknowingly advanced in the post-Cold War era on the coattails of Security Studies but has largely failed to apply the same corrective measures. This effort may be best accomplished by going back to Snyder in the 1970s who warned that culture should be used as the explanation of last resort for Security Studies.

  11. Protection promotion and cooperation in the European semiconductor industry

    DEFF Research Database (Denmark)

    Martin, Stephen

    1996-01-01

    in the European market. Using strategies that involve world-wide cooperation, European firms are beginning to carve out secure places for themselves in what is now a world market. Joint ventures have been critical in bringing European firms up to world performance levels, but extra-European as well as intra...

  12. Eastern Dimension of the European Neighbourhood Policy: Europeanization Mutual Trap

    Directory of Open Access Journals (Sweden)

    V. A. Latkina

    2014-01-01

    Full Text Available The article analyses the Europeanization policy of the European Union towards the Eastern Partnership participant countries. Suffering from the lack of clear strategy and ultimate goal in the European Neighbourhood Policy the European Union enhances external democratization and its governance in post soviet states without immediate Union's membership perspective. Underestimation of common neighbourhood geopolitical duality in the context of growing rivalry between European (EU and Eurasian (Custom Union/Eurasian Economic Union integration gravitation centers presents the Eastern partners of the EU with a fierce dilemma of externally forced immediate geopolitical and civilizational choice while not all of them are well prepared to such a choice. The mutual Europeanization trap here to be studied both for the EU and its Eastern partners (involving Russia is a deficiency of regulating cooperation mechanism in the situation of European and Eurasian free trades zones overlapping. Vilnius Summit 2013 results test the "European aspirations" of the New Independent States and upset the ongoing process of the European Neighbourhood Policy in the context of growing economic interdependence in Wider Europe. Besides, the Ukrainian crisis escalation during 2014 as a new seat of tension provokes unbalance of the whole European security system and creates new dividing lines in Europe from Vancouver to Vladivostok.

  13. Panorama 2014 - The importance of underground storage in the security of European gas supplies

    International Nuclear Information System (INIS)

    Cornot-Gandolphe, Sylvie

    2013-12-01

    While European capacity for underground gas storage has increased by 16% over the last three years, levels of stock at the beginning of the 2013/2014 winter, in relation to capacity, are the lowest that have been seen since 2010; they represent only 84% of storage capacity. The suppliers of gas have no incentive to reserve storage capacity, for which the cost is considered too high in relation to the spread, currently very low, between the price of gas in winter and in summer. They also rely on sufficient gas supply thanks to other sources of flexibility available on the market: flexibility of production or imports, spot LNG purchases, purchases in the spot market... or even use of the storage capacities of neighbouring countries via European network interconnections. Yet, the 2013/2014 winter is beginning in a gas supply context in Europe that is more difficult: imports of LNG, which had already dropped sharply in 2012, have continued to contract, faced with increased competition from Asian buyers on the international LNG market. Gas imports from Norway are also declining following production limits in that country. Only Russia has strongly increased its exports to Europe in 2013. However, the dispute between Ukraine and Russia about the price of Russian gas delivered to Ukraine still raises the spectre of a threat to the European supply of Russian gas, nearly 60% of which transits via Ukraine. Under these circumstances, as demonstrated by the gas crises of 2006 and 2009 and the cold conditions of February 2012 and March/April 2013, storage is the most efficient means of securing the supply of gas providing, of course, that the storage sites are filled at the beginning of winter. (author)

  14. EU Security of Gas Supplies: Solidarity Runs Through the Pipeline

    International Nuclear Information System (INIS)

    Aoun, Marie-Claire; Rutten, Daan

    2016-05-01

    The ongoing efforts to lessen the European Union's (EU) vulnerability to gas shortages by adopting internal measures were triggered by the Ukrainian gas disputes of 2006 and 2009. The latter deprived several EU Member States of 20% of their gas supplies (30% of imports) for 14 days in the middle of winter due to tensions with Russia. This prompted Member States in 2010 to adopt a Regulation for the Security of Gas Supply, replacing the skeletal 2004 Directive. Since 2014, tensions have increased significantly between the EU and Russia, the block's main gas supplier. Although this has not led to any gas supply disruptions in Europe, and this time Ukraine has been able to revert to reverse flows, national production and storage withdrawals to replace the Russian gas flows, there remains a perceived elevated risk of gas supply disruptions to the EU, especially by certain Member States. This led the European Commission (EC) to publish its first-ever European Energy Security Strategy in May 2014, which was followed by the Gas Stress Tests of October 2014. In February 2015, the EC published its Energy Union Strategy Framework, which was strongly motivated by energy security concerns. In that context, the EC announced a series of proposals for its gas and electricity markets in 2016 and 2017, among which was the 'Sustainable Energy Security Package' (hereafter: Package). This Package, published in February 2016, consists of four proposals. Two of them have a legislative nature, namely a Regulation for Security of Gas Supply and a Decision on Intergovernmental Agreements on energy. The two non-legislative proposals are strategy papers dealing respectively with LNG and Gas Storage, and Heating and Cooling. The purpose of this paper is to focus on the proposed Regulation and to offer considerations on some of its provisions, in particular on the move from the national to the regional level of cooperation and on the legislative formalization of solidarity. (author)

  15. A Game Theoretic Approach to Nuclear Security Analysis against Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kyonam; Kim, So Young; Yim, Mansung [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of); Schneider, Erich [Univ. of Texas at Austin, Texas (United States)

    2014-05-15

    As individuals with authorized access to a facility and system who use their trusted position for unauthorized purposes, insiders are able to take advantage of their access rights and knowledge of a facility to bypass dedicated security measures. They can also capitalize on their knowledge to exploit any vulnerabilities in safety-related systems, with cyber security of safety-critical information technology systems offering an important example of the 3S interface. While this Probabilistic Risk Assessment (PRA) approach is appropriate for describing fundamentally random events like component failure of a safety system, it does not capture the adversary's intentions, nor does it account for adversarial response and adaptation to defensive investments. To address these issues of intentionality and interactions, this study adopts a game theoretic approach. The interaction between defender and adversary is modeled as a two-person Stackelberg game. The optimal strategy of both players is found from the equilibrium of this game. A defender strategy consists of a set of design modifications and/or post-construction security upgrades. An attacker strategy involves selection of a target as well as a pathway to that target. In this study, application of the game theoretic approach is demonstrated using a simplified test case problem. Novel to our approach is the modeling of insider threat that affects the non-detection probability of an adversary. The game-theoretic approach has the advantage of modelling an intelligent adversary who has an intention and complete knowledge of the facility. In this study, we analyzed the expected adversarial path and security upgrades with a limited budget with insider threat modeled as increasing the non-detection probability. Our test case problem categorized three groups of adversary paths assisted by insiders and derived the largest insider threat in terms of the budget for security upgrades. Certainly more work needs to be done to

  16. A Game Theoretic Approach to Nuclear Security Analysis against Insider Threat

    International Nuclear Information System (INIS)

    Kim, Kyonam; Kim, So Young; Yim, Mansung; Schneider, Erich

    2014-01-01

    As individuals with authorized access to a facility and system who use their trusted position for unauthorized purposes, insiders are able to take advantage of their access rights and knowledge of a facility to bypass dedicated security measures. They can also capitalize on their knowledge to exploit any vulnerabilities in safety-related systems, with cyber security of safety-critical information technology systems offering an important example of the 3S interface. While this Probabilistic Risk Assessment (PRA) approach is appropriate for describing fundamentally random events like component failure of a safety system, it does not capture the adversary's intentions, nor does it account for adversarial response and adaptation to defensive investments. To address these issues of intentionality and interactions, this study adopts a game theoretic approach. The interaction between defender and adversary is modeled as a two-person Stackelberg game. The optimal strategy of both players is found from the equilibrium of this game. A defender strategy consists of a set of design modifications and/or post-construction security upgrades. An attacker strategy involves selection of a target as well as a pathway to that target. In this study, application of the game theoretic approach is demonstrated using a simplified test case problem. Novel to our approach is the modeling of insider threat that affects the non-detection probability of an adversary. The game-theoretic approach has the advantage of modelling an intelligent adversary who has an intention and complete knowledge of the facility. In this study, we analyzed the expected adversarial path and security upgrades with a limited budget with insider threat modeled as increasing the non-detection probability. Our test case problem categorized three groups of adversary paths assisted by insiders and derived the largest insider threat in terms of the budget for security upgrades. Certainly more work needs to be done to

  17. The European Commission: nuclear power has an important role to play

    International Nuclear Information System (INIS)

    Anon.

    2008-01-01

    The European Commission (E.C.) thinks that nuclear power has an important role to play: first to reduce CO 2 emissions and secondly to reinforce energy self-reliance of the member states. The decision to introduce nuclear power in their energy mix belongs to every state but the E.C. has also highlighted that if adequate investment are quickly made 2 thirds of the electricity produced in the European Union in 2010 could by from low-carbon-emitting sources. Today with 148 reactors operating in 15 member countries nuclear power contributes to 1 third of the electricity produced. Another issue that is looming is the security of electricity supplying. A study has shown that the security level is worsening (particularly in winter) because of the greater part of wind energy in the energy mix as wind energy is not necessarily available when energy demand is peaking. The E.C. has proposed a new directive drawing a common standard frame for nuclear safety requirements concerning design, site selection, maintenance, operation and decommissioning of nuclear facilities. Each member state will have the choice to implement stiffer regulations. The European Union must reduce its dependency on Russian gas by increasing its storing capacities, by easing gas exchanges between member states and by importing more liquefied natural gas. European member states will have to invert 1000*10 9 euros in gas and electrical power infrastructures in the next 25 years. (A.C.)

  18. COST Action ES1401 TIDES: a European network on TIme DEpendent Seismology

    Science.gov (United States)

    Morelli, Andrea

    2016-04-01

    Using the full-length records of seismic events and background ambient noise, today seismology is going beyond still-life snapshots of the interior of the Earth, and look into time-dependent changes of its properties. Data availability has grown dramatically with the expansion of seismographic networks and data centers, so as to enable much more detailed and accurate analyses. COST Action ES1401 TIDES (TIme DEpendent Seismology; http://tides-cost.eu) aims at structuring the EU seismological community to enable development of data-intensive, time-dependent techniques for monitoring Earth active processes (e.g., earthquakes, volcanic eruptions, landslides, glacial earthquakes) as well as oil/gas reservoirs. The main structure of TIDES is organised around working groups on: Workflow integration of data and computing resources; Seismic interferometry and ambient noise; Forward problems and High-performance computing applications; Seismic tomography, full waveform inversion and uncertainties; Applications in the natural environment and industry. TIDES is an open network of European laboratories with complementary skills, and is organising a series of events - workshops and advanced training schools - as well as supporting short-duration scientific stays. The first advanced training school was held in Bertinoro (Italy) on June 2015, with attendance of about 100 participants from 20 European countries, was devoted to how to manage and model seismic data with modern tools. The next school, devoted to ambient noise, will be held in 2016 Portugal: the program will be announced at the time of this conference. TIDES will strengthen Europe's role in a critical field for natural hazards and natural resource management.

  19. Non-diffractive optically variable security devices

    NARCIS (Netherlands)

    Renesse, R.L. van

    1991-01-01

    At the past optical security conferences attention was focused on diffractive structures, e.g. holograms, embossed gratings and thin—film devices, as security elements on valuable documents. The main reasons for this emphasis are, that the iridescent effect of such diffractive optically variable

  20. Selected Methods For Increases Reliability The Of Electronic Systems Security

    Directory of Open Access Journals (Sweden)

    Paś Jacek

    2015-11-01

    Full Text Available The article presents the issues related to the different methods to increase the reliability of electronic security systems (ESS for example, a fire alarm system (SSP. Reliability of the SSP in the descriptive sense is a property preservation capacity to implement the preset function (e.g. protection: fire airport, the port, logistics base, etc., at a certain time and under certain conditions, e.g. Environmental, despite the possible non-compliance by a specific subset of elements this system. Analyzing the available literature on the ESS-SSP is not available studies on methods to increase the reliability (several works similar topics but moving with respect to the burglary and robbery (Intrusion. Based on the analysis of the set of all paths in the system suitability of the SSP for the scenario mentioned elements fire events (device critical because of security.

  1. PathNet: a tool for pathway analysis using topological information

    Directory of Open Access Journals (Sweden)

    Dutta Bhaskar

    2012-09-01

    Full Text Available Abstract Background Identification of canonical pathways through enrichment of differentially expressed genes in a given pathway is a widely used method for interpreting gene lists generated from high-throughput experimental studies. However, most algorithms treat pathways as sets of genes, disregarding any inter- and intra-pathway connectivity information, and do not provide insights beyond identifying lists of pathways. Results We developed an algorithm (PathNet that utilizes the connectivity information in canonical pathway descriptions to help identify study-relevant pathways and characterize non-obvious dependencies and connections among pathways using gene expression data. PathNet considers both the differential expression of genes and their pathway neighbors to strengthen the evidence that a pathway is implicated in the biological conditions characterizing the experiment. As an adjunct to this analysis, PathNet uses the connectivity of the differentially expressed genes among all pathways to score pathway contextual associations and statistically identify biological relations among pathways. In this study, we used PathNet to identify biologically relevant results in two Alzheimer’s disease microarray datasets, and compared its performance with existing methods. Importantly, PathNet identified de-regulation of the ubiquitin-mediated proteolysis pathway as an important component in Alzheimer’s disease progression, despite the absence of this pathway in the standard enrichment analyses. Conclusions PathNet is a novel method for identifying enrichment and association between canonical pathways in the context of gene expression data. It takes into account topological information present in pathways to reveal biological information. PathNet is available as an R workspace image from http://www.bhsai.org/downloads/pathnet/.

  2. Oil dependence. Myths and realities of a strategic stake; La dependance petroliere. Mythes et realites d'un enjeu strategique

    Energy Technology Data Exchange (ETDEWEB)

    Chaliand, G.; Jafalian, A

    2005-04-15

    Using a series of regional studies, this collective book proposes to evaluate the strategic dimensions of the oil dependence and to determine its geopolitical impacts in the Middle East, Russia, China, USA and Europe. Content: the oil stakes at the beginning of the 21. century; in the center of the oil scene: the Middle East; oil dependence and US foreign policy: beyond myths; the Russian oil, instrument of influence and of alliances re-knitting; China and oil: security feelings and strategic approach; towards a European supply strategy; beyond petroleum: what alternatives; 150 years of petroleum history; the energy dependence; energy economy; automotive fuels and pollution abatement; limitation of greenhouse gas emissions; glossary; bibliography; index; Web links. (J.S.)

  3. The European Union Training Mission in Mali: A case study

    Directory of Open Access Journals (Sweden)

    Dicke Rachel

    2014-10-01

    Full Text Available For several years, the European Union (EU has been increasing its international presence and moving into the role of a global security actor. To support the goal of greater crisis management capabilities, European security integration (ESI has been deepening. This article therefore examines an Ell operation - the European Union Training Mission in Mali (EUTM Mali - with the aim of gauging the success of the EU's efforts at ESI. To determine the success of EUTM Mali and thus of ESI, three propositions are examined: if EUTM Mali is a security operation showing successful security integration, there will be evidence of (i broad participation, (ii financial burden-sharing and (iii the successful incorporation of troops and equipment. The first and third propositions are supported whereas the second does not receive as much support. Overall, EUTM Mali shows considerable success and bodes well for further ESI.

  4. The European Crisis Management: An Organizational Narrative

    OpenAIRE

    Patrícia Kaplánová

    2016-01-01

    The debate of scholars in the field of international relations in last years has put the European Union’s role into the consideration. The European Foreign and Security Policy has positioned itself through its development to the constructive and normative line of research of world politics. With this respect, this article examines a character of crisis management of the European Common Foreign Policy based on the institutional development. Besides the European Union does not po...

  5. Self-reported dependence on mobile phones in young adults: A European cross-cultural empirical survey

    Science.gov (United States)

    Lopez-Fernandez, Olatz; Kuss, Daria J.; Romo, Lucia; Morvan, Yannick; Kern, Laurence; Graziani, Pierluigi; Rousseau, Amélie; Rumpf, Hans-Jürgen; Bischof, Anja; Gässler, Ann-Kathrin; Schimmenti, Adriano; Passanisi, Alessia; Männikkö, Niko; Kääriänen, Maria; Demetrovics, Zsolt; Király, Orsolya; Chóliz, Mariano; Zacarés, Juan José; Serra, Emilia; Griffiths, Mark D.; Pontes, Halley M.; Lelonek-Kuleta, Bernadeta; Chwaszcz, Joanna; Zullino, Daniele; Rochat, Lucien; Achab, Sophia; Billieux, Joël

    2017-01-01

    Background and aims Despite many positive benefits, mobile phone use can be associated with harmful and detrimental behaviors. The aim of this study was twofold: to examine (a) cross-cultural patterns of perceived dependence on mobile phones in ten European countries, first, grouped in four different regions (North: Finland and UK; South: Spain and Italy; East: Hungary and Poland; West: France, Belgium, Germany, and Switzerland), and second by country, and (b) how socio-demographics, geographic differences, mobile phone usage patterns, and associated activities predicted this perceived dependence. Methods A sample of 2,775 young adults (aged 18–29 years) were recruited in different European Universities who participated in an online survey. Measures included socio-demographic variables, patterns of mobile phone use, and the dependence subscale of a short version of the Problematic Mobile Phone Use Questionnaire (PMPUQ; Billieux, Van der Linden, & Rochat, 2008). Results The young adults from the Northern and Southern regions reported the heaviest use of mobile phones, whereas perceived dependence was less prevalent in the Eastern region. However, the proportion of highly dependent mobile phone users was more elevated in Belgium, UK, and France. Regression analysis identified several risk factors for increased scores on the PMPUQ dependence subscale, namely using mobile phones daily, being female, engaging in social networking, playing video games, shopping and viewing TV shows through the Internet, chatting and messaging, and using mobile phones for downloading-related activities. Discussion and conclusions Self-reported dependence on mobile phone use is influenced by frequency and specific application usage. PMID:28425777

  6. Self-reported dependence on mobile phones in young adults: A European cross-cultural empirical survey.

    Science.gov (United States)

    Lopez-Fernandez, Olatz; Kuss, Daria J; Romo, Lucia; Morvan, Yannick; Kern, Laurence; Graziani, Pierluigi; Rousseau, Amélie; Rumpf, Hans-Jürgen; Bischof, Anja; Gässler, Ann-Kathrin; Schimmenti, Adriano; Passanisi, Alessia; Männikkö, Niko; Kääriänen, Maria; Demetrovics, Zsolt; Király, Orsolya; Chóliz, Mariano; Zacarés, Juan José; Serra, Emilia; Griffiths, Mark D; Pontes, Halley M; Lelonek-Kuleta, Bernadeta; Chwaszcz, Joanna; Zullino, Daniele; Rochat, Lucien; Achab, Sophia; Billieux, Joël

    2017-06-01

    Background and aims Despite many positive benefits, mobile phone use can be associated with harmful and detrimental behaviors. The aim of this study was twofold: to examine (a) cross-cultural patterns of perceived dependence on mobile phones in ten European countries, first, grouped in four different regions (North: Finland and UK; South: Spain and Italy; East: Hungary and Poland; West: France, Belgium, Germany, and Switzerland), and second by country, and (b) how socio-demographics, geographic differences, mobile phone usage patterns, and associated activities predicted this perceived dependence. Methods A sample of 2,775 young adults (aged 18-29 years) were recruited in different European Universities who participated in an online survey. Measures included socio-demographic variables, patterns of mobile phone use, and the dependence subscale of a short version of the Problematic Mobile Phone Use Questionnaire (PMPUQ; Billieux, Van der Linden, & Rochat, 2008). Results The young adults from the Northern and Southern regions reported the heaviest use of mobile phones, whereas perceived dependence was less prevalent in the Eastern region. However, the proportion of highly dependent mobile phone users was more elevated in Belgium, UK, and France. Regression analysis identified several risk factors for increased scores on the PMPUQ dependence subscale, namely using mobile phones daily, being female, engaging in social networking, playing video games, shopping and viewing TV shows through the Internet, chatting and messaging, and using mobile phones for downloading-related activities. Discussion and conclusions Self-reported dependence on mobile phone use is influenced by frequency and specific application usage.

  7. THE EUROPEAN UNION’S EXTERNAL AFFAIRS POLICY – THE HIGH REPRESENTATIVE OF THE UNION FOR FOREIGN AFFAIRS AND SECURITY POLICY – A FAVORABLE FRAMEWORK FOR CREATING A SINGLE VOICE FOR THE EUROPEAN DIPLOMATIC SYSTEM OR JUST A NEW BUREAUCRATIC STRUCTURE?

    Directory of Open Access Journals (Sweden)

    Alexandru Bogdan CALANCE

    2015-12-01

    Full Text Available Starting with the Lisbon Treaty, which establishes the new European diplomatic landscape structure, this paper analyses the difference between the objectives expressed in the treaties governing the European Union's foreign policy, and the diplomatic European and international reality. The main objective of this paper is to reveal the extent in which the European Union runs a coherent and unified foreign policy, especially highlighting the problems faced by these institutions in the current international environment, after five years since the creation of the High Representative of the Union for Foreign Affairs and Security Policy, as well as the European External Action Service The results of this paper show that, although from a legal standpoint it was attempted to clearly outline how the Union's external policies should work, on a practical level, this area still faces difficulties in performing at its full capacity.

  8. Frontex and Non-refoulement: The International Responsibility of the European Union

    DEFF Research Database (Denmark)

    Mungianu, Roberta

    Since the Frontex Border Agency's establishment in 2004, its activities have foregrounded the complexity and difficulty of protecting the human rights of those seeking access to the European Union. In this connection, protection from refoulement should be paramount in the Agency's work....... By navigating through the intricacies of Frontex's structure and working methods, this book answers abiding questions: which circumstances would trigger European Union responsibility if violations were to occur in Frontex's joint operations? What is the legal standing of the principle of non......-refoulement in relation to Frontex's activities? Can Frontex be entrusted with an exclusive search and rescue mandate? This book offers a theoretical and practical insight into the legislative intricacies of Frontex's work, examining the responsibility of the EU, and scrutinising the interaction of international law...

  9. Energy market as a non-food application for European agriculture

    International Nuclear Information System (INIS)

    Sipilae, K.

    1993-01-01

    Sustainable non-food cropping systems for arable land are being studied intensively both in Scandinavia and elsewhere in Europe to find alternatives, in which the need for economic subvention would be lower than the export subsidies for grain or other food products. The area of arable land available for non-food cultivation is about 1 million hectares in Finland and 20 - 30 million hectares in the European Communities. In addition to conventional crops and afforestatation, it is possible to grow energy plants (willow, poplar, miscanthus, etc.) and agrofibre plants in these areas. Cultivation of energy willows or other corresponding plants of less than 5 m in height is usually not considered afforestation, as a willow field can easily be retaken into agricultural use with certain reservations (e.g., covered drains can be clogged) This article gives a survey of the alternatives for the utilization of non-food cropping systems

  10. ICT security curriculum or how to respond to current global challenges

    Directory of Open Access Journals (Sweden)

    Marian Silviu Poboroniuc

    2017-01-01

    Full Text Available The paper presents some results obtained through the implementation of the Erasmus LLP “SALEIE” (Strategic Alignment of Electrical and Information Engineering in European Higher Education Institutions. The aim of the project was to bring together experts from European universities to enhance the competitiveness of Electrical and Information Engineering (EIE education within Europe, especially in relation to modern global technical challenges and to provide higher education models in a few EIE fields in accordance with these challenges. One of the outcomes of the project was a new ICT (Information and Computer Technology Security curriculum for bachelor and master levels. The research methodology comprised such stages as: identifying the most important current global challenges, conducting a survey related to existing EIE programs in order to establish the top-level criteria for an EIE curriculum, analyzing the results of the survey, obtaining the industry feedback related to technical and non-technical skills required for the specific field, and proposing a new curriculum for ICT Security programmes to respond to the modern technical challenges and to meet the needs of the industry, students, academics and graduates. As future work we will focus on stakeholder assessment in the EIE field and, based on the resulting feedback, on improving the ICT Security curriculum.

  11. Quantization of the Yang-Mills field and Mandelstam's theory in gauge-independent path-dependent formalism

    International Nuclear Information System (INIS)

    Naito, S.

    1976-01-01

    We derive commutation relations (CR's) between gauge-invariant quantities in the Yang-Mills field theory by applying the Peierls method. The CR's obtained are different from those given by Mandelstam in his gauge-independent, path-dependent formalism. However, our CR's are shown to give a consistently quantized field theory, while his CR's do not. In fact, there exist systematic errors in Mandelstam's treatment of the covariant Green's functions. On the other hand, if we correctly treat covariant Green's functions guided by his procedure, our CR's are shown to lead to the same Feynman rules for the Yang-Mills field as prescribed by Feynman, DeWitt, Faddeev and Popov, and Mandelstam

  12. Power rather than path dependency? The dynamics of institutional change under health care federalism.

    Science.gov (United States)

    Rico, Ana; Costa-Font, Joan

    2005-01-01

    Proposals for government decentralization rank high on the political reform agenda of health systems worldwide. Their impact on welfare state performance and change, however, is still under theoretical scrutiny. This article examines the impact of devolution on the construction of the Spanish National Health Service (NHS) in an attempt to shed some light on this debate. Against widespread claims of path dependency, we argue that the specific nature of the devolution model developed in Spain, given the more egalitarian sociopolitical structure that resulted from democratization, fostered policy innovation and institutional change. Consolidation of an NHS system was compatible with some regional diversity and apparently prevented the rise of significant territorial inequalities. The Spanish case also suggests that policy change depends more on the distribution of social power than on institutions. It underlines the key role of financial and knowledge transfers vis-à-vis institutional reforms in effecting social change as well as the potential for state intervention in supporting the development of collective action resources by social groups.

  13. A comparative study of self-regulation in substance dependent and non-dependent individuals.

    Science.gov (United States)

    Bakhshani, Nour Mohammad; Hosseinbor, Mohsen

    2013-08-05

    Several factors influence the beginning and maintenance of substance use. The purpose of this study was to examine as well as to compare 'self-regulation' in both substance dependent and non-substance dependent individuals. In a cross-sectional study 228 (118 substance dependent and 110 with no history of using substance) participants aged 16-55 were recruited. All of the participants were asked to complete the Self-Regulation Inventory (SRI-25) and a demographic characteristics data checklist. Data was analyzed using descriptive statistics (frequency, mean and standard deviation) and the t-test. The results showed significant differences between substance dependent and non- substance dependent groups in all the scales of the self-regulation inventory including positive actions, controllability, expression of feelings and needs, assertiveness, and well-being seeking (p<0.01). Self-regulation and self-control skills in drug dependent individuals are lower than those without substance dependence individuals. It is concluded that substance use may related to a deficiency in self-control and regulation of feelings. Therefore, for prevention and treatment of substance dependence disorder, it is necessary to work out and exploit strategies that include the improvement of self-regulation.

  14. Protecting animals and enabling research in the European Union

    DEFF Research Database (Denmark)

    Olsson, I. Anna S.; Pinto da Silva, Sandra; Townend, David

    2016-01-01

    In 1986, European Directive 86/609/EEC, regulating the use of animals in research, was one of the first examples of common legislation to set standards for animal protection across the Member States of the former European Economic Community, now the European Union, with the aim of securing a level...... objectives of the directive, particularly with a focus on securing the same high standards of animal protection across member countries. The analysis focuses on three separate issues: (1) minimum standards for laboratory animal housing and care, (2) restrictions on the use of certain animal species, and (3...

  15. European union mission for the rule of law in Kosovo

    Directory of Open Access Journals (Sweden)

    Dr.Sc. Bejtush Gashi

    2011-12-01

    Full Text Available Here we have studied the international circumstances that have affected the deployment of the EULEX Mission in Kosovo. The EULEX mission is the European Union Mission for the Rule of Law in Kosovo. Its main goal is to advise, assist and support the Kosovo authorities in issues of the rule of law, especially in the field of police, judiciary and customs performance. Also this mission has the responsibility to develop and further strengthen the independent multi-ethnic justice system in Kosovo, by ensuring that the rule of law institutions are not politically influenced and that they meet the known international standards and best European practices. This mission was foreseen to be deployed to Kosovo, based on the Ahtissari Comprehensive Status Proposal for Kosovo, but due to its non-approval by the UN Security Council, its full implementation was delayed until December 2008. EULEX acts within the framework of Resolution 1244 of the UN Security Council and under a single chain of command in Brussels. EULEX officials have supported Kosovo Police, the Judiciary system and Kosovo Customs, through MMA actions for achieving objectives and goals that are foreseen by the program strategy of EULEX. But in terms of efficiency, EULEX has only achieved modest results. In the northern part of Kosovo, EULEX has failed, as a result of its ambivalent mandate and incoherence of EU Foreign and Security Policy.

  16. Non-binary decomposition trees - a method of reliability computation for systems with known minimal paths/cuts

    International Nuclear Information System (INIS)

    Malinowski, Jacek

    2004-01-01

    A coherent system with independent components and known minimal paths (cuts) is considered. In order to compute its reliability, a tree structure T is constructed whose nodes contain the modified minimal paths (cuts) and numerical values. The value of a non-leaf node is a function of its child nodes' values. The values of leaf nodes are calculated from a simple formula. The value of the root node is the system's failure probability (reliability). Subsequently, an algorithm computing the system's failure probability (reliability) is constructed. The algorithm scans all nodes of T using a stack structure for this purpose. The nodes of T are alternately put on and removed from the stack, their data being modified in the process. Once the algorithm has terminated, the stack contains only the final modification of the root node of T, and its value is equal to the system's failure probability (reliability)

  17. The European Union and sub-Saharan Africa

    DEFF Research Database (Denmark)

    Kluth, Michael Friederich

    2013-01-01

    This article argues that aspirations of maintaining a dominant influence over sub-Saharan security issues has spurred the French and British leadership of European Union (EU) foreign and security policy integration, just as it has informed military capability expansions by the armed forces...

  18. Non-proliferation policies and demand for uranium

    International Nuclear Information System (INIS)

    Warnecke, S.J.

    1978-01-01

    The non-proliferation policies of USA, Canada and Australia are outlined, and the effects on nuclear policy in the consumer countries, particularly the member states of the European Community and Japan are considered. Supply and demand in relation to uranium, security and economic aspects are covered. Reprocessing, the use of plutonium in breeder reactors, and the wider issues of international confidence and trade are discussed. (U.K.)

  19. Implementing an Information Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.; O' Neil, Lori Ross; Leitch, Rosalyn; Johnson, Christopher; Lewis, John G.; Rodger, Robert M.

    2017-11-01

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to cover information security best practices, planning for an information security management system, and implementing security controls for information security.

  20. CONVERGENCE IN THE EUROPEAN SOCIAL POLICY

    Directory of Open Access Journals (Sweden)

    Mariana Iovitu

    2012-07-01

    Full Text Available The European Union has developed a series of strategies that aim to limit the consequences of non-employment (due to the continuing crisis. These strategies aim by the objectives and mechanisms specific to the eco-social area, to improve the access to employment, social services, professional education and a more efficient European fund management. All this are subordinated to the coupling policy public-private in terms of partnerships both at a national level and European level. The problem is related to differences manifested between the social objectives at the national level and those imposed by the European context. The differences come from different degrees of economic development of the member states, economic development which is reflected on the living standards. The convergence between the social policies is based on the economic convergence, which represents the only way to ameliorate the discrepancies between the united nations of Europe. Social Europe dream or certainty? The answer can be found in the words of Jean Monnet: “we are not bringing together states, we are uniting people”. The efforts to define the four types of actions regarding the free movement of labor force and the correlation of the social security schemes, ensuring equal opportunities, respecting labor rights and the fight against discrimination can be found in the results obtained on these priorities.

  1. Liberty, Security and Power: Some Reflections on Transatlantic Relations

    Directory of Open Access Journals (Sweden)

    Angela Liberatore

    2009-08-01

    Full Text Available The leitmotiv of the tensions between security and liberty is recurrent in democratic debate – especially in connection with wars, but also in relation to other cases where internal or external threats are seen as requiring the sacrifice of liberty to guarantee survival. Such tension can hardly arise in non-democracies, where liberties are seen as a threat themselves by those in power, while a democracy cannot survive as such without safeguarding liberty – including to criticise and ‘send back home’ those in power. Following the terrorist attacks of 11 September 2001 the issue became especially acute, and heavily reflected on policies in the European Union (EU as well as in the relation between the EU and the USA. The changes taking place in the USA with the election of President Obama and those, admittedly less visible, taking place in the EU – including the election of the new European Parliament and the fate of the Lisbon Treaty – provide an interesting occasion for some reflection on the kind of continuity or change that may be expected in EU-US relations in handling the relations between security and liberty.

  2. Nuclear safety and energy supply security: conflict or goal?

    International Nuclear Information System (INIS)

    Kutas, S.

    2006-01-01

    Energy generation and safety problems at the nuclear power plant have been analysed. Nuclear power plants are operated on the commercial basis in many countries today. Safety and security in energy generation and distribution is a complex problem. Energy supply reliability, security energy price and other issues should be co-ordinated and solved at the same time. Decentralisation and deregulation means new challenges for regulatory bodies and assurance of security. International co-operation in this field is very important. Western European Nuclear Regulators' Association (WENRA) consolidates efforts of regulatory bodies of European countries in order to harmonize approaches of nuclear safety. Nuclear Safety, and security of energy supply is the task and goal at the same time. (author)

  3. PROPOSALS REGARDING CLIMATE CHANGE AND ENERGY FOR 2030

    Directory of Open Access Journals (Sweden)

    MARIA POPESCU

    2015-03-01

    Full Text Available Climate policies are fundamental for the future of our planet, while a truly European energy policy is a key factor for our competitiveness.It`s mandatory a new European energy policy which must accept the real energetic motivations regarding sustainability and greenhouse gas, security of supply and dependence on imports, competitiveness and efficient functioning of the internal energy market. An ambitious target of 40% reduction in emissions of greenhouse gases for 2030 is the cornerstone of the most efficient in terms of cost on our path towards a low-carbon dioxide. And at least 27% target for renewable energy is an important signal to investors to provide stability, boost green jobs and support security of supply. Using renewable energy sources (wind, solar and photovoltaic, biomass and biofuels, geothermal and heat pumps undeniably contributes to limiting climate change. In addition, it helps to secure energy supplies and to create and increase employment in Europe, thanks to increasing local energy production and consumption.

  4. Policies of Adult Education in Portugal and France: The European Agenda of Validation of Non-Formal and Informal Learning

    Science.gov (United States)

    Cavaco, C.; Lafont, P.; Pariat, M.

    2014-01-01

    This article analyses the influence of the European Union's educational policies on the implementation of devices for the recognition and the validation of informal and non-formal learning within public policies on education and training for adults in European Union Member States. Portugal and France are taken as examples. The European Union's…

  5. Market transition or path dependency? Changing effects of income determinants in the Czech Republic, Hungary, Poland, Russia, and Slovakia, 1991–2002

    NARCIS (Netherlands)

    Verhoeven, Willem-Jan; Dessens, Jos; Jansen, Wim

    2008-01-01

    A major issue in the market transition debate on transitional societies is the extent to which changing economic institutions are responsible for the changing stratification order in post-Communist societies, as assumed by the Market Transition Theory (MTT). Advocates of path dependent

  6. Comparison of Mediterranean diet compliance between European and non-European populations in the Mediterranean basin.

    Science.gov (United States)

    Benhammou, Samira; Heras-González, Leticia; Ibáñez-Peinado, Diana; Barceló, Carla; Hamdan, May; Rivas, Ana; Mariscal-Arcas, Miguel; Olea-Serrano, Fatima; Monteagudo, Celia

    2016-12-01

    Fruit, vegetables, cereals, and olive oil are common elements of the Mediterranean diet (MD), but each country in the Mediterranean basin has its own gastronomic customs influenced by socio-cultural, religious, and economic factors. This study compared the dietary habits of three Mediterranean populations with different cultures and lifestyles, a total of 600 adults (61.9% females) between 25 and 70 yrs from Spain, Morocco, and Palestine. All participants completed a self administered questionnaire, including sociodemographic and anthropometric items, a validated semi-quantitative food frequency questionnaire adapted to the foods consumed in each country, and three 24-h recalls. MD adherence was estimated with the MD Serving Score (MDSS). All populations showed a moderate adherence to the Mediterranean dietary pattern. In comparison to the Palestine population, MDSS-assessed adherence to the MD was 6.36-fold higher in the Spanish population and 3.88-fold higher in the Moroccan population. Besides the country of origin, age was another predictive factor of MD adherence, which was greater (higher MDSS) in participants aged over 50 yrs than in those aged 30 yrs or younger. This preliminary study contributes initial data on dietary differences between European and non-European countries in the Mediterranean basin. The Spanish diet was shown to be closer to MD recommendations than the diet of Morocco or Palestine. Given the impact of good dietary habits on the prevention of chronic non-transmittable diseases, health policies should focus on adherence to a healthy diet, supporting traditional dietary patterns in an era of intense commercial pressures for change. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Security prospects through cloud computing by adopting multiple clouds

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg; Bohli, Jens Matthias

    2011-01-01

    Clouds impose new security challenges, which are amongst the biggest obstacles when considering the usage of cloud services. This triggered a lot of research activities in this direction, resulting in a quantity of proposals targeting the various security threats. Besides the security issues coming...... with the cloud paradigm, it can also provide a new set of unique features which open the path towards novel security approaches, techniques and architectures. This paper initiates this discussion by contributing a concept which achieves security merits by making use of multiple distinct clouds at the same time....

  8. Capitalizing on emergence: The 'new' civil security market in Europe

    NARCIS (Netherlands)

    Hoijtink, M.

    2014-01-01

    In recent years, the European Union has supported the development of a new civil security market, capable of providing security technology for new and global security challenges. This article analyses the emerging growth market for civil security in relation to contemporary notions of potential

  9. Net modelling of energy mix among European Countries: A proposal for ruling new scenarios

    International Nuclear Information System (INIS)

    Dassisti, M.; Carnimeo, L.

    2012-01-01

    European energy policy pursues the objective of a sustainable, competitive and secure supply of energy. In 2007, the European Commission adopted an energy policy for Europe, which was supported by several documents on different aspects of energy and included an action plan to meet the major energy challenges Europe has to face. A farsighted diversified yearly mix of energies was suggested to countries, aiming at increasing security of supply and efficiency, but a wide and contemporary view of energy interchanges between states was not available. In a previous work of the same authors, energy import/export interchanges between European States were used to develop a geographic overview at one-glance. In this paper, the enhanced Interchange Energy Network (IEN) is investigated from a modelling point of view, as a Small-World Net, by supposing that connections can exist between States with a probability depending also on economic/political relations between countries. -- Highlights: ► Different view of the imports and exports of electric energy flows between European for potential use in ruling exchanges. ► Panel data from 1996 to 2008 as part of a network of exchanges was considered from Eurostat official database. ► The European import/export energy flows modelled as a network with Small-World phenomena, interpreting the evolution over the years. ► Interesting behavioural features as outcome derived, as shown for the case example of the Germany.

  10. Security of Supply: A Pan-European Approach - The Opportunities and Requirements of Greater Cooperation Across European Electricity Markets

    International Nuclear Information System (INIS)

    Ulreich, S.

    2015-01-01

    In December 2014, Prognos AG (Berlin/Basel) was commissioned by the Weltenergierat - Deutschland e.V to prepare a study on the potential of greater cooperation across European electricity markets. The focus of the analysis was to address the extent to which closer cooperation on ensuring generation adequacy can lead to cost reductions. Fifteen countries were analysed: seven members of the Pentalateral Energy Forum (PLEF, DE, BE, NL, LU, FR, AT and CH) and eight additional bordering countries (PL, IT, UK, ES, DK, CZ, PT and IE). Today, ensuring generation adequacy takes place at a national level and international effects are not taken into account. However, if cross-border effects are considered adequacy considerations at a national level can be relieved, e.g.: load peaks in Europe do not occur simultaneously and the feedin from renewable energy takes place at different times. Potential savings arise, as less capacity needs to be secured by conventional power plants. An indicator for this in the present study is the so-called residual load. The study is based on analyses of all existing data relating to hourly load and feed-in from renewable energy for the period from 2009 to 2014. In addition, two scenarios (based on Visions V1 and V3 of ENTSO-E's System Outlook and Adequacy Forecast) and numerous sensitivities for 2030 were generated. As the variability of the results is highly dependent on weather conditions, 48 simulations of wind power (sensitivities) established a broad corridor of results. For this reason, ranges are used in the presentation of results. The approach makes this study the most comprehensive analysis to date of the potential of closer cooperation with respect to ensuring generation adequacy. With the assumption of no grid congestion, the study reaches the following results: 1) Reduction of residual load: In contrast to a national assessment scheme, under a collective assessment scheme the residual load will reduce by 2 to 15 gigawatts (most

  11. Maternal care, mother-offspring aggregation and age-dependent coadaptation in the European earwig.

    Science.gov (United States)

    Gómez, Y; Kölliker, M

    2013-09-01

    Benefits and costs of parental care are expected to change with offspring development and lead to age-dependent coadaptation expressed as phenotypic (behavioural) matches between offspring age and parental reproductive stage. Parents and offspring interact repeatedly over time for the provision of parental care. Their behaviours should be accordingly adjusted to each other dynamically and adaptively, and the phenotypic match between offspring age and parental stage should stabilize the repeated behavioural interactions. In the European earwig (Forficula auricularia), maternal care is beneficial for offspring survival, but not vital, allowing us to investigate the extent to which the stability of mother-offspring aggregation is shaped by age-dependent coadaptation. In this study, we experimentally cross-fostered nymphs of different age classes (younger or older) between females in early or late reproductive stage to disrupt age-dependent coadaptation, thereby generating female-nymph dyads that were phenotypically matched or mismatched. The results revealed a higher stability in aggregation during the first larval instar when care is most intense, a steeper decline in aggregation tendency over developmental time and a reduced developmental rate in matched compared with mismatched families. Furthermore, nymph survival was positively correlated with female-nymph aggregation stability during the early stages when maternal care is most prevalent. These results support the hypothesis that age-related phenotypically plastic coadaptation affects family dynamics and offspring developmental rate. © 2013 The Authors. Journal of Evolutionary Biology © 2013 European Society For Evolutionary Biology.

  12. The Conflicting Aims of the European Neighborhood Policy and its Secondary Effects

    DEFF Research Database (Denmark)

    Castan Pinos, Jaume

    2014-01-01

    to guarantee the security of Europe’s borders. The European Neighborhood Policy has played a pivotal role in ensuring that the neighbors complied with the EU’s interest by offering political and economic rewards. Compliance is also enhanced through the “Seville Doctrine.” The paper challenges the idea...... that the “war on migrants” is a common shared interest for the EU and North African states, arguing that it is rather an EU security interest which does not necessarily correspond with the neighbors priorities. Finally, the paper focuses on the implementation of externalization in Morocco and critically...... analyzes the non-desired secondary effects generated by the adoption of EU-made migration policies....

  13. Non-Stationary Dependence Structures for Spatial Extremes

    KAUST Repository

    Huser, Raphaël

    2016-03-03

    Max-stable processes are natural models for spatial extremes because they provide suitable asymptotic approximations to the distribution of maxima of random fields. In the recent past, several parametric families of stationary max-stable models have been developed, and fitted to various types of data. However, a recurrent problem is the modeling of non-stationarity. In this paper, we develop non-stationary max-stable dependence structures in which covariates can be easily incorporated. Inference is performed using pairwise likelihoods, and its performance is assessed by an extensive simulation study based on a non-stationary locally isotropic extremal t model. Evidence that unknown parameters are well estimated is provided, and estimation of spatial return level curves is discussed. The methodology is demonstrated with temperature maxima recorded over a complex topography. Models are shown to satisfactorily capture extremal dependence.

  14. Non Security – Premise of Cybercrime

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2012-04-01

    Full Text Available It is presented the concept of cyber crime. There are detailed the vulnerabilities of IT applications. There are listed the types of Internet fraud. There are analyzed the predisposing factors of cyber crime. There are identified the deficiencies of the security systems. It is build a model for information security management.

  15. Report of “the 2013 international forum on peaceful use of nuclear energy, nuclear non-proliferation and nuclear security. Ensuring nuclear non-proliferation and nuclear security of nuclear fuel cycle options in consideration of the accident at TEPCO's Fukushima Daiichi Nuclear Power Station”

    International Nuclear Information System (INIS)

    Yamamura, Tsukasa; Suda, Kazunori; Tomikawa, Hirofumi; Suzuki, Mitsutoshi; Kuno, Yusuke; Mochiji, Toshiro

    2014-03-01

    The Japan Atomic Energy Agency (JAEA) held “International Forum on Peaceful Use of Nuclear Energy, Nuclear Non-proliferation and Nuclear Security – Ensuring Nuclear Non-Proliferation and Nuclear Security of Nuclear Fuel Cycle Options in consideration of the Accident at TEPCO's Fukushima Daiichi Nuclear Power Station –” on 3 and 4 December 2013, with the Japan Institute of International Affairs (JIIA) and School of Engineering, The University of Tokyo, as co-hosts. In the Forum, officials from Japan, the United States, France and International Atomic Energy Agency (IAEA) explained their efforts regarding peaceful use of nuclear energy and nuclear non-proliferation. Discussion was made in two panels, entitled “Nuclear non-proliferation and nuclear security measures of nuclear fuel cycle options in consideration of the Accident at TEPCO's Fukushima Daiichi Nuclear Power Station” and “Roles of safeguards and technical measures for ensuring nuclear non-proliferation for nuclear fuel cycle options”. In the first panel based on the implications of the Accident at TEPCO's Fukushima Daiichi Nuclear Power Station on the domestic and global nuclear energy use and increased interest in the back end of nuclear fuel cycle, discussion was made on nuclear non-proliferation and nuclear security challenges on both fuel cycle options from the policy and institutional viewpoints whereas in the second panel the roles of safeguards and proliferation resistant nuclear technology including plutonium burning technology in ensuring nuclear non-proliferation and nuclear security in the back end of nuclear fuel cycle were discussed. Officials and experts from Japan, IAEA, the United States, France and Republic of Korea participated in the panel and made contributions to active discussion. This report includes abstracts of keynote speeches, summaries of two panel discussions and materials of the presentations in the forum. The editors take full responsibility for the wording

  16. The European Nuclear Safety Training and Tutoring Institute

    International Nuclear Information System (INIS)

    2012-01-01

    The European Nuclear Safety Training and Tutoring Institute, ENSTTI, is an initiative of European Technical Safety Organizations (TSO) in order to provide vocational training and tutoring in the methods and practices required to perform assessment in nuclear safety, nuclear security and radiation protection. ENSTTI calls on TSOs' expertise to maximize the transmission of safety and security knowledge, practical experience and culture. Training, tutoring and courses for specialists are achieved through practical lectures, working group and technical visits and lead to a certificate after knowledge testing. ENSTTI contributes to the harmonization of nuclear safety and security practices and to the networking of today and future nuclear safety experts in Europe and beyond. (A.C.)

  17. A novel communication mechanism based on node potential multi-path routing

    Science.gov (United States)

    Bu, Youjun; Zhang, Chuanhao; Jiang, YiMing; Zhang, Zhen

    2016-10-01

    With the network scales rapidly and new network applications emerge frequently, bandwidth supply for today's Internet could not catch up with the rapid increasing requirements. Unfortunately, irrational using of network sources makes things worse. Actual network deploys single-next-hop optimization paths for data transmission, but such "best effort" model leads to the imbalance use of network resources and usually leads to local congestion. On the other hand Multi-path routing can use the aggregation bandwidth of multi paths efficiently and improve the robustness of network, security, load balancing and quality of service. As a result, multi-path has attracted much attention in the routing and switching research fields and many important ideas and solutions have been proposed. This paper focuses on implementing the parallel transmission of multi next-hop data, balancing the network traffic and reducing the congestion. It aimed at exploring the key technologies of the multi-path communication network, which could provide a feasible academic support for subsequent applications of multi-path communication networking. It proposed a novel multi-path algorithm based on node potential in the network. And the algorithm can fully use of the network link resource and effectively balance network link resource utilization.

  18. Quantum cryptography for secure free-space communications

    International Nuclear Information System (INIS)

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.; Lamoreaux, S.K.; Luther, G.G.; Morgan, G.L.; Nordholt, J.E.; Peterson, C.G.

    1999-01-01

    The secure distribution of the secret random bit sequences known as key material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg's uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). The authors have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon polarization states to generate shared key material over line-of-sight optical links. Key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. The authors have developed and tested a free-space quantum key distribution (QKD) system over an outdoor optical path of ∼1 km at Los Alamos National Laboratory under nighttime conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, they examine the feasibility of surface to satellite QKD

  19. Non-binary decomposition trees - a method of reliability computation for systems with known minimal paths/cuts

    Energy Technology Data Exchange (ETDEWEB)

    Malinowski, Jacek

    2004-05-01

    A coherent system with independent components and known minimal paths (cuts) is considered. In order to compute its reliability, a tree structure T is constructed whose nodes contain the modified minimal paths (cuts) and numerical values. The value of a non-leaf node is a function of its child nodes' values. The values of leaf nodes are calculated from a simple formula. The value of the root node is the system's failure probability (reliability). Subsequently, an algorithm computing the system's failure probability (reliability) is constructed. The algorithm scans all nodes of T using a stack structure for this purpose. The nodes of T are alternately put on and removed from the stack, their data being modified in the process. Once the algorithm has terminated, the stack contains only the final modification of the root node of T, and its value is equal to the system's failure probability (reliability)

  20. Secure and Efficient Routable Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Edgar, Thomas W.; Hadley, Mark D.; Manz, David O.; Winn, Jennifer D.

    2010-05-01

    This document provides the methods to secure routable control system communication in the electric sector. The approach of this document yields a long-term vision for a future of secure communication, while also providing near term steps and a roadmap. The requirements for the future secure control system environment were spelled out to provide a final target. Additionally a survey and evaluation of current protocols was used to determine if any existing technology could achieve this goal. In the end a four-step path was described that brought about increasing requirement completion and culminates in the realization of the long term vision.

  1. SOME REFLECTIONS ON FLEXICURITY-THE EUROPEAN APPROACH TO LABOUR MARKET POLICY

    Directory of Open Access Journals (Sweden)

    Ionete Anca

    2012-12-01

    Full Text Available The notion of “flexicurity” promises to overcome the tensions between the labour market flexibility on the one hand and social security on the other hand, by offering “the best of both worlds”. In this review the development of the concept will be set against the background of changed economic circumstances in the last two decades. Flexicurity is seen as a way to preserve the European Social Model while maintaining and improving the competitiveness of the European Union. It is argued that, in the context of globalisation and technological change which place greater demands on business to adapt continuously, high levels of employment security will not depend only on protection of workers’ specific job, but mainly on the means for workers to stay on the job market, manage smooth transitions between jobs and make progress in their careers. At the end of the day, the aim of flexicurity policies should be to ensure the welfare and well-being of our societies and all their members, now and in the future. It can therefore be argued that flexicurity is ultimately about security and sustainability. At the same time, the European ideas and principles on flexicurity first and foremost need to be seen as a framework which may offer inspiration and guidance to Member States to review and improve their labour markets in terms of establishing a sound balance between flexibility and security. Member States can and should come up with their tailor-made policies and regulations that are geared towards their specific history, starting-position and political, institutional and cultural context. As quasi prototypes of flexicurity, policies pursued particularly in Denmark and the Netherlands have been portrayed as having successfully achieved new combinations between (greater labour market flexibility without compromising social protection. At this point in time, it remains to be seen whether flexicurity will be more than a buzzword

  2. Demographics of the European apicultural industry.

    Science.gov (United States)

    Chauzat, Marie-Pierre; Cauquil, Laura; Roy, Lise; Franco, Stéphanie; Hendrikx, Pascal; Ribière-Chabert, Magali

    2013-01-01

    Over the last few years, many European and North American countries have reported a high rate of disorders (mortality, dwindling and disappearance) affecting honeybee colonies (Apis mellifera). Although beekeeping has become an increasingly professional activity in recent years, the beekeeping industry remains poorly documented in Europe. The European Union Reference Laboratory for Honeybee Health sent a detailed questionnaire to each Member State, in addition to Kosovo and Norway, to determine the demographics and state of their beekeeping industries. Based on data supplied by the National Reference Laboratory for honeybee diseases in each European country, a European database was created to describe the beekeeping industry including the number and types of beekeepers, operation size, industry production, and health (notifiable diseases, mortalities). The total number of beekeepers in Europe was estimated at 620,000. European honey production was evaluated at around 220,000 tons in 2010. The price of honey varied from 1.5 to 40 €/kg depending on the country and on the distribution network. The estimated colony winter mortality varied from 7 to 28% depending on the country and the origin of the data (institutional survey or beekeeping associations). This survey documents the high heterogeneity of the apicultural industry within the European Union. The high proportion of non-professional beekeepers and the small mean number of colonies per beekeeper were the only common characteristics at European level. The tremendous variation in European apicultural industries has implication for any comprehensive epidemiological or economic analysis of the industry. This variability needs to be taken into account for such analysis as well as for future policy development. The industry would be served if beekeeping registration was uniformly implemented across member states. Better information on the package bee and queen production would help in understanding the ability of

  3. Modelling electricity futures prices using seasonal path-dependent volatility

    International Nuclear Information System (INIS)

    Fanelli, Viviana; Maddalena, Lucia; Musti, Silvana

    2016-01-01

    Highlights: • A no-arbitrage term structure model is applied to the electricity market. • Volatility parameters of the HJM model are estimated by using German data. • The model captures the seasonal price behaviour. • Electricity futures prices are forecasted. • Call options are evaluated according to different strike prices. - Abstract: The liberalization of electricity markets gave rise to new patterns of futures prices and the need of models that could efficiently describe price dynamics grew exponentially, in order to improve decision making for all of the agents involved in energy issues. Although there are papers focused on modelling electricity as a flow commodity by using Heath et al. (1992) approach in order to price futures contracts, the literature is scarce on attempts to consider a seasonal volatility as input to models. In this paper, we propose a futures price model that allows looking into observed stylized facts in the electricity market, in particular stochastic price variability, and periodic behavior. We consider a seasonal path-dependent volatility for futures returns that are modelled in Heath et al. (1992) framework and we obtain the dynamics of futures prices. We use these series to price the underlying asset of a call option in a risk management perspective. We test the model on the German electricity market, and we find that it is accurate in futures and option value estimates. In addition, the obtained results and the proposed methodology can be useful as a starting point for risk management or portfolio optimization under uncertainty in the current context of energy markets.

  4. European gas market developments. Opportunities and threats

    International Nuclear Information System (INIS)

    Van Oostvoorn, F.

    1998-09-01

    The paper is based on two studies conducted by ECN, namely a study entitled 'An analysis of the West-European gas market: a company approach' and another entitled 'Developments of gas markets across Europe' to be published in November 1998. The paper addresses the past driving factors responsible for the increasing share of gas in the EU energy demand. Furthermore it very briefly discusses the rising dependency of the European Union (EU) on gas imports from non-EU sources such as Russia and the expected gas-to-gas competition in a large number of EU countries in the next decades. 25 refs

  5. European Union and oil

    International Nuclear Information System (INIS)

    Paillard, Christophe Alexandre

    2004-01-01

    In a context of oil price increase, problems about a Russian oil company (Loukos), and uncertainties in the Middle-East, the possibility of a new oil shock is a threat for Europe, and raises the issue of a true European energy policy which would encompass, not only grid development, environmental issues or market regulation issues, but also strategic issues related to energy supply security. This article proposes an overview of the European policy: first steps for a future European energy and oil policy in the green paper of the European Commission published in November 2000, issues of pollution and safety for hydrocarbon maritime transport. The article then examines the possibility of a third oil shock due to a crisis in the Middle East, and discusses whether European must have strategic stocks to face an outage of oil supplies

  6. Polymer quantum mechanics some examples using path integrals

    International Nuclear Information System (INIS)

    Parra, Lorena; Vergara, J. David

    2014-01-01

    In this work we analyze several physical systems in the context of polymer quantum mechanics using path integrals. First we introduce the group averaging method to quantize constrained systems with path integrals and later we use this procedure to compute the effective actions for the polymer non-relativistic particle and the polymer harmonic oscillator. We analyze the measure of the path integral and we describe the semiclassical dynamics of the systems

  7. A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System

    International Nuclear Information System (INIS)

    Zhang Xiaohong; Min Lequan

    2005-01-01

    Based on a generalized chaos synchronization system and a discrete Sinai map, a non-symmetric true color (RGB) digital image secure communication scheme is proposed. The scheme first changes an ordinary RGB digital image with 8 bits into unrecognizable disorder codes and then transforms the disorder codes into an RGB digital image with 16 bits for transmitting. A receiver uses a non-symmetric key to verify the authentication of the received data origin, and decrypts the ciphertext. The scheme can encrypt and decrypt most formatted digital RGB images recognized by computers, and recover the plaintext almost without any errors. The scheme is suitable to be applied in network image communications. The analysis of the key space, sensitivity of key parameters, and correlation of encrypted images imply that this scheme has sound security.

  8. Path creation in the software industry

    DEFF Research Database (Denmark)

    Leimbach, Timo

    2017-01-01

    The article analyzes the development of the German software company Software AG, which was among the few European companies that succeeded in the US market already in the 1970s. Utilizing the concept of "path creation" it examines how early success impacted the development of the company. It shows...... that at least two paths in the development, the focus on the ADABAS product ecosystem and the underlying technology as well as the strong internationalization, relate to the early success and influenced the further evolution of it. The analyses reveal that they played an important role in how the company...... reacted on the rise of relational databases and the vertical disintegration of the computer industry. As a consequence of the late adoption of them they company got into troubles and needed adjust their profile and orientation during the 1990s and early 2000s, which is analyzed in the final part...

  9. Quantum Secure Group Communication.

    Science.gov (United States)

    Li, Zheng-Hong; Zubairy, M Suhail; Al-Amri, M

    2018-03-01

    We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is needed for the quantum network built on quantum key distribution. Comparing with the secure quantum network based on BB84, we show our protocol is more efficient and securer. Particularly, in the security analysis, we introduce a new way of attack, i.e., the counterfactual quantum attack, which can steal information by "invisible" photons. This invisible photon can reveal a single-photon detector in the photon path without triggering the detector. Moreover, the photon can identify phase operations applied to itself, thereby stealing information. To defeat this counterfactual quantum attack, we propose a quantum multi-user authorization system. It allows us to precisely control the communication time so that the attack can not be completed in time.

  10. Non-Traditional Security: The Case of Water Security in the Mekong Subregion

    Directory of Open Access Journals (Sweden)

    Haefner, Andrea

    2013-09-01

    Full Text Available In the first decade of the twenty-first century Non-Traditional Security (NTS challenges are of rising importance due to their increasing impact on daily life and broader national interests. This paper focuses on the Mekong Region as an important subregion due to its significance for more than 70 million people living directly on the river banks and its importance for the economic development of the six riparian countries. This paper investigates NTS challenges in the Mekong Subregion with a focus on environmental challenges and argues that NTS are of increasing importance in the region and will increase in the future. Whereas economic growth is crucial for the improvements of the livelihoods on the Mekong River and the overall economic performance of the riparian states, environmental protection cannot be disregarded as doing so would have devastating impact on the subregion and the wider region in the future.

  11. Comparative study on economic security of enterprises depending on implemented business activities quantity

    OpenAIRE

    Shkarina Tatyana; Chudnova Olga; Mokhova Olga

    2017-01-01

    The results of a comparative study on economic security of enterprises depending on the quantity of business activities are published in the article. The sampling for analysis was conducted based on statistic data of Primorsky Region of the Russian Federation. The control points are the years of the most thorough data collection on the business activities of one-field and diversified enterprises: 2005, 2009, 2013, 2015.

  12. Optimization of path length stretching in Monte Carlo calculations for non-leakage problems

    Energy Technology Data Exchange (ETDEWEB)

    Hoogenboom, J.E. [Delft Univ. of Technology (Netherlands)

    2005-07-01

    Path length stretching (or exponential biasing) is a well known variance reduction technique in Monte Carlo calculations. It can especially be useful in shielding problems where particles have to penetrate a lot of material before being tallied. Several authors sought for optimization of the path length stretching parameter for detection of the leakage of neutrons from a slab. Here the adjoint function behaves as a single exponential function and can well be used to determine the stretching parameter. In this paper optimization is sought for a detector embedded in the system, which changes the adjoint function in the detector drastically. From literature it is known that the combination of path length stretching and angular biasing can result in appreciable variance reduction. However, angular biasing is not generally available in general purpose Monte Carlo codes and therefore we want to restrict ourselves to the application of pure path length stretching and finding optimum parameters for that. Nonetheless, the starting point for our research is the zero-variance scheme. In order to study the solution in detail the simplified monoenergetic two-direction model is adopted, which allows analytical solutions and can still be used in a Monte Carlo simulation. Knowing the zero-variance solution analytically, it is shown how optimum path length stretching parameters can be derived from it. It results in path length shrinking in the detector. Results for the variance in the detector response are shown in comparison with other patterns for the stretching parameter. The effect of anisotropic scattering on the path length stretching parameter is taken into account. (author)

  13. Energy audit and energy security

    Directory of Open Access Journals (Sweden)

    Beata Agnieszka Kulessa

    2013-07-01

    Full Text Available In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency in construction and environmental protection.

  14. Straight Gods, White Devils: Exploring Paths to Non-Religion in the Lives of Black LGBTQ People

    OpenAIRE

    Kolysh, Simone

    2017-01-01

    To examine paths to non-religion in the lives of black LGBTQ people, I analyze 10 interviews of black LGBTQ people who were raised Christian. Utilizing an intersectional lens, I conclude that lessons of the Christian home, reinforced in religious school and at church, drew a connection between Christianity, one’s racial and ethnic identity, and heterosexuality in such a way that being LGBTQ was marked un-Christian and foreign, and sometimes associated with whiteness. This further shaped how m...

  15. Problems And Prospects Of The European Regional Order

    Directory of Open Access Journals (Sweden)

    L. A. Dymova

    2017-01-01

    Full Text Available For the last few decades, the system of international relations continues to change. One of the key components of the emerging international order is the European regional order, which currently goes through deep transformations associated with changes of the international system and structural reconstruction of the European communities. The formation of the European regional system is a complex international political process, which is based on various political, social, economic, cultural, historical and other factors. Since the end of the World war II the European Union constitutes a political and institutional basis of relations both between member states and with the rest of the world. However, today the European Union runs through a systemic crisis embodied by ongoing economic and financial downturn as well as a crisis of socio-political structures and models of governance that now threaten the existence of the Union itself. Institutional problems are aggravated against the background of crises in highly sensitive areas such as economy and security, as well as uncertainties in the external international environment. All these factors undermine the ability of the EU to play a decisive role in building a European regional order. The emphasis is shifting towards particular countries, with the greater potential in shaping the international agenda and giving an effective response to modern challenges and threats. Building a stable architecture of the European security system is one of the essential conditions of the European regional order, however contradicting approaches of the parties acknowledge that political and ideological barriers between the East and the West continue to exist. In the context of increasing security threats transatlantic partnership does not lose the relevance though the tough course of the US and its desire to reinforce its leadership in Europe often meets the extreme disapproval on the part of the Europeans. Russian

  16. Oil dependence. Myths and realities of a strategic stake

    International Nuclear Information System (INIS)

    Chaliand, G.; Jafalian, A.

    2005-04-01

    Using a series of regional studies, this collective book proposes to evaluate the strategic dimensions of the oil dependence and to determine its geopolitical impacts in the Middle East, Russia, China, USA and Europe. Content: the oil stakes at the beginning of the 21. century; in the center of the oil scene: the Middle East; oil dependence and US foreign policy: beyond myths; the Russian oil, instrument of influence and of alliances re-knitting; China and oil: security feelings and strategic approach; towards a European supply strategy; beyond petroleum: what alternatives; 150 years of petroleum history; the energy dependence; energy economy; automotive fuels and pollution abatement; limitation of greenhouse gas emissions; glossary; bibliography; index; Web links. (J.S.)

  17. Coarse-grained representation of the quasi adiabatic propagator path integral for the treatment of non-Markovian long-time bath memory

    Science.gov (United States)

    Richter, Martin; Fingerhut, Benjamin P.

    2017-06-01

    The description of non-Markovian effects imposed by low frequency bath modes poses a persistent challenge for path integral based approaches like the iterative quasi-adiabatic propagator path integral (iQUAPI) method. We present a novel approximate method, termed mask assisted coarse graining of influence coefficients (MACGIC)-iQUAPI, that offers appealing computational savings due to substantial reduction of considered path segments for propagation. The method relies on an efficient path segment merging procedure via an intermediate coarse grained representation of Feynman-Vernon influence coefficients that exploits physical properties of system decoherence. The MACGIC-iQUAPI method allows us to access the regime of biological significant long-time bath memory on the order of hundred propagation time steps while retaining convergence to iQUAPI results. Numerical performance is demonstrated for a set of benchmark problems that cover bath assisted long range electron transfer, the transition from coherent to incoherent dynamics in a prototypical molecular dimer and excitation energy transfer in a 24-state model of the Fenna-Matthews-Olson trimer complex where in all cases excellent agreement with numerically exact reference data is obtained.

  18. Energy policy of the EU and the role of Turkey in Energy Supply Security

    Directory of Open Access Journals (Sweden)

    MEHTER AYKIN Sibel

    2018-01-01

    Full Text Available All the nations define strategies and develop policies on national and international levels to eliminate risks against energy security. The aim of this paper is to define the energy policy of the European Union and identify the potential of Turkey in securing energy supply to the European Union. To achieve this end, after explaining the policy frame of the European Union and that of Turkey in energy related matters, the existing and planned energy routes expanding from the Russian Federation, Caspian Sea and the Middle East to the European Continent are mapped, and the role assigned to Turkey as an energy hub is exemplified with reference to its accession process. It is concluded that Turkey’s membership is to enrich the European Union and contribute to its energy supply security.

  19. revisiting the soft security debate: from european progress to african ...

    African Journals Online (AJOL)

    Administrator

    implicit realisation of the importance of soft security threats increasingly ..... security is strong and quite advanced, but as surmised by Pratl (2001:34) hard .... inherently contains difficulties, its utility is eroded and disputed by the persistent.

  20. Implementation of effective cigarette health warning labels among low and middle income countries: state capacity, path-dependency and tobacco industry activity.

    Science.gov (United States)

    Hiilamo, Heikki; Glantz, Stanton A

    2015-01-01

    We investigates the effects of ratifying the WHO Framework Convention of Tobacco Control (FTCT), state capacity, path-dependency and tobacco industry activity on the implementation of effective health warning labels (HWL) on cigarette packs among low and middle income countries (LMIC). Using logistic regression in separate analyses for FCTC Article 11 compliant HWLs and graphic HWLs (GHWL), we found that the odds of FCTC compliance increased by a factor of 1.31 for each year after FCTC entered into force in the country (p health regulations require investments in broader state capacity. As the theory of path-dependency predicts voluntary agreements have long lasting influence on the direction of tobacco control in a country. Adopting voluntary HWL policies reduced likelihood of having FCTC compliant HWLs decades later. The fact that voluntary agreements delayed effective tobacco regulations suggests that policymakers must be careful of accepting industry efforts for voluntary agreements in other areas of public health as well, such as alcohol and junk food. Copyright © 2014 Elsevier Ltd. All rights reserved.