WorldWideScience

Sample records for on-line dynamic security

  1. On-line Dynamic Security Assessment in Power Systems

    DEFF Research Database (Denmark)

    Weckesser, Johannes Tilman Gabriel

    and solar radiation. Moreover, ongoing research suggests that demand response will be introduced to maintain power balance between generation and consumption at all times. Due to these changes the operating point of the power system will be less predictable and today’s stability and security assessment...... for early prediction of critical voltage sags is described. The method’s performance is compared to other prediction approaches. The results show that the proposed method succeeds in early, accurately and consistently predicting critically low voltage sags. An efficient on-line DSA not only identifies...

  2. Transmission Line Security Monitor: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    John Svoboda

    2011-04-01

    The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.

  3. Perceptions Towards On-line Banking Security: An Empirical Investigation of a Developing Country`s Banking Sector, how secure is On-line Banking

    OpenAIRE

    Bongani Ngwenya; Khanyisa Malufu

    2012-01-01

    The increase in computer crime has led to scepticism about themove made by the banks to introduce on-line banking. Someview this as a noble move which has made the banking systemmore efficient, reliable and secure, while others view it as arisky and insecure way of banking. The aim of this study wasto assess whether on-line banking in the developing countriesis secure or not. The researcher chose a descriptive-quantitativeresearch design. Data was collected using a self constructedquestionnai...

  4. Dynamic reconfiguration of security policies in wireless sensor networks.

    Science.gov (United States)

    Pinto, Mónica; Gámez, Nadia; Fuentes, Lidia; Amor, Mercedes; Horcas, José Miguel; Ayala, Inmaculada

    2015-03-04

    Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs) allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies) and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs).We evaluate our approach using a case study from the intelligent transportation system domain.

  5. Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mónica Pinto

    2015-03-01

    Full Text Available Providing security and privacy to wireless sensor nodes (WSNs is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs.We evaluate our approach using a case study from the intelligent transportation system domain.

  6. Security Requirements Management in Software Product Line Engineering

    Science.gov (United States)

    Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario

    Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.

  7. Efficient and Secure Comparison for On-Line Auctions

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Krøigaard, Mikkel; Geisler, Martin Joakim

    2007-01-01

    We propose a protocol for secure comparison of integers based on homomorphic encryption. We also propose a homomorphic encryption scheme that can be used in our protocol and makes it more efficient than previous solutions. Our protocol is well-suited for application in on-line auctions, both...... with respect to functionality and performance. It minimizes the amount of information bidders need to send, and for comparison of 16 bit numbers with security based on 1024 bit RSA (executed by two parties), our implementation takes 0.28 seconds including all computation and communication. Using precomputation...

  8. On enabling secure applications through off-line biometric identification

    Energy Technology Data Exchange (ETDEWEB)

    Davida, G.I. [Univ. of Wisconsin, Milwaukee, WI (United States); Frankel, Y. [CertCo LLC, New York, NY (United States); Matt, B.J. [Sandia National Labs., Albuquerque, NM (United States)

    1998-04-01

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.

  9. On enabling secure applications through off-line biometric identification

    International Nuclear Information System (INIS)

    Davida, G.I.; Frankel, Y.; Matt, B.J.

    1998-04-01

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user's biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user's private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user's biometrics to facilitate cryptographic mechanisms

  10. Efficient and secure comparison for on-line auctions

    NARCIS (Netherlands)

    Damgard, Ivan; Geisler, M.; Kroigaard, M.; Pieprzyk, J.; Ghodosi, H.; Dawson, E.

    2007-01-01

    We propose a protocol for secure comparison of integers based on homomorphic encryption. We also propose a homomorphic encryption scheme that can be used in our protocol and makes it more efficient than previous solutions. Our protocol is well-suited for application in on-line auctions, both with

  11. Security Analysis of Dynamic SDN Architectures Based on Game Theory

    Directory of Open Access Journals (Sweden)

    Chao Qi

    2018-01-01

    Full Text Available Security evaluation of SDN architectures is of critical importance to develop robust systems and address attacks. Focused on a novel-proposed dynamic SDN framework, a game-theoretic model is presented to analyze its security performance. This model can represent several kinds of players’ information, simulate approximate attack scenarios, and quantitatively estimate systems’ reliability. And we explore several typical game instances defined by system’s capability, players’ objects, and strategies. Experimental results illustrate that the system’s detection capability is not a decisive element to security enhancement as introduction of dynamism and redundancy into SDN can significantly improve security gain and compensate for its detection weakness. Moreover, we observe a range of common strategic actions across environmental conditions. And analysis reveals diverse defense mechanisms adopted in dynamic systems have different effect on security improvement. Besides, the existence of equilibrium in particular situations further proves the novel structure’s feasibility, flexibility, and its persistent ability against long-term attacks.

  12. Dynamic secrets in communication security

    CERN Document Server

    Xiao, Sheng; Towsley, Donald

    2013-01-01

    Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. 'Dynamic Secrets in Communication Security' presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic

  13. Your employees: the front line in cyber security

    OpenAIRE

    Ashenden, D

    2016-01-01

    First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/)

  14. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  15. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  16. Application of learning from examples methods for on-line dynamic security assessment of electric power systems - state of the art

    Energy Technology Data Exchange (ETDEWEB)

    Pecas Lopes, J.A. [Universidade do Porto, Porto (Portugal). Faculdade de Engenharia] Hatziargyriou, Nikos D. [National Technical University of Athens, Athens (Greece)

    1994-12-31

    This paper provides an overview of the application of `learning from examples` techniques like pattern recognition, artificial neural networks and decision trees, when used for fast dynamic security assessment. Problems concerning the system security evaluation relatively to transient stability and voltage stability are addressed with more details and references to research works in this field are briefly described. (author) 44 refs., 3 tabs.

  17. Dynamic model based on Bayesian method for energy security assessment

    International Nuclear Information System (INIS)

    Augutis, Juozas; Krikštolaitis, Ričardas; Pečiulytė, Sigita; Žutautaitė, Inga

    2015-01-01

    Highlights: • Methodology for dynamic indicator model construction and forecasting of indicators. • Application of dynamic indicator model for energy system development scenarios. • Expert judgement involvement using Bayesian method. - Abstract: The methodology for the dynamic indicator model construction and forecasting of indicators for the assessment of energy security level is presented in this article. An indicator is a special index, which provides numerical values to important factors for the investigated area. In real life, models of different processes take into account various factors that are time-dependent and dependent on each other. Thus, it is advisable to construct a dynamic model in order to describe these dependences. The energy security indicators are used as factors in the dynamic model. Usually, the values of indicators are obtained from statistical data. The developed dynamic model enables to forecast indicators’ variation taking into account changes in system configuration. The energy system development is usually based on a new object construction. Since the parameters of changes of the new system are not exactly known, information about their influences on indicators could not be involved in the model by deterministic methods. Thus, dynamic indicators’ model based on historical data is adjusted by probabilistic model with the influence of new factors on indicators using the Bayesian method

  18. An Encryption Key for Secure Authentication: The Dynamic Solution

    Directory of Open Access Journals (Sweden)

    Zubayr Khalid

    2017-06-01

    Full Text Available In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in type. Dynamic authentication protocol is still a theoretical concept. In this paper, we are focusing on a concept of authentication technique which is actually dynamic in genre, i.e. the password here will change in t time (where t is as small as possible. This technique comprises of both hardware and software part. In this paper, we have covered the idea of generating an efficient algorithm that can work as the final in the Dynamic Password Authentication system. We have used standard deviation within statistics to generalize the possible password which is further secured by Feistel Block Cipher and Advanced Encryption Standard technique (AES, leading and following the said mathematics respectively. In order to allow the system to create variable password in the least time interval possible, we must make sure our process is not much complex.

  19. Impacts of Base-Case and Post-Contingency Constraint Relaxations on Static and Dynamic Operational Security

    Science.gov (United States)

    Salloum, Ahmed

    Constraint relaxation by definition means that certain security, operational, or financial constraints are allowed to be violated in the energy market model for a predetermined penalty price. System operators utilize this mechanism in an effort to impose a price-cap on shadow prices throughout the market. In addition, constraint relaxations can serve as corrective approximations that help in reducing the occurrence of infeasible or extreme solutions in the day-ahead markets. This work aims to capture the impact constraint relaxations have on system operational security. Moreover, this analysis also provides a better understanding of the correlation between DC market models and AC real-time systems and analyzes how relaxations in market models propagate to real-time systems. This information can be used not only to assess the criticality of constraint relaxations, but also as a basis for determining penalty prices more accurately. Constraint relaxations practice was replicated in this work using a test case and a real-life large-scale system, while capturing both energy market aspects and AC real-time system performance. System performance investigation included static and dynamic security analysis for base-case and post-contingency operating conditions. PJM peak hour loads were dynamically modeled in order to capture delayed voltage recovery and sustained depressed voltage profiles as a result of reactive power deficiency caused by constraint relaxations. Moreover, impacts of constraint relaxations on operational system security were investigated when risk based penalty prices are used. Transmission lines in the PJM system were categorized according to their risk index and each category was as-signed a different penalty price accordingly in order to avoid real-time overloads on high risk lines. This work also extends the investigation of constraint relaxations to post-contingency relaxations, where emergency limits are allowed to be relaxed in energy market models

  20. Dynamic Line Rating - Technologies and Challenges of PMU on Overhead Lines

    DEFF Research Database (Denmark)

    Alvarez, David; Rosero, Javier; Silva, Filipe Miguel Faria da

    2016-01-01

    for line rating computation and monitoring are identified, these are: sensors, communications, management information system and information analysis tools, which are part of integral dynamic line rating systems. Finally, the benefits and challenges of using phasor measurement units for real time capacity...

  1. A coherency-based method to increase dynamic security in power systems

    Energy Technology Data Exchange (ETDEWEB)

    De Tuglie, E. [Dipartimento di Ingegneria dell' Ambiente e per lo Sviluppo Sostenibile - DIASS, Politecnico di Bari, Viale del Turismo 8, 74100 Taranto (Italy); Iannone, S.M.; Torelli, F. [Dipartimento di Elettrotecnica ed Elettronica - DEE, Politecnico di Bari, Via Re David 200, 70125 Bari (Italy)

    2008-08-15

    Dynamic security analysis is the evaluation of the ability of a system to withstand contingencies by surviving transient conditions to acceptable steady-state operative states. When potential instability due to contingency is detected, preventive action may be desired to improve the system security. This is very important in the on-line operation of a power system, especially when the system is stability-limited. The method proposed in this paper is based on the idea that increasing coherency between generators in the transient behaviour following a system perturbation gives rise to a more stable system. In this paper, we suggest the use of the ''input-output feedback-linearization'' with a reference trajectory obtained using a system dynamic equivalent based on the centre of inertia. To quantify coherency levels a new coherency indicator has been assumed for the given reference trajectory. The result is an increasing level in coherency, critical clearing time and system stability. The method is tested on the IEEE 30 bus test system. (author)

  2. Dynamic Line Rating Oncor Electric Delivery Smart Grid Program

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Justin; Smith, Cale; Young, Mike; Donohoo, Ken; Owen, Ross; Clark, Eddit; Espejo, Raul; Aivaliotis, Sandy; Stelmak, Ron; Mohr, Ron; Barba, Cristian; Gonzalez, Guillermo; Malkin, Stuart; Dimitrova, Vessela; Ragsdale, Gary; Mitchem, Sean; Jeirath, Nakul; Loomis, Joe; Trevino, Gerardo; Syracuse, Steve; Hurst, Neil; Mereness, Matt; Johnson, Chad; Bivens, Carrie

    2013-05-04

    Electric transmission lines are the lifeline of the electric utility industry, delivering its product from source to consumer. This critical infrastructure is often constrained such that there is inadequate capacity on existing transmission lines to efficiently deliver the power to meet demand in certain areas or to transport energy from high-generation areas to high-consumption regions. When this happens, the cost of the energy rises; more costly sources of power are used to meet the demand or the system operates less reliably. These economic impacts are known as congestion, and they can amount to substantial dollars for any time frame of reference: hour, day or year. There are several solutions to the transmission constraint problem, including: construction of new generation, construction of new transmission facilities, rebuilding and reconductoring of existing transmission assets, and Dynamic Line Rating (DLR). All of these options except DLR are capital intensive, have long lead times and often experience strong public and regulatory opposition. The Smart Grid Demonstration Program (SGDP) project co-funded by the Department of Energy (DOE) and Oncor Electric Delivery Company developed and deployed the most extensive and advanced DLR installation to demonstrate that DLR technology is capable of resolving many transmission capacity constraint problems with a system that is reliable, safe and very cost competitive. The SGDP DLR deployment is the first application of DLR technology to feed transmission line real-time dynamic ratings directly into the system operation’s State Estimator and load dispatch program, which optimizes the matching of generation with load demand on a security, reliability and economic basis. The integrated Dynamic Line Rating (iDLR)1 collects transmission line parameters at remote locations on the lines, calculates the real-time line rating based on the equivalent conductor temperature, ambient temperature and influence of wind and solar

  3. Safeguards and security benefits of project straight-line

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Waddoups, I.G.

    1995-01-01

    As a result of a number of events the inventory of fissile materials no longer in nuclear weapons in the United States is increasing. This has led to a growing concern regarding the potential for theft and/or diversion and accountability of this material. Straight-Line is a project whose purpose is to demonstrate a site-independent system to monitor stored nuclear material (e.g. plutonium) and integrate the collection, processing and dissemination of information regarding this material. Safeguards and security (S ampersand S) goals of this project include data transfer of information on nuclear material to appropriate users to enhance S ampersand S, continuous on-line accountability, reduction of hands-on access to nuclear materials, incorporation of information security technologies, and early detection of tampering or unauthorized material movement. This paper addresses threat considerations, S ampersand S requirements, S ampersand S objectives, and issues for the Straight-Line project. S ampersand S features and benefits of this project are discussed with respect to existing item monitoring systems and/or other material tracking systems being developed

  4. Dynamic Security Assessment of Danish Power System Based on Decision Trees: Today and Tomorrow

    DEFF Research Database (Denmark)

    Rather, Zakir Hussain; Liu, Leo; Chen, Zhe

    2013-01-01

    The research work presented in this paper analyzes the impact of wind energy, phasing out of central power plants and cross border power exchange on dynamic security of Danish Power System. Contingency based decision tree (DT) approach is used to assess the dynamic security of present and future...

  5. On-line supercapacitor dynamic models for energy conversion and management

    International Nuclear Information System (INIS)

    Wu, C.H.; Hung, Y.H.; Hong, C.W.

    2012-01-01

    Highlights: ► On-line supercapacitor dynamic models are derived from time and frequency domains. ► Equivalent circuits with an ANN identifier are derived for nonlinear effects. ► Nonlinear effects include environmental temperature and operating voltage. ► Supercapacitor models can achieve both system fidelity and computation efficiency. - Abstract: This paper develops on-line nonlinear dynamic models of electrochemical supercapacitors which are for energy conversion and management. Based on the theory of electrochemical impedance spectroscopy, extensive alternative current impedance tests have been conducted to investigate the frequency-domain dynamics of these supercapacitors. A Nyquist diagram is plotted to help establish an equivalent electric circuit, which is regarded as the first-phase linear model. Two performance-influencing factors, environmental temperature and operating voltage, are considered as nonlinear effects. The nonlinear relationships among parameters of the capacitances and resistances in the first-phase model are established by a multi-layer artificial neural network. The neural parameters are trained using a back-propagation algorithm by feeding the experimental data bank. Combining the first-phase model and the on-line neural “parameter identifier”, the algorithm produces an on-line nonlinear dynamic model. Simulation results have proved that this proposed model is able to achieve both system fidelity and computational efficiency.

  6. Dynamics of contact line depinning during droplet evaporation based on thermodynamics.

    Science.gov (United States)

    Yu, Dong In; Kwak, Ho Jae; Doh, Seung Woo; Ahn, Ho Seon; Park, Hyun Sun; Kiyofumi, Moriyama; Kim, Moo Hwan

    2015-02-17

    For several decades, evaporation phenomena have been intensively investigated for a broad range of applications. However, the dynamics of contact line depinning during droplet evaporation has only been inductively inferred on the basis of experimental data and remains unclear. This study focuses on the dynamics of contact line depinning during droplet evaporation based on thermodynamics. Considering the decrease in the Gibbs free energy of a system with different evaporation modes, a theoretical model was developed to estimate the receding contact angle during contact line depinning as a function of surface conditions. Comparison of experimentally measured and theoretically modeled receding contact angles indicated that the dynamics of contact line depinning during droplet evaporation was caused by the most favorable thermodynamic process encountered during constant contact radius (CCR mode) and constant contact angle (CCA mode) evaporation to rapidly reach an equilibrium state during droplet evaporation.

  7. Security warning method and system for worker safety during live-line working

    Science.gov (United States)

    Jiang, Chilong; Zou, Dehua; Long, Chenhai; Yang, Miao; Zhang, Zhanlong; Mei, Daojun

    2017-09-01

    Live-line working is an essential part in the operations in an electric power system. Live-line workers are required to wear shielding clothing. Shielding clothing, however, acts as a closed environment for the human body. Working in a closed environment for a long time can change the physiological responses of the body and even endanger personal safety. According to the typical conditions of live-line working, this study synthesizes environmental factors related to shielding clothing and the physiological factors of the body to establish the heart rate variability index RMSSD and the comprehensive security warning index SWI. On the basis of both indices, this paper proposes a security warning method and system for the safety live-line workers. The system can monitor the real-time status of workers during live-line working to provide security warning and facilitate the effective safety supervision by the live operation center during actual live-line working.

  8. An adaptive cryptographic accelerator for network storage security on dynamically reconfigurable platform

    Science.gov (United States)

    Tang, Li; Liu, Jing-Ning; Feng, Dan; Tong, Wei

    2008-12-01

    Existing security solutions in network storage environment perform poorly because cryptographic operations (encryption and decryption) implemented in software can dramatically reduce system performance. In this paper we propose a cryptographic hardware accelerator on dynamically reconfigurable platform for the security of high performance network storage system. We employ a dynamic reconfigurable platform based on a FPGA to implement a PowerPCbased embedded system, which executes cryptographic algorithms. To reduce the reconfiguration latency, we apply prefetch scheduling. Moreover, the processing elements could be dynamically configured to support different cryptographic algorithms according to the request received by the accelerator. In the experiment, we have implemented AES (Rijndael) and 3DES cryptographic algorithms in the reconfigurable accelerator. Our proposed reconfigurable cryptographic accelerator could dramatically increase the performance comparing with the traditional software-based network storage systems.

  9. Influence of damage and basal friction on the grounding line dynamics

    Science.gov (United States)

    Brondex, Julien; Gagliardini, Olivier; Gillet-Chaulet, Fabien; Durand, Gael

    2016-04-01

    The understanding of grounding line dynamics is a major issue in the prediction of future sea level rise due to ice released from polar ice sheets into the ocean. This dynamics is complex and significantly affected by several physical processes not always adequately accounted for in current ice flow models. Among those processes, our study focuses on ice damage and evolving basal friction conditions. Softening of the ice due to damaging processes is known to have a strong impact on its rheology by reducing its viscosity and therefore promoting flow acceleration. Damage creates where shear stresses are high enough which is usually the case at shear margins and in the vicinity of pinning points in contact with ice-shelves. Those areas are known to have a buttressing effect on ice shelves contributing to stabilize the grounding line. We aim at evaluating the extent to which this stabilizing effect is hampered by damaging processes. Several friction laws have been proposed by various author to model the contact between grounded-ice and bedrock. Among them, Coulomb-type friction laws enable to account for reduced friction related to low effective pressure (the ice pressure minus the water pressure). Combining such a friction law to a parametrization of the effective pressure accounting for the fact that the area upstream the grounded line is connected to the ocean, is expected to have a significant impact on the grounding line dynamics. Using the finite-element code Elmer/Ice within which both the Coulomb-type friction law, the effective pressure parametrization and the damage model have been implemented, the goal of this study is to investigate the sensitivity of the grounding line dynamics to damage and to an evolving basal friction. The relative importance between those two processes on the grounding line dynamics is addressed as well.

  10. Complex networks: Dynamics and security

    Indian Academy of Sciences (India)

    This paper presents a perspective in the study of complex networks by focusing on how dynamics may affect network security under attacks. ... Department of Mathematics and Statistics, Arizona State University, Tempe, Arizona 85287, USA; Institute of Mathematics and Computer Science, University of Sao Paulo, Brazil ...

  11. Implementing Information Security and Its Technology: A LineManagement Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  12. Contact Line Dynamics

    Science.gov (United States)

    Kreiss, Gunilla; Holmgren, Hanna; Kronbichler, Martin; Ge, Anthony; Brant, Luca

    2017-11-01

    The conventional no-slip boundary condition leads to a non-integrable stress singularity at a moving contact line. This makes numerical simulations of two-phase flow challenging, especially when capillarity of the contact point is essential for the dynamics of the flow. We will describe a modeling methodology, which is suitable for numerical simulations, and present results from numerical computations. The methodology is based on combining a relation between the apparent contact angle and the contact line velocity, with the similarity solution for Stokes flow at a planar interface. The relation between angle and velocity can be determined by theoretical arguments, or from simulations using a more detailed model. In our approach we have used results from phase field simulations in a small domain, but using a molecular dynamics model should also be possible. In both cases more physics is included and the stress singularity is removed.

  13. Spatio-temporal dynamics of security investments in an interdependent risk environment

    Science.gov (United States)

    Shafi, Kamran; Bender, Axel; Zhong, Weicai; Abbass, Hussein A.

    2012-10-01

    In a globalised world where risks spread through contagion, the decision of an entity to invest in securing its premises from stochastic risks no longer depends solely on its own actions but also on the actions of other interacting entities in the system. This phenomenon is commonly seen in many domains including airline, logistics and computer security and is referred to as Interdependent Security (IDS). An IDS game models this decision problem from a game-theoretic perspective and deals with the behavioural dynamics of risk-reduction investments in such settings. This paper enhances this model and investigates the spatio-temporal aspects of the IDS games. The spatio-temporal dynamics are studied using simple replicator dynamics on a variety of network structures and for various security cost tradeoffs that lead to different Nash equilibria in an IDS game. The simulation results show that the neighbourhood configuration has a greater effect on the IDS game dynamics than network structure. An in-depth empirical analysis of game dynamics is carried out on regular graphs, which leads to the articulation of necessary and sufficient conditions for dominance in IDS games under spatial constraints.

  14. A Dynamic Framework for Water Security

    Science.gov (United States)

    Srinivasan, Veena; Konar, Megan; Sivapalan, Murugesu

    2017-04-01

    Water security is a multi-faceted problem, going beyond mere balancing of supply and demand. Conventional attempts to quantify water security starting rely on static indices at a particular place and point in time. While these are simple and scalable, they lack predictive or explanatory power. 1) Most static indices focus on specific spatial scales and largely ignore cross-scale feedbacks between human and water systems. 2) They fail to account for the increasing spatial specialization in the modern world - some regions are cities others are agricultural breadbaskets; so water security means different things in different places. Human adaptation to environmental change necessitates a dynamic view of water security. We present a framework that defines water security as an emergent outcome of a coupled socio-hydrologic system. Over the medium term (5-25 years), water security models might hold governance, culture and infrastructure constant, but allow humans to respond to changes and thus predict how water security would evolve. But over very long time-frames (25-100 years), a society's values, norms and beliefs themselves may themselves evolve; these in turn may prompt changes in policy, governance and infrastructure. Predictions of water security in the long term involve accounting for such regime shifts in the cultural and political context of a watershed by allowing the governing equations of the models to change.

  15. Design tools for complex dynamic security systems.

    Energy Technology Data Exchange (ETDEWEB)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III (.; ); Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  16. Drop evaporation and triple line dynamics

    Science.gov (United States)

    Sobac, Benjamin; Brutin, David; Gavillet, Jerome; Université de Provence Team; Cea Liten Team

    2011-03-01

    Sessile drop evaporation is a phenomenon commonly came across in nature or in industry with cooling, paintings or DNA mapping. However, the evaporation of a drop deposited on a substrate is not completely understood due to the complexity of the problem. Here we investigate, with several nano-coating of the substrate (PTFE, SiOx, SiOc and CF), the influence of the dynamic of the triple line on the evaporation process. The experiment consists in analyzing simultaneously the motion of the triple line, the kinetics of evaporation, the internal thermal motion and the heat and mass transfer. Measurements of temperature, heat-flux and visualizations with visible and infrared cameras are performed. The dynamics of the evaporative heat flux appears clearly different depending of the motion of the triple line

  17. Household Food Security Policy Analysis A System Dynamics Perspective

    Directory of Open Access Journals (Sweden)

    Isdore Paterson Guma

    2015-08-01

    Full Text Available Household food security FS is complex and requires multiple stakeholder intervention. Systemic approach aids stakeholders to understand the mechanisms and feedback between complexities in food security providing effective decision making as global resource consumption continues to grow. The study investigated food security challenges and a system dynamics model was developed for evaluating policies and intervention strategies for better livelihood at household level. Dynamic synthesis methodology questionnaires and interview guide were used to unearth food security challenges faced by households. A causal loop diagram was drawn. The model demonstrates a balance between food stock seeds preserved seeds for sale and consumption from crop harvest throughout the food cycles. This research makes contribution to the literature by evaluating dynamic synthesis methodology and FS policy discussions from a feedback point of view.

  18. Nitrogen Dynamic Study on Rice Mutant Lines Using 15N Isotope Techniques

    International Nuclear Information System (INIS)

    Ahmad Nazrul Abd Wahid; Shyful Azizi Abdul Rahman; Abdul Rahim Harun

    2015-01-01

    Malaysian Nuclear Agency in collaboration with UPM and MARDI has produced two types of rice mutant lines of MR219, viz. MR219-4 and MR219-9 developed under rice radiation mutagenenesis programme for adaptability to aerobic conditions. Aerobic cultivating is rice cultivation system on well drained soil and using minimal water input. At Malaysian Nuclear Agency, a nitrogen fertilization study in aerobic condition for the rice mutant lines was carried out in the shade house and field. The study is intended to examine and assess the dynamics of nitrogen by rice mutant lines through the different soil water management and nitrogen levels. Direct 15 N isotopic tracer method was used in this study, whereby the 15 N labeled urea fertilizer was utilized as a tracer for nitrogen nutrient uptake by the test crops. This paper is intended to highlight the progress that has been made in the study of the nitrogen dynamics on MR219-4 and MR219-9 rice mutant lines. (author)

  19. Secure Group Communications for Large Dynamic Multicast Group

    Institute of Scientific and Technical Information of China (English)

    Liu Jing; Zhou Mingtian

    2003-01-01

    As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dynamic multicast group have been researched and a solution based on SubGroup Secure Controllers (SGSCs) is presented, which solves many problems in IOLUS system and WGL scheme.

  20. Impact of different disassembly line balancing algorithms on the performance of dynamic kanban system for disassembly line

    Science.gov (United States)

    Kizilkaya, Elif A.; Gupta, Surendra M.

    2005-11-01

    In this paper, we compare the impact of different disassembly line balancing (DLB) algorithms on the performance of our recently introduced Dynamic Kanban System for Disassembly Line (DKSDL) to accommodate the vagaries of uncertainties associated with disassembly and remanufacturing processing. We consider a case study to illustrate the impact of various DLB algorithms on the DKSDL. The approach to the solution, scenario settings, results and the discussions of the results are included.

  1. Start up testing for the secure automated fabrication line

    International Nuclear Information System (INIS)

    Gerber, E.W.; Benson, E.M.; Dahl, R.E.

    1987-01-01

    The secure automated fabrication (SAF) line is a remotely operated, liquid metal reactor fuel fabrication process being built by Westinghouse Hanford Company for the Department of Energy. All process and control equipment is installed and start up testing has been initiated. Start up testing is comprised of five phases, each incorporating higher degrees of equipment integration, automation, and remote control. Testing methodology for SAF line start up is described in this report

  2. Analysing Password Protocol Security Against Off-line Dictionary Attacks

    NARCIS (Netherlands)

    Corin, R.J.; Doumen, J.M.; Etalle, Sandro; Busi, Nadia; Gorrieri, Roberto; Martinelli, Fabio

    We study the security of password protocols against off-line dictionary attacks. In addition to the standard adversary abilities, we also consider further cryptographic advantages given to the adversary when considering the password protocol being instantiated with particular encryption schemes. We

  3. Transmission Line Ampacity Improvements of AltaLink Wind Plant Overhead Tie-Lines Using Weather-Based Dynamic Line Rating

    Energy Technology Data Exchange (ETDEWEB)

    Bhattarai, Bishnu P.; Gentle, Jake P.; Hill, Porter; McJunkin, Tim; Myers, Kurt S.; Abbound, Alex; Renwick, Rodger; Hengst, David

    2017-07-01

    Abstract—Overhead transmission lines (TLs) are conventionally given seasonal ratings based on conservative environmental assumptions. Such an approach often results in underutilization of the line ampacity as the worst conditions prevail only for a short period over a year/season. We presents dynamic line rating (DLR) as an enabling smart grid technology that adaptively computes ratings of TLs based on local weather conditions to utilize additional headroom of existing lines. In particular, general line ampacity state solver utilizes measured weather data for computing the real-time thermal rating of the TLs. The performance of the presented method is demonstrated from a field study of DLR technology implementation on four TL segments at AltaLink, Canada. The performance is evaluated and quantified by comparing the existing static and proposed dynamic line ratings, and the potential benefits of DLR for enhanced transmission assets utilization. For the given line segments, the proposed DLR results in real-time ratings above the seasonal static ratings for most of the time; up to 95.1% of the time, with a mean increase of 72% over static rating.

  4. Secure physical layer using dynamic permutations in cognitive OFDMA systems

    DEFF Research Database (Denmark)

    Meucci, F.; Wardana, Satya Ardhy; Prasad, Neeli R.

    2009-01-01

    This paper proposes a novel lightweight mechanism for a secure Physical (PHY) layer in Cognitive Radio Network (CRN) using Orthogonal Frequency Division Multiplexing (OFDM). User's data symbols are mapped over the physical subcarriers with a permutation formula. The PHY layer is secured...... with a random and dynamic subcarrier permutation which is based on a single pre-shared information and depends on Dynamic Spectrum Access (DSA). The dynamic subcarrier permutation is varying over time, geographical location and environment status, resulting in a very robust protection that ensures...... confidentiality. The method is shown to be effective also for existing non-cognitive systems. The proposed mechanism is effective against eavesdropping even if the eavesdropper adopts a long-time patterns analysis, thus protecting cryptography techniques of higher layers. The correlation properties...

  5. Security infrastructure for dynamically provisioned cloud infrastructure services

    NARCIS (Netherlands)

    Demchenko, Y.; Ngo, C.; de Laat, C.; Lopez, D.R.; Morales, A.; García-Espín, J.A.; Pearson, S.; Yee, G.

    2013-01-01

    This chapter discusses conceptual issues, basic requirements and practical suggestions for designing dynamically configured security infrastructure provisioned on demand as part of the cloud-based infrastructure. This chapter describes general use cases for provisioning cloud infrastructure services

  6. Dynamic Security Assessment of Western Danish Power System Based on Ensemble Decision Trees

    DEFF Research Database (Denmark)

    Liu, Leo; Bak, Claus Leth; Chen, Zhe

    2014-01-01

    With the increasing penetration of renewable energy resources and other forms of dispersed generation, more and more uncertainties will be brought to the dynamic security assessment (DSA) of power systems. This paper proposes an approach that uses ensemble decision trees (EDT) for online DSA. Fed...... with online wide-area measurement data, it is capable of not only predicting the security states of current operating conditions (OC) with high accuracy, but also indicating the confidence of the security states 1 minute ahead of the real time by an outlier identification method. The results of EDT together...

  7. Asynchronous anti-noise hyper chaotic secure communication system based on dynamic delay and state variables switching

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Hongjun [Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024 (China); Weifang Vocational College, Weifang 261041 (China); Wang, Xingyuan, E-mail: wangxy@dlut.edu.cn [Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024 (China); Zhu, Quanlong [Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024 (China)

    2011-07-18

    This Letter designs an asynchronous hyper chaotic secure communication system, which possesses high stability against noise, using dynamic delay and state variables switching to ensure the high security. The relationship between the bit error ratio (BER) and the signal-to-noise ratio (SNR) is analyzed by simulation tests, the results show that the BER can be ensured to reach zero by proportionally adjusting the amplitudes of the state variables and the noise figure. The modules of the transmitter and receiver are implemented, and numerical simulations demonstrate the effectiveness of the system. -- Highlights: → Asynchronous anti-noise hyper chaotic secure communication system. → Dynamic delay and state switching to ensure the high security. → BER can reach zero by adjusting the amplitudes of state variables and noise figure.

  8. MANAGEMENT OF RESOURCES IN DYNAMICALLY CHANGING SECURITY ENVRIONMENT

    Directory of Open Access Journals (Sweden)

    Sevdalina Dimitrova

    2014-09-01

    Full Text Available The monograph recommends integration between science and practice, experts from national bodies and scientific research potential of academic community of military universities in the field of management of resources of security and defence in accordance to the challenges in security environment caused by its dynamic and often unpredictable changes.

  9. A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system

    Directory of Open Access Journals (Sweden)

    Vanga Odelu

    2016-01-01

    Full Text Available With the rapid growth of the Internet, a lot of electronic patient records (EPRs have been developed for e-medicine systems. The security and privacy issues of EPRs are important for the patients in order to understand how the hospitals control the use of their personal information, such as name, address, e-mail, medical records, etc. of a particular patient. Recently, Lee et al. proposed a simple group password-based authenticated key agreement protocol for the integrated EPR information system (SGPAKE. However, in this paper, we show that Lee et al.’s protocol is vulnerable to the off-line weak password guessing attack and as a result, their scheme does not provide users’ privacy. To withstand this security weakness found in Lee et al.’s scheme, we aim to propose an effective dynamic group password-based authenticated key exchange scheme for the integrated EPR information system, which retains the original merits of Lee et al.’s scheme. Through the informal and formal security analysis, we show that our scheme provides users’ privacy, perfect forward security and known-key security, and also protects online and offline password guessing attacks. Furthermore, our scheme efficiently supports the dynamic group password-based authenticated key agreement for the integrated EPR information system. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool and show that our scheme is secure against passive and active attacks.

  10. Start up testing for the secure automated fabrication line

    International Nuclear Information System (INIS)

    Gerber, E.W.; Benson, E.M.; Dahl, R.E.

    1986-01-01

    The Secure Automated Fabrication (SAF) Line has been designed and built by Westinghouse Hanford Company for the Department of Energy at the Hanford Site near Richland, Washington. The SAF Line will provide the capability for remote manufacture of fuel for Liquid Metal Reactors, and will supply fuel for the Fast Flux Test Facility (FFTF). The SAF process is highly automated and represents a major advancement in nuclear fuel manufacturing, offering significant improvements in product quality, productivity, safety, and accountability of Special Nuclear Materials. The construction phase of the project is complete, and testing has been initiated to accomplish start up of the plant for manufacture of FFTF fuel. This paper describes the test methodology used for SAF Line start up

  11. An energy security management model using quality function deployment and system dynamics

    International Nuclear Information System (INIS)

    Shin, Juneseuk; Shin, Wan-Seon; Lee, Changyong

    2013-01-01

    An energy security management model using quality function deployment (QFD) and system dynamics (SD) is suggested for application in public policymaking in developing economies. Through QFD, experts are guided toward identifying key energy security components, including indicators and policies, and in making these components consistent, focused, and customized for a particular country. Using these components as inputs, we construct an intermediate complex system dynamics model with a minimal number of crucial interactions. Key policies are simulated and evaluated in terms of the improvement of key indicators. Even with little data, our approach provides a coherent, useful, and customized energy security management model to help policymakers more effectively manage national energy security. To demonstrate its advantages, the model is applied to the Korean gas sector as an example. - Highlights: ► We suggest an energy security management model for developing economies. ► We identify a consistent set of key components, indicators and policies by using QFD. ► A coherent and practical system dynamics model based on QFD's output is constructed. ► The model is applied to the Korean gas sector as an example

  12. Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines.

    Science.gov (United States)

    Mazur, Katarzyna; Wydra, Michal; Ksiezopolski, Bogdan

    2017-07-11

    Existing transmission power grids suffer from high maintenance costs and scalability issues along with a lack of effective and secure system monitoring. To address these problems, we propose to use Wireless Sensor Networks (WSNs) as a technology to achieve energy efficient, reliable, and low-cost remote monitoring of transmission grids. With WSNs, smart grid enables both utilities and customers to monitor, predict and manage energy usage effectively and react to possible power grid disturbances in a timely manner. However, the increased application of WSNs also introduces new security challenges, especially related to privacy, connectivity, and security management, repeatedly causing unpredicted expenditures. Monitoring the status of the power system, a large amount of sensors generates massive amount of sensitive data. In order to build an effective Wireless Sensor Network (WSN) for a smart grid, we focus on designing a methodology of efficient and secure delivery of the data measured on transmission lines. We perform a set of simulations, in which we examine different routing algorithms, security mechanisms and WSN deployments in order to select the parameters that will not affect the delivery time but fulfill their role and ensure security at the same time. Furthermore, we analyze the optimal placement of direct wireless links, aiming at minimizing time delays, balancing network performance and decreasing deployment costs.

  13. From Off-line to On-line Handwriting Recognition

    NARCIS (Netherlands)

    Lallican, P.; Viard-Gaudin, C.; Knerr, S.

    2004-01-01

    On-line handwriting includes more information on time order of the writing signal and on the dynamics of the writing process than off-line handwriting. Therefore, on-line recognition systems achieve higher recognition rates. This can be concluded from results reported in the literature, and has been

  14. Development and Evaluation of an On-Line Educational Module for Volunteer Leaders on Bio-Security in Washington State 4-H Livestock Projects

    Science.gov (United States)

    Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat

    2011-01-01

    An on-line module on disease prevention was created for 4-H volunteer leaders who work with livestock projects in Washington to better prepare them to teach youth about bio-security and its importance in 4-H livestock projects. Evaluation of the module and usage statistics since the module's debut were collected and evaluated. The module increases…

  15. Sample handling and transport for the Secure Automated Fabrication line

    International Nuclear Information System (INIS)

    Sherrell, D.L.; Jensen, J.D.; Genoway, G.G.; Togesen, H.J.

    1983-06-01

    A totally automated system is described which packages, transports, receives, and unpackages sintered plutonium/uranium oxide fuel pellet samples to support automated chemical analysis equipment for the Secure Automated Fabrication (SAF) line. Samples are transferred 100 meters from the fuel production line to a different floor of the facility where automatic determinations are made for purposes of process control and fuel quality certification. The system automatically records identification numbers, net weights sent and received, and all other pertinent information such as fuel lot number, sample point, date, and time of day

  16. On the security flaws in ID-based password authentication schemes for telecare medical information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-01-01

    Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.

  17. Integrating Future Land Use Scenarios to Evaluate the Spatio-Temporal Dynamics of Landscape Ecological Security

    Directory of Open Access Journals (Sweden)

    Yi Lu

    2016-11-01

    Full Text Available Urban ecological security is the basic principle of national ecological security. However, analyses of the spatial and temporal dynamics of ecological security remain limited, especially those that consider different scenarios of urban development. In this study, an integrated method is proposed that combines the Conversion of Land Use and its Effects (CLUE-S model with the Pressure–State–Response (P-S-R framework to assess landscape ecological security (LES in Huangshan City, China under two scenarios. Our results suggest the following conclusions: (1 the spatial and temporal dynamics of ecological security are closely related to the urbanization process; (2 although the average values of landscape ecological security are similar under different scenarios, the areas of relatively high security levels vary considerably; and (3 spatial heterogeneity in ecological security exists between different districts and counties, and the city center and its vicinity may face relatively serious declines in ecological security in the future. Overall, the proposed method not only illustrates the spatio-temporal dynamics of landscape ecological security under different scenarios but also reveals the anthropogenic effects on ecosystems by differentiating between causes, effects, and human responses at the landscape scale. This information is of great significance to decision-makers for future urban planning and management.

  18. Dynamic Response of Underground Circular Lining Tunnels Subjected to Incident P Waves

    Directory of Open Access Journals (Sweden)

    Hua Xu

    2014-01-01

    Full Text Available Dynamic stress concentration in tunnels and underground structures during earthquakes often leads to serious structural damage. A series solution of wave equation for dynamic response of underground circular lining tunnels subjected to incident plane P waves is presented by Fourier-Bessel series expansion method in this paper. The deformation and stress fields of the whole medium of surrounding rock and tunnel were obtained by solving the equations of seismic wave propagation in an elastic half space. Based on the assumption of a large circular arc, a series of solutions for dynamic stress were deduced by using a wave function expansion approach for a circular lining tunnel in an elastic half space rock medium subjected to incident plane P waves. Then, the dynamic response of the circular lining tunnel was obtained by solving a series of algebraic equations after imposing its boundary conditions for displacement and stress of the circular lining tunnel. The effects of different factors on circular lining rock tunnels, including incident frequency, incident angle, buried depth, rock conditions, and lining stiffness, were derived and several application examples are presented. The results may provide a good reference for studies on the dynamic response and aseismic design of tunnels and underground structures.

  19. Moving contact lines: linking molecular dynamics and continuum-scale modelling.

    Science.gov (United States)

    Smith, Edward R; Theodorakis, Panagiotis E; Craster, Richard V; Matar, Omar K

    2018-05-04

    Despite decades of research, the modelling of moving contact lines has remained a formidable challenge in fluid dynamics whose resolution will impact numerous industrial, biological, and daily-life applications. On the one hand, molecular dynamics (MD) simulation has the ability to provide unique insight into the microscopic details that determine the dynamic behavior of the contact line, which is not possible with either continuum-scale simulations or experiments. On the other hand, continuum-based models provide the link to the macroscopic description of the system. In this Feature Article, we explore the complex range of physical factors, including the presence of surfactants, which govern the contact line motion through MD simulations. We also discuss links between continuum- and molecular-scale modelling, and highlight the opportunities for future developments in this area.

  20. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.

    Science.gov (United States)

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-04-21

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.

  1. Form of relativistic dynamics with world lines

    International Nuclear Information System (INIS)

    Mukunda, N.; Sudarshan, E.C.G.

    1981-01-01

    In any Hamiltonian relativistic theory there are ten generators of the Poincare group which are realized canonically. The dynamical evolution is described by a Hamiltonian which is one of the ten generators in Dirac's generator formalism. The requirement that the canonical transformations reproduce the geometrical transformation of world points generates the world-line conditions. The Dirac identification of the Hamiltonian and the world-line conditions together lead to the no-interaction theorem. Interacting relativistic theories with world-line conditions should go beyond the Dirac theory and have eleven generators. In this paper we present a constraint dynamics formalism which describes an eleven-generator theory of N interacting particles using 8(N+1) variables with suitable constraints. The (N+1)th pair of four-vectors is associated with the uniform motion of a center which coincides with the center of energy for free particles. In such theories dynamics and kinematics cannot be separated out in a simple fashion

  2. Information Security Awareness On-Line Materials Design with Knowledge Maps

    Science.gov (United States)

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  3. Sensitivity of grounding line dynamics to basal conditions

    Science.gov (United States)

    Gagliardini, O.; Brondex, J.; Chauveau, G.; Gillet-chaulet, F.; Durand, G.

    2017-12-01

    In the context of a warming climate, the dynamical contribution of Antarctica to future sea level rise is still tainted by high uncertainties. Among the processes entering these uncertainties is the link between basal hydrology, friction and grounding line dynamics. Recent works have shown how sensitive is the response of the grounding line retreat to the choice of the form of the friction law. Indeed, starting from the same initial state, grounding line retreat rates can range over almost two orders of magnitude depending on the friction law formulation.Here, we use a phenomenological law that depends on the water pressure and allows a continuous transition from a Weertman-type friction at low water pressure to a Coulomb-type friction at high water pressure. This friction law depends on two main parameters that control the Weertman and Coulomb regimes. The range of values for these two parameters is only weakly physically constrained, and it can be shown that, for a given basal shear stress, different couples of parameters can conduct to the same sliding velocity. In addition, we show that close to the grounding line where basal water pressure is high, determining these two parameters might conduct to an ill-posed inverse problem with no solution.The aim of this presentation is to discuss a methodology to guide the choice of the two friction parameters and explore the sensitivity of the grounding line dynamics to this initial choice. We present results obtained both on a synthetic configuration used by the Marine Ice Sheet Model Intercomparison exercise and for the Amundsen sea sector using the experiments proposed by InitMIP-Antarctica, the first exercise in a series of ISMIP6 ice-sheet model intercomparison activities.

  4. On-line control of the nonlinear dynamics for synchrotrons

    Science.gov (United States)

    Bengtsson, J.; Martin, I. P. S.; Rowland, J. H.; Bartolini, R.

    2015-07-01

    We propose a simple approach to the on-line control of the nonlinear dynamics in storage rings, based on compensation of the nonlinear resonance driving terms using beam losses as the main indicator of the strength of a resonance. The correction scheme is built on the analysis of the resonance driving terms in first perturbative order and on the possibility of using independent power supplies in the sextupole magnets, which is nowadays present in many synchrotron light sources. Such freedom allows the definition of "smart sextupole knobs" attacking each resonance separately. The compensation scheme has been tested at the Diamond light source and proved to be effective in opening up the betatron tune space, resonance free, available to the electron beam and to improve the beam lifetime.

  5. Dynamic Model of Islamic Hybrid Securities: Empirical Evidence From Malaysia Islamic Capital Market

    Directory of Open Access Journals (Sweden)

    Jaafar Pyeman

    2016-12-01

    Full Text Available Capital structure selection is fundamentally important in corporate financial management as it influence on mutually return and risk to stakeholders. Despite of Malaysia’s position as one of the major players of Islamic Financial Market, there are still lack of studies has been conducted on the capital structure of shariah compliant firms especially related to hybrid securities. The objective of this study is to determine the hybrid securities issuance model among the shariah compliant firms in Malaysia. As such, this study is to expand the literature review by providing comprehensive analysis on the hybrid capital structure and to develop dynamic Islamic hybrid securities model for shariah compliant firms. We use panel data of 50 companies that have been issuing the hybrid securities from the year of 2004- 2012. The outcomes of the studies are based on the dynamic model GMM estimation for the determinants of hybrid securities. Based on our model, risk and growth are considered as the most determinant factors for issuing convertible bond and loan stock. These results suggest that, the firms that have high risk but having good growth prospect will choose hybrid securities of convertible bond. The model also support the backdoor equity listing hypothesis by Stein (1992 where the hybrid securities enable the profitable firms to venture into positive NPV project by issuing convertible bond as it offer lower coupon rate as compare to the normal debt rate

  6. Universality in dynamic wetting dominated by contact-line friction.

    Science.gov (United States)

    Carlson, Andreas; Bellani, Gabriele; Amberg, Gustav

    2012-04-01

    We report experiments on the rapid contact-line motion present in the early stages of capillary-driven spreading of drops on dry solid substrates. The spreading data fail to follow a conventional viscous or inertial scaling. By integrating experiments and simulations, we quantify a contact-line friction μ(f) which is seen to limit the speed of the rapid dynamic wetting. A scaling based on this contact-line friction is shown to yield a universal curve for the evolution of the contact-line radius as a function of time, for a range of fluid viscosities, drop sizes, and surface wettabilities.

  7. The dynamics of security provision in the aftermath of war : How international efforts to contribute to security in post-settlement countries relate to national and local perceptions and practices of security

    NARCIS (Netherlands)

    Willems, R.C.

    2013-01-01

    This thesis is based on field research in eastern Democratic Republic of the Congo, Burundi and South Sudan and looks at the dynamics of security provisioning in post-settlement contexts. A particular focus is on international security interventions, which are constituted by Disarmament,

  8. Comparison of Current On-line Payment Technologies

    OpenAIRE

    Mandadi, Ravi

    2006-01-01

    The purpose of this thesis work was to make a survey of current on-line payment technologies and find out which are they and how do they work? Compare and analyze them from a security point of view, as well as a usability point of view. What is good? What is bad? What is lacking? To achieve this purpose, an overview of the current on-line payment technologies was acquired through academic books and papers, Internet sites, magazines. Basic cryptographic and security related techniques were stu...

  9. On-line control of the nonlinear dynamics for synchrotrons

    Directory of Open Access Journals (Sweden)

    J. Bengtsson

    2015-07-01

    Full Text Available We propose a simple approach to the on-line control of the nonlinear dynamics in storage rings, based on compensation of the nonlinear resonance driving terms using beam losses as the main indicator of the strength of a resonance. The correction scheme is built on the analysis of the resonance driving terms in first perturbative order and on the possibility of using independent power supplies in the sextupole magnets, which is nowadays present in many synchrotron light sources. Such freedom allows the definition of “smart sextupole knobs” attacking each resonance separately. The compensation scheme has been tested at the Diamond light source and proved to be effective in opening up the betatron tune space, resonance free, available to the electron beam and to improve the beam lifetime.

  10. Analysis of dynamic accumulative damage about the lining structure of high speed railway’s tunnel based on ultrasonic testing technology

    Science.gov (United States)

    Wang, Xiang-qiu; Zhang, Huojun; Xie, Wen-xi

    2017-08-01

    Based on the similar material model test of full tunnel, the theory of elastic wave propagation and the testing technology of intelligent ultrasonic wave had been used to research the dynamic accumulative damage characteristics of tunnel’s lining structure under the dynamic loads of high speed train. For the more, the dynamic damage variable of lining structure of high speed railway’s tunnel was obtained. The results shown that the dynamic cumulative damage of lining structure increases nonlinearly with the times of cumulative vibration, the weakest part of dynamic cumulative damage is the arch foot of tunnel. Much more attention should be paid to the design and operation management of high speed railway’s tunnel.

  11. Topological dynamics of vortex-line networks in hexagonal manganites

    Science.gov (United States)

    Xue, Fei; Wang, Nan; Wang, Xueyun; Ji, Yanzhou; Cheong, Sang-Wook; Chen, Long-Qing

    2018-01-01

    The two-dimensional X Y model is the first well-studied system with topological point defects. On the other hand, although topological line defects are common in three-dimensional systems, the evolution mechanism of line defects is not fully understood. The six domains in hexagonal manganites converge to vortex lines in three dimensions. Using phase-field simulations, we predicted that during the domain coarsening process, the vortex-line network undergoes three types of basic topological changes, i.e., vortex-line loop shrinking, coalescence, and splitting. It is shown that the vortex-antivortex annihilation controls the scaling dynamics.

  12. Self-Consistent Dynamical Model of the Broad Line Region

    Energy Technology Data Exchange (ETDEWEB)

    Czerny, Bozena [Center for Theoretical Physics, Polish Academy of Sciences, Warsaw (Poland); Li, Yan-Rong [Key Laboratory for Particle Astrophysics, Institute of High Energy Physics, Chinese Academy of Sciences, Beijing (China); Sredzinska, Justyna; Hryniewicz, Krzysztof [Copernicus Astronomical Center, Polish Academy of Sciences, Warsaw (Poland); Panda, Swayam [Center for Theoretical Physics, Polish Academy of Sciences, Warsaw (Poland); Copernicus Astronomical Center, Polish Academy of Sciences, Warsaw (Poland); Wildy, Conor [Center for Theoretical Physics, Polish Academy of Sciences, Warsaw (Poland); Karas, Vladimir, E-mail: bcz@cft.edu.pl [Astronomical Institute, Czech Academy of Sciences, Prague (Czech Republic)

    2017-06-22

    We develop a self-consistent description of the Broad Line Region based on the concept of a failed wind powered by radiation pressure acting on a dusty accretion disk atmosphere in Keplerian motion. The material raised high above the disk is illuminated, dust evaporates, and the matter falls back toward the disk. This material is the source of emission lines. The model predicts the inner and outer radius of the region, the cloud dynamics under the dust radiation pressure and, subsequently, the gravitational field of the central black hole, which results in asymmetry between the rise and fall. Knowledge of the dynamics allows us to predict the shapes of the emission lines as functions of the basic parameters of an active nucleus: black hole mass, accretion rate, black hole spin (or accretion efficiency) and the viewing angle with respect to the symmetry axis. Here we show preliminary results based on analytical approximations to the cloud motion.

  13. Self-Consistent Dynamical Model of the Broad Line Region

    Directory of Open Access Journals (Sweden)

    Bozena Czerny

    2017-06-01

    Full Text Available We develop a self-consistent description of the Broad Line Region based on the concept of a failed wind powered by radiation pressure acting on a dusty accretion disk atmosphere in Keplerian motion. The material raised high above the disk is illuminated, dust evaporates, and the matter falls back toward the disk. This material is the source of emission lines. The model predicts the inner and outer radius of the region, the cloud dynamics under the dust radiation pressure and, subsequently, the gravitational field of the central black hole, which results in asymmetry between the rise and fall. Knowledge of the dynamics allows us to predict the shapes of the emission lines as functions of the basic parameters of an active nucleus: black hole mass, accretion rate, black hole spin (or accretion efficiency and the viewing angle with respect to the symmetry axis. Here we show preliminary results based on analytical approximations to the cloud motion.

  14. Dynamic Model for the Z Accelerator Vacuum Section Based on Transmission Line Code%Dynamic Model for the Z Accelerator Vacuum Section Based on Transmission Line Code

    Institute of Scientific and Technical Information of China (English)

    呼义翔; 雷天时; 吴撼宇; 郭宁; 韩娟娟; 邱爱慈; 王亮平; 黄涛; 丛培天; 张信军; 李岩; 曾正中; 孙铁平

    2011-01-01

    The transmission-line-circuit model of the Z accelerator, developed originally by W. A. STYGAR, P. A. CORCORAN, et al., is revised. The revised model uses different calculations for the electron loss and flow impedance in the magnetically insulated transmission line system of the Z accelerator before and after magnetic insulation is established. By including electron pressure and zero electric field at the cathode, a closed set of equations is obtained at each time step, and dynamic shunt resistance (used to represent any electron loss to the anode) and flow impedance are solved, which have been incorporated into the transmission line code for simulations of the vacuum section in the Z accelerator. Finally, the results are discussed in comparison with earlier findings to show the effectiveness and limitations of the model.

  15. Using VO Concept for Managing Dynamic Security Associations

    NARCIS (Netherlands)

    Demchenko, Y.; Gommans, L.; de Laat, C.T.A.M.

    2006-01-01

    This research paper presents results of the analysis how the Virtual Organisation (VO) concept can be used for managing dynamic security associations in collaborative applications and for complex resource provisioning. The paper provides an overview of the current practice in VO management at the

  16. The Dynamics of the Option-Adjusted Spread of Brady Bond Securities

    Directory of Open Access Journals (Sweden)

    Luiz Otavio Calôba

    2003-06-01

    Full Text Available Brady bond securities represent a substantial fraction of emerging markets countries internationally tradable sovereign debt. The credit risk spread above and beyond the U.S. treasury curve for these securities is usually large in size and volatility. Moreover, most Brady bonds carry embedded options that lead to the existence of an Option-Adjusted Spread, OAS, which increase their risk profiles. In this paper we present an empirical study of the dynamics of Brady bonds OAS using a heath, Jarrow and Morton term structure pricing model. The dynamics of the spread shows that the proper risk management and pricing of these securities require the consideration of volatility in addition to the magnitude of the sovereign risk spread. That is, the proper risk measure for these securities would be the pair (OAS, OAS Volatility. A study of implied default probabilities is also presented. Our analysis is illustrated with bonds from Brazil, Argentina, Mexico, Poland, Bulgaria and the Philippines.

  17. Optimal dispatch in dynamic security constrained open power market

    International Nuclear Information System (INIS)

    Singh, S.N.; David, A.K.

    2002-01-01

    Power system security is a new concern in the competitive power market operation, because the integration of the system controller and the generation owner has been broken. This paper presents an approach for dynamic security constrained optimal dispatch in restructured power market environment. The transient energy margin using transient energy function (TEF) approach has been used to calculate the stability margin of the system and a hybrid method is applied to calculate the approximate unstable equilibrium point (UEP) that is used to calculate the exact UEP and thus, the energy margin using TEF. The case study results illustrated on two systems shows that the operating mechanisms are compatible with the new business environment. (author)

  18. Analysis of Dynamic Complexity of the Cyber Security Ecosystem of Colombia

    Directory of Open Access Journals (Sweden)

    Angélica Flórez

    2016-07-01

    Full Text Available This paper presents two proposals for the analysis of the complexity of the Cyber security Ecosystem of Colombia (CEC. This analysis shows the available knowledge about entities engaged in cyber security in Colombia and the relationships between them, which allow an understanding of the synergy between the different existing components. The complexity of the CEC is detailed from the view of the Influence Diagram of System Dynamics and the Domain Diagram of Software Engineering. The resulting model makes cyber security evident as a strategic component of national security.

  19. Prediction of line failure fault based on weighted fuzzy dynamic clustering and improved relational analysis

    Science.gov (United States)

    Meng, Xiaocheng; Che, Renfei; Gao, Shi; He, Juntao

    2018-04-01

    With the advent of large data age, power system research has entered a new stage. At present, the main application of large data in the power system is the early warning analysis of the power equipment, that is, by collecting the relevant historical fault data information, the system security is improved by predicting the early warning and failure rate of different kinds of equipment under certain relational factors. In this paper, a method of line failure rate warning is proposed. Firstly, fuzzy dynamic clustering is carried out based on the collected historical information. Considering the imbalance between the attributes, the coefficient of variation is given to the corresponding weights. And then use the weighted fuzzy clustering to deal with the data more effectively. Then, by analyzing the basic idea and basic properties of the relational analysis model theory, the gray relational model is improved by combining the slope and the Deng model. And the incremental composition and composition of the two sequences are also considered to the gray relational model to obtain the gray relational degree between the various samples. The failure rate is predicted according to the principle of weighting. Finally, the concrete process is expounded by an example, and the validity and superiority of the proposed method are verified.

  20. Security Dynamics of Cloud Computing

    OpenAIRE

    Khan, Khaled M.

    2009-01-01

    This paper explores various dimensions of cloud computing security. It argues that security concerns of cloud computing need to be addressed from the perspective of individual stakeholder. Security focuses of cloud computing are essentially different in terms of its characteristics and business model. Conventional way of viewing as well as addressing security such as ‘bolting-in’ on the top of cloud computing may not work well. The paper attempts to portray the security spectrum necessary for...

  1. Dynamic behaviour of the contact line for 350 km/h on the new line Wuhan - Guangzhou; Dynamisches Verhalten der Oberleitung fuer 350 km/h auf der neuen Strecke Wuhan - Guangzhou

    Energy Technology Data Exchange (ETDEWEB)

    Zimmert, Gerhard [Balfour Beatty Rail, Beijing (China)

    2010-04-15

    Only after four and a half years of construction activities regular services started on the approximately 1 000 km long new high-speed line Wuhan - Guangzhou in the People's Republic of China. Achieving 320 to 330 km/h commercial speed, this line is the fastest railway connection in the world. The dynamic interaction between contact line and pantograph determines the maximally possible speed to an increasing extent. Worldwide, there is only low experience on the contact line dynamic behavior at this speed level. Balfour Beatty Rail designed the contact line for this installation, participated essentially in the implementation and, therefore, was in charge of proving the contact line quality. A series of test runs concerning the geometrical requirements and the contact force behaviour eventually proved the suitability of the system. (orig.)

  2. Development of a Probabilistic Technique for On-line Parameter and State Estimation in Non-linear Dynamic Systems

    International Nuclear Information System (INIS)

    Tunc Aldemir; Miller, Don W.; Hajek, Brian K.; Peng Wang

    2002-01-01

    The DSD (Dynamic System Doctor) is a system-independent, interactive software under development for on-line state/parameter estimation in dynamic systems (1), partially supported through a Nuclear Engineering Education (NEER) grant during 1998-2001. This paper summarizes the recent accomplishments in improving the user-friendliness and computational capability of DSD

  3. Magnetic field line random walk in two-dimensional dynamical turbulence

    Science.gov (United States)

    Wang, J. F.; Qin, G.; Ma, Q. M.; Song, T.; Yuan, S. B.

    2017-08-01

    The field line random walk (FLRW) of magnetic turbulence is one of the important topics in plasma physics and astrophysics. In this article, by using the field line tracing method, the mean square displacement (MSD) of FLRW is calculated on all possible length scales for pure two-dimensional turbulence with the damping dynamical model. We demonstrate that in order to describe FLRW with the damping dynamical model, a new dimensionless quantity R is needed to be introduced. On different length scales, dimensionless MSD shows different relationships with the dimensionless quantity R. Although the temporal effect affects the MSD of FLRW and even changes regimes of FLRW, it does not affect the relationship between the dimensionless MSD and dimensionless quantity R on all possible length scales.

  4. An algorithm for on-line price discrimination

    NARCIS (Netherlands)

    D.D.B. van Bragt; D.J.A. Somefun (Koye); E. Kutschinski; J.A. La Poutré (Han)

    2002-01-01

    textabstractThe combination of on-line dynamic pricing with price discrimination can be very beneficial for firms operating on the Internet. We therefore develop an on-line dynamic pricing algorithm that can adjust the price schedule for a good or service on behalf of a firm. This algorithm (a

  5. Privacy and security in teleradiology

    International Nuclear Information System (INIS)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  6. Privacy and security in teleradiology

    Energy Technology Data Exchange (ETDEWEB)

    Ruotsalainen, Pekka [National Institute for Health and Welfare, Helsinki (Finland)], E-mail: pekka.ruotsalainen@THL.fi

    2010-01-15

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  7. Wetting dynamics at high values of contact line speed

    OpenAIRE

    Пономарев, К. О.; Феоктистов, Дмитрий Владимирович; Орлова, Евгения Георгиевна

    2015-01-01

    Experimental results analyses of dynamic contact angle change under the conditions of substrate wetting by distilled water at high values of the contact line speed was conducted. Three spreading modes for copper substrates with different roughness were selected: drop formation, spreading and equilibrium contact angle formation. Peculiarity of droplet spreading on superhydrophobic surface is found. It consists in a monotonic increase of the advancing dynamic contact angle. The effect of the dr...

  8. The RAppArmor Package: Enforcing Security Policies in R Using Dynamic Sandboxing on Linux

    Directory of Open Access Journals (Sweden)

    Jeroen Ooms

    2013-11-01

    Full Text Available The increasing availability of cloud computing and scientific super computers brings great potential for making R accessible through public or shared resources. This allows us to efficiently run code requiring lots of cycles and memory, or embed R functionality into, e.g., systems and web services. However some important security concerns need to be addressed before this can be put in production. The prime use case in the design of R has always been a single statistician running R on the local machine through the interactive console. Therefore the execution environment of R is entirely unrestricted, which could result in malicious behavior or excessive use of hardware resources in a shared environment. Properly securing an R process turns out to be a complex problem. We describe various approaches and illustrate potential issues using some of our personal experiences in hosting public web services. Finally we introduce the RAppArmor package: a Linux based reference implementation for dynamic sandboxing in R on the level of the operating system.

  9. Framework for optimal power flow incorporating dynamic system security

    International Nuclear Information System (INIS)

    El-Kady, M.A.; Owayedh, M.S.

    2006-01-01

    This paper introduces a novel framework and methodologies which are capable of tackling the complex issue of power system economy versus security in a practical and effective manner. At heart of achieving such a challenging and far-reaching objective is the incorporation of the Dyanamic Security Assessment (DSA) into production optimization techniques using the Transient Energy Function (TEF) method. In addition, and in parallel with the already well established concept of the system security, two new concepts pertaining to power system performance will be introduced in this paper, namely the concept of system dynamic susceptibility, which measures the level of systems weakness to a particular contingency and the concept of system consequent restorability, which measures the extent of contingency severity in terms of the required subsequent system restoration work should a particular contingency occur. (author)

  10. A Systematic Approach for Dynamic Security Assessment and the Corresponding Preventive Control Scheme Based on Decision Trees

    DEFF Research Database (Denmark)

    Liu, Leo; Sun, Kai; Rather, Zakir Hussain

    2014-01-01

    This paper proposes a decision tree (DT)-based systematic approach for cooperative online power system dynamic security assessment (DSA) and preventive control. This approach adopts a new methodology that trains two contingency-oriented DTs on a daily basis by the databases generated from power...... system simulations. Fed with real-time wide-area measurements, one DT of measurable variables is employed for online DSA to identify potential security issues, and the other DT of controllable variables provides online decision support on preventive control strategies against those issues. A cost......-effective algorithm is adopted in this proposed approach to optimize the trajectory of preventive control. The paper also proposes an importance sampling algorithm on database preparation for efficient DT training for power systems with high penetration of wind power and distributed generation. The performance...

  11. Biofuels and Food Security. A report by the High Level Panel of Experts on Food Security and Nutrition

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-06-15

    In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects of biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation around the following five axes

  12. Biofuels and Food Security. A report by the High Level Panel of Experts on Food Security and Nutrition

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-06-15

    In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects of biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation

  13. Meniscal Tear Film Fluid Dynamics Near Marx’s Line

    KAUST Repository

    Zubkov, V. S.

    2013-07-03

    Extensive studies have explored the dynamics of the ocular surface fluid, though theoretical investigations are typically limited to the use of the lubrication approximation, which is not guaranteed to be uniformly valid a-priori throughout the tear meniscus. However, resolving tear film behaviour within the meniscus and especially its apices is required to characterise the flow dynamics where the tear film is especially thin, and thus most susceptible to evaporatively induced hyperosmolarity and subsequent epithelial damage. Hence, we have explored the accuracy of the standard lubrication approximation for the tear film by explicit comparisons with the 2D Navier-Stokes model, considering both stationary and moving eyelids. Our results demonstrate that the lubrication model is qualitatively accurate except in the vicinity of the eyelids. In particular, and in contrast to lubrication theory, the solution of the full Navier-Stokes equations predict a distinct absence of fluid flow, and thus convective mixing in the region adjacent to the tear film contact line. These observations not only support emergent hypotheses concerning the formation of Marx\\'s line, a region of epithelial cell staining adjacent to the contact line on the eyelid, but also enhance our understanding of the pathophysiological consequences of the flow profile near the tear film contact line. © 2013 Society for Mathematical Biology.

  14. Vehicle Dynamic Prediction Systems with On-Line Identification of Vehicle Parameters and Road Conditions

    Science.gov (United States)

    Hsu, Ling-Yuan; Chen, Tsung-Lin

    2012-01-01

    This paper presents a vehicle dynamics prediction system, which consists of a sensor fusion system and a vehicle parameter identification system. This sensor fusion system can obtain the six degree-of-freedom vehicle dynamics and two road angles without using a vehicle model. The vehicle parameter identification system uses the vehicle dynamics from the sensor fusion system to identify ten vehicle parameters in real time, including vehicle mass, moment of inertial, and road friction coefficients. With above two systems, the future vehicle dynamics is predicted by using a vehicle dynamics model, obtained from the parameter identification system, to propagate with time the current vehicle state values, obtained from the sensor fusion system. Comparing with most existing literatures in this field, the proposed approach improves the prediction accuracy both by incorporating more vehicle dynamics to the prediction system and by on-line identification to minimize the vehicle modeling errors. Simulation results show that the proposed method successfully predicts the vehicle dynamics in a left-hand turn event and a rollover event. The prediction inaccuracy is 0.51% in a left-hand turn event and 27.3% in a rollover event. PMID:23202231

  15. Real time security assessment in national load dispatch centre, Tenaga Nasional Berhad, Malaysia

    Energy Technology Data Exchange (ETDEWEB)

    Sreedharan, G. [Tenaga Nasional Berhad, Kuala Lumpur (Malaysia); Moghavvemi, M. [Univ. of Malaya, Kuala Lumpur (Malaysia)

    2007-07-01

    Electric energy is one of the most important resources of modern industrial society. Electric power is available to the user instantly at the correct voltage, frequency and exactly at the amount that is needed. However, the power system is subjected to constant disturbances created by random load changes, faults created by natural causes and by equipment failures. One of the major impacts of the disturbances to the system is the impact imposed on transmission networks or corridors, which have increased the demand for more accurate and up to date information on the power system. It has become impossible to operate the system with an acceptable degree of security by using traditional operational planning studies that are conducted off-line and use forecast conditions to predict system security limits. Therefore the use of on-line security assessment is quickly becoming a necessity. This paper simplified the general off-line security assessment methodology by attempting to use the real time system snap shot data as an input to the dynamic security assessment tool namely VSAT. The study used raw data produced at every 10 minute cycle in order to conduct a security assessment of the power system, including current power system load; network topology; unit commitment; and generator and transmission line outages. The purpose of the project was to implement a real time security assessment to benefit the system operators to assist them in their daily work in monitoring and operating the power system in Tenaga Nasional Berhad. The paper discussed project implementation including a description of the project and project background. It discussed the operation of VSAT, result display, and future enhancement. 18 refs., 5 figs.

  16. Privacy and security in teleradiology.

    Science.gov (United States)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  17. A METHOD OF SECURITY SCANNING OF CARRY-ON ITEMS, AND A CARRY-ON ITEMS SECURITY SCANNING SYSTEM

    DEFF Research Database (Denmark)

    2017-01-01

    A security scanning system (1) comprises a first stage module (3) having at least one X-ray source (6) and at least three first detectors (7) that are line-shaped and arranged in mutually different orientations and have at least dual energy resolution. A group of carry-on items (4) on a carrier...

  18. A secure and efficient audit mechanism for dynamic shared data in cloud storage.

    Science.gov (United States)

    Kwon, Ohmin; Koo, Dongyoung; Shin, Yongjoo; Yoon, Hyunsoo

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data.

  19. A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage

    Science.gov (United States)

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data. PMID:24959630

  20. [Calculation on ecological security baseline based on the ecosystem services value and the food security].

    Science.gov (United States)

    He, Ling; Jia, Qi-jian; Li, Chao; Xu, Hao

    2016-01-01

    The rapid development of coastal economy in Hebei Province caused rapid transition of coastal land use structure, which has threatened land ecological security. Therefore, calculating ecosystem service value of land use and exploring ecological security baseline can provide the basis for regional ecological protection and rehabilitation. Taking Huanghua, a city in the southeast of Hebei Province, as an example, this study explored the joint point, joint path and joint method between ecological security and food security, and then calculated the ecological security baseline of Huanghua City based on the ecosystem service value and the food safety standard. The results showed that ecosystem service value of per unit area from maximum to minimum were in this order: wetland, water, garden, cultivated land, meadow, other land, salt pans, saline and alkaline land, constructive land. The order of contribution rates of each ecological function value from high to low was nutrient recycling, water conservation, entertainment and culture, material production, biodiversity maintenance, gas regulation, climate regulation and environmental purification. The security baseline of grain production was 0.21 kg · m⁻², the security baseline of grain output value was 0.41 yuan · m⁻², the baseline of ecosystem service value was 21.58 yuan · m⁻², and the total of ecosystem service value in the research area was 4.244 billion yuan. In 2081 the ecological security will reach the bottom line and the ecological system, in which human is the subject, will be on the verge of collapse. According to the ecological security status, Huanghua can be divided into 4 zones, i.e., ecological core protection zone, ecological buffer zone, ecological restoration zone and human activity core zone.

  1. A European Perspective on Security Research

    Science.gov (United States)

    Liem, Khoen; Hiller, Daniel; Castex, Christoph

    Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.

  2. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  3. Dynamic impact of the structure of the supply chain of perishable foods on logistics performance and food security

    Energy Technology Data Exchange (ETDEWEB)

    Castro, Javier Arturo Orjuela; Jaimes, Wilson Adarme

    2017-07-01

    Understanding how the structure affects logistical performance and food security is critical in the supply chains of perishable foods (PFSC). This research proposes a system dynamics model to analyze the effects of structures: lean, agile, flexible, responsive and resilient, in the overall performance and of each agent of the PFSC. Design/methodology/approach: Using a system dynamics model and design of experiments it is studied how the different structures and their combination, affect the behavior of inventory, transportation, responsiveness, efficiency, availability and quality-safety of the fresh fruits supply chain and each echelon. Findings: The studies of supply chains have been done for each structure in an independent way; investigations are scarce in supply chains of perishable foods. The structures modeled in this research do not show the better performance in all the metrics of the chain, neither in all agents for each structure. The above implies the presence of trade-offs. Research limitations/implications: The results show the need to investigate mixed structures with the FPSC´s own characteristics; the model can be applied in other supply chains of perishable foods. Practical implications: Management by combining structures in the FFSC, improves logistics performance and contributes to food security. Social implications: The agents of the FFSC can apply the structures found in this study, to improve their logistics performance and the food security. Originality/value: The dynamics of individual and combined structures were identified, which constitutes a contribution to the discussion in the literature of such problems for FFSC. The model includes six echelons: farmers, wholesalers, agro-industry, third-party logistics operators and retailers. The dynamic contemplates deterioration rate to model perishability and others losses.

  4. Dynamic impact of the structure of the supply chain of perishable foods on logistics performance and food security

    Directory of Open Access Journals (Sweden)

    Javier Arturo Orjuela Castro

    2017-10-01

    Full Text Available Purpose: Understanding how the structure affects logistical performance and food security is critical in the supply chains of perishable foods (PFSC. This research proposes a system dynamics model to analyze the effects of structures: lean, agile, flexible, responsive and resilient, in the overall performance and of each agent of the PFSC. Design/methodology/approach: Using a system dynamics model and design of experiments it is studied how the different structures and their combination, affect the behavior of inventory, transportation, responsiveness, efficiency, availability and quality-safety of the fresh fruits supply chain and each echelon. Findings: The studies of supply chains have been done for each structure in an independent way; investigations are scarce in supply chains of perishable foods. The structures modeled in this research do not show the better performance in all the metrics of the chain, neither in all agents for each structure. The above implies the presence of trade-offs. Research limitations/implications: The results show the need to investigate mixed structures with the FPSC´s own characteristics; the model can be applied in other supply chains of perishable foods. Practical implications: Management by combining structures in the FFSC, improves logistics performance and contributes to food security. Social implications: The agents of the FFSC can apply the structures found in this study, to improve their logistics performance and the food security. Originality/value: The dynamics of individual and combined structures were identified, which constitutes a contribution to the discussion in the literature of such problems for FFSC. The model includes six echelons: farmers, wholesalers, agro-industry, third-party logistics operators and retailers. The dynamic contemplates deterioration rate to model perishability and others losses.

  5. Dynamic impact of the structure of the supply chain of perishable foods on logistics performance and food security

    International Nuclear Information System (INIS)

    Castro, Javier Arturo Orjuela; Jaimes, Wilson Adarme

    2017-01-01

    Understanding how the structure affects logistical performance and food security is critical in the supply chains of perishable foods (PFSC). This research proposes a system dynamics model to analyze the effects of structures: lean, agile, flexible, responsive and resilient, in the overall performance and of each agent of the PFSC. Design/methodology/approach: Using a system dynamics model and design of experiments it is studied how the different structures and their combination, affect the behavior of inventory, transportation, responsiveness, efficiency, availability and quality-safety of the fresh fruits supply chain and each echelon. Findings: The studies of supply chains have been done for each structure in an independent way; investigations are scarce in supply chains of perishable foods. The structures modeled in this research do not show the better performance in all the metrics of the chain, neither in all agents for each structure. The above implies the presence of trade-offs. Research limitations/implications: The results show the need to investigate mixed structures with the FPSC´s own characteristics; the model can be applied in other supply chains of perishable foods. Practical implications: Management by combining structures in the FFSC, improves logistics performance and contributes to food security. Social implications: The agents of the FFSC can apply the structures found in this study, to improve their logistics performance and the food security. Originality/value: The dynamics of individual and combined structures were identified, which constitutes a contribution to the discussion in the literature of such problems for FFSC. The model includes six echelons: farmers, wholesalers, agro-industry, third-party logistics operators and retailers. The dynamic contemplates deterioration rate to model perishability and others losses.

  6. European perspectives on security research

    CERN Document Server

    2011-01-01

    Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.

  7. Dynamics of the Molten Contact Line

    Science.gov (United States)

    Sonin, Ain A.; Duthaler, Gregg; Liu, Michael; Torresola, Javier; Qiu, Taiqing

    1999-01-01

    The purpose of this program is to develop a basic understanding of how a molten material front spreads over a solid that is below its melting point, arrests, and freezes. Our hope is that the work will contribute toward a scientific knowledge base for certain new applications involving molten droplet deposition, including the "printing" of arbitrary three-dimensional objects by precise deposition of individual molten microdrops that solidify after impact. Little information is available at this time on the capillarity-driven motion and arrest of molten contact line regions. Schiaffino and Sonin investigated the arrest of the contact line of a molten microcrystalline wax spreading over a subcooled solid "target" of the same material. They found that contact line arrest takes place at an apparent liquid contact angle that depends primarily on the Stefan number S=c(T(sub f) -T(sub t)/L based on the temperature difference between the fusion point and the target temperature, and proposed that contact line arrest occurs when the liquid's dynamic contact angle approaches the angle of attack of the solidification front just behind the contact line. They also showed, however, that the conventional continuum equations and boundary conditions have no meaningful solution for this angle. The solidification front angle is determined by the heat flux just behind the contact line, and the heat flux is singular at that point. By comparing experiments with numerical computations, Schiaffino and Sonin estimated that the conventional solidification model must break down within a distance of order 0.1 - 1 microns of the contact line. The physical mechanism for this breakdown is as yet undetermined, and no first-principles theory exists for the contact angle at arrest. Schiaffino and Sonin also presented a framework for understanding how to moderate Weber number molten droplet deposition in terms of similarity laws and experimentation. The study is based on experiments with three molten

  8. Profiles of Food Security for US Farmworker Households and Factors Related to Dynamic of Change.

    Science.gov (United States)

    Ip, Edward H; Saldana, Santiago; Arcury, Thomas A; Grzywacz, Joseph G; Trejo, Grisel; Quandt, Sara A

    2015-10-01

    We recruited 248 farmworker families with preschool-aged children in North Carolina and examined food security indicators over 24 months to identify food security patterns and examine the dynamic of change over time. Participants in the Niños Sanos study, conducted 2011 to 2014, completed quarterly food security assessments. Based on responses to items in the US Household Food Security Survey Module, we identified different states of food security by using hidden Markov model analysis, and examined factors associated with different states. We delineated factors associated with changes in state by using mixed-effect ordinal logistic regression. About half of the households (51%) consistently stayed in the most food-secure state. The least food-secure state was transient, with only 29% probability of this state for 2 consecutive quarters. Seasonal (vs migrant) work status, having immigration documents (vs not documented), and season predicted higher levels of food security. Heterogeneity in food security among farmworker households calls for tailoring intervention strategies. The transiency and unpredictability of low food security suggest that access to safety-net programs could reduce low food security risk in this population.

  9. On-line Ciphers and the Hash-CBC Constructions

    DEFF Research Database (Denmark)

    Bellare, M.; Boldyreva, A.; Knudsen, Lars Ramkilde

    2012-01-01

    We initiate a study of on-line ciphers. These are ciphers that can take input plaintexts of large and varying lengths and will output the i th block of the ciphertext after having processed only the first i blocks of the plaintext. Such ciphers permit length-preserving encryption of a data stream...... with only a single pass through the data. We provide security definitions for this primitive and study its basic properties. We then provide attacks on some possible candidates, including CBC with fixed IV. We then provide two constructions, HCBC1 and HCBC2, based on a given block cipher E and a family...... of computationally AXU functions. HCBC1 is proven secure against chosen-plaintext attacks assuming that E is a PRP secure against chosen-plaintext attacks, while HCBC2 is proven secure against chosen-ciphertext attacks assuming that E is a PRP secure against chosen-ciphertext attacks....

  10. Dynamics, thermodynamics and structure of liquids and supercritical fluids: crossover at the Frenkel line

    Science.gov (United States)

    Fomin, Yu D.; Ryzhov, V. N.; Tsiok, E. N.; Proctor, J. E.; Prescher, C.; Prakapenka, V. B.; Trachenko, K.; Brazhkin, V. V.

    2018-04-01

    We review recent work aimed at understanding dynamical and thermodynamic properties of liquids and supercritical fluids. The focus of our discussion is on solid-like transverse collective modes, whose evolution in the supercritical fluids enables one to discuss the main properties of the Frenkel line separating rigid liquid-like and non-rigid gas-like supercritical states. We subsequently present recent experimental evidence of the Frenkel line showing that structural and dynamical crossovers are seen at a pressure and temperature corresponding to the line as predicted by theory and modelling. Finally, we link dynamical and thermodynamic properties of liquids and supercritical fluids by the new calculation of liquid energy governed by the evolution of solid-like transverse modes. The disappearance of those modes at high temperature results in the observed decrease of heat capacity.

  11. Development and Application of a New Grey Dynamic Hierarchy Analysis System (GDHAS) for Evaluating Urban Ecological Security

    Science.gov (United States)

    Shao, Chaofeng; Tian, Xiaogang; Guan, Yang; Ju, Meiting; Xie, Qiang

    2013-01-01

    Selecting indicators based on the characteristics and development trends of a given study area is essential for building a framework for assessing urban ecological security. However, few studies have focused on how to select the representative indicators systematically, and quantitative research is lacking. We developed an innovative quantitative modeling approach called the grey dynamic hierarchy analytic system (GDHAS) for both the procedures of indicator selection and quantitative assessment of urban ecological security. Next, a systematic methodology based on the GDHAS is developed to assess urban ecological security comprehensively and dynamically. This assessment includes indicator selection, driving force-pressure-state-impact-response (DPSIR) framework building, and quantitative evaluation. We applied this systematic methodology to assess the urban ecological security of Tianjin, which is a typical coastal super megalopolis and the industry base in China. This case study highlights the key features of our approach. First, 39 representative indicators are selected for the evaluation index system from 62 alternative ones available through the GDHAS. Second, the DPSIR framework is established based on the indicators selected, and the quantitative assessment of the eco-security of Tianjin is conducted. The results illustrate the following: urban ecological security of Tianjin in 2008 was in alert level but not very stable; the driving force and pressure subsystems were in good condition, but the eco-security levels of the remainder of the subsystems were relatively low; the pressure subsystem was the key to urban ecological security; and 10 indicators are defined as the key indicators for five subsystems. These results can be used as the basis for urban eco-environmental management. PMID:23698700

  12. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  13. A novel wireless local positioning system for airport (indoor) security

    Science.gov (United States)

    Zekavat, Seyed A.; Tong, Hui; Tan, Jindong

    2004-09-01

    A novel wireless local positioning system (WLPS) for airport (or indoor) security is introduced. This system is used by airport (indoor) security guards to locate all of, or a group of airport employees or passengers within the airport area. WLPS consists of two main parts: (1) a base station that is carried by security personnel; hence, introducing dynamic base station (DBS), and (2) a transponder (TRX) that is mounted on all people (including security personnel) present at the airport; thus, introducing them as active targets. In this paper, we (a) draw a futuristic view of the airport security systems, and the flow of information at the airports, (b) investigate the techniques of extending WLPS coverage area beyond the line-of-sight (LoS), and (c) study the performance of this system via standard transceivers, and direct sequence code division multiple access (DS-CDMA) systems with and without antenna arrays and conventional beamforming (BF).

  14. Information Security: A Scientometric Study of the Profile, Structure, and Dynamics of an Emerging Scholarly Specialty

    Science.gov (United States)

    Olijnyk, Nicholas Victor

    2014-01-01

    The central aim of the current research is to explore and describe the profile, dynamics, and structure of the information security specialty. This study's objectives are guided by four research questions: 1. What are the salient features of information security as a specialty? 2. How has the information security specialty emerged and evolved from…

  15. Simulation and experimental research on line throwing rocket with flight

    Directory of Open Access Journals (Sweden)

    Wen-bin Gu

    2014-06-01

    Full Text Available The finite segment method is used to model the line throwing rocket system. A dynamic model of line throwing rocket with flight motion based on Kane's method is presented by the kinematics description of the system and the consideration of the forces acting on the system. The experiment designed according to the parameters of the dynamic model is made. The simulation and experiment results, such as range, velocity and flight time, are compared and analyzed. The simulation results are basically agreed with the test data, which shows that the flight motion of the line throwing rocket can be predicted by the dynamic model. A theoretical model and guide for the further research on the disturbance of rope and the guidance, flight control of line throwing rocket are provided by the dynamic modeling.

  16. Research and Design of Dynamic Migration Access Control Technology Based on Heterogeneous Network

    Directory of Open Access Journals (Sweden)

    Wang Feng

    2017-01-01

    Full Text Available With the continuous development of wireless networks, the amount of privacy services in heterogeneous mobile networks is increasing, such as information storage, user access, and so on. Access control security issues for heterogeneous mobile radio network, this paper proposes a dynamic migration access control technology based on heterogeneous network. Through the system architecture of the mutual trust system, we can understand the real-time mobile node failure or abnormal state. To make the service can be terminated for the node. And adopt the 802.1X authentication way to improve the security of the system. Finally, it by combining the actual running test data, the trust update algorithm of the system is optimized to reduce the actual security threats in the environment. Experiments show that the system’s anti-attack, the success rate of access, bit error rate is in line with the expected results. This system can effectively reduce the system authentication information is illegally obtained after the network security protection mechanism failure and reduce the risk of user data leakage.

  17. Secure and Efficient Key Coordination Algorithm for Line Topology Network Maintenance for Use in Maritime Wireless Sensor Networks.

    Science.gov (United States)

    Elgenaidi, Walid; Newe, Thomas; O'Connell, Eoin; Toal, Daniel; Dooly, Gerard

    2016-12-21

    There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper.

  18. Roadmap on optical security

    Science.gov (United States)

    Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam

    2016-08-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections

  19. On-line computing in a classified environment

    International Nuclear Information System (INIS)

    O'Callaghan, P.B.

    1982-01-01

    Westinghouse Hanford Company (WHC) recently developed a Department of Energy (DOE) approved real-time, on-line computer system to control nuclear material. The system simultaneously processes both classified and unclassified information. Implementation of this system required application of many security techniques. The system has a secure, but user friendly interface. Many software applications protect the integrity of the data base from malevolent or accidental errors. Programming practices ensure the integrity of the computer system software. The audit trail and the reports generation capability record user actions and status of the nuclear material inventory

  20. Technology transfer of dynamic IT outsourcing requires security measures in SLAs

    NARCIS (Netherlands)

    F. Dickmann (Frank); M. Brodhun (Maximilian); J. Falkner (Jürgen); T.A. Knoch (Tobias); U. Sax (Ulrich)

    2010-01-01

    textabstractFor the present efforts in dynamic IT outsourcing environments like Grid or Cloud computing security and trust are ongoing issues. SLAs are a proved remedy to build up trust in outsourcing relations. Therefore, it is necessary to determine whether SLAs can improve trust from the

  1. Shamir secret sharing scheme with dynamic access structure (SSSDAS). Case study on nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Thiyagarajan, P.; Thandra, Prasanth Kumar; Rajan, J.; Satyamurthy, S.A.V. [Indira Gandhi Centre for Atomic Research (IGCAR), Kalpakkam (India). Computer Div.; Aghila, G. [National Institute of Technology, Karaikal (India). Dept. of Computer Science and Engineering

    2015-05-15

    In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.

  2. Shamir secret sharing scheme with dynamic access structure (SSSDAS). Case study on nuclear power plant

    International Nuclear Information System (INIS)

    Thiyagarajan, P.; Thandra, Prasanth Kumar; Rajan, J.; Satyamurthy, S.A.V.; Aghila, G.

    2015-01-01

    In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.

  3. Nonlinear dynamic analysis of high energy line pipe whip

    International Nuclear Information System (INIS)

    Hsu, L.C.; Kuo, A.Y.; Tang, H.T.

    1983-01-01

    To facilitate potential cost savings in pipe whip protection design, TVA conducted a 1'' high pressure line break test to investigate the pipe whip behavior. The test results are available to EPRI as a data base for a generic study on nonlinear dynamic behavior of piping systems and pipe whip phenomena. This paper describes a nonlinear dynamic analysis of the TVA high energy line tests using ABAQUS-EPGEN code. The analysis considers the effects of large deformation and high strain rate on resisting moment and energy absorption capability of the analyzed piping system. The numerical results of impact forces, impact velocities, and reaction forces at pipe supports are compared to the TVA test data. The pipe whip impact time and forces have also been calculated per the current NRC guidelines and compared. The calculated pipe support reaction forces prior to impact have been found to be in good agreement with the TVA test data except for some peak values at the very beginning of the pipe break. These peaks are believed to be due to stress wave propagation which cannot be addressed by the ABAQUS code. Both the effects of elbow crushing and strain rate have been approximately simulated. The results are found to be important on pipe whip impact evaluation. (orig.)

  4. On the dynamic response of pressure transmission lines in the research of helium-charged free piston Stirling engines

    Science.gov (United States)

    Miller, Eric L.; Dudenhoefer, James E.

    1989-01-01

    The signal distortion inherent to pressure transmission lines in free-piston Stirling engine research is discussed. Based on results from classical analysis, guidelines are formulated to describe the dynamic response properties of a volume-terminated transmission tube for applications involving the helium-charged free-piston Stirling engines. The underdamped flow regime is described, the primary resonance frequency is derived, and the pressure phase and amplitude distortion are discussed. The scope and limitation of the dynamic response analysis are considered.

  5. Multi-State Initiatives---Agriculture Security Preparedness

    National Research Council Canada - National Science Library

    Gordon, Ellen

    2004-01-01

    ... to protect the nation's food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism including the struggle to secure the agriculture industry from potentially devastating attack...

  6. On the synthesis of resonance lines in dynamical models of structured hot-star winds

    Science.gov (United States)

    Puls, J.; Owocki, S. P.; Fullerton, A. W.

    1993-01-01

    We examine basic issues involved in synthesizing resonance-line profiles from 1-D, dynamical models of highly structured hot-star winds. Although these models exhibit extensive variations in density as well as velocity, the density scale length is still typically much greater than the Sobolev length. The line transfer is thus treated using a Sobolev approach, as generalized by Rybicki & Hummer (1978) to take proper account of the multiple Sobolev resonances arising from the nonmonotonic velocity field. The resulting reduced-lambda-matrix equation describing nonlocal coupling of the source function is solved by iteration, and line profiles are then derived from formal solution integration using this source function. Two more approximate methods that instead use either a stationary or a structured, local source function yield qualitatively similar line-profiles, but are found to violate photon conservation by 10% or more. The full results suggest that such models may indeed be able to reproduce naturally some of the qualitative properties long noted in observed UV line profiles, such as discrete absorption components in unsaturated lines, or the blue-edge variability in saturated lines. However, these particular models do not yet produce the black absorption troughs commonly observed in saturated lines, and it seems that this and other important discrepancies (e.g., in acceleration time scale of absorption components) may require development of more complete models that include rotation and other 2-D and/or 3-D effects.

  7. Brief analysis of Jiangsu grid security and stability based on multi-infeed DC index in power system

    Science.gov (United States)

    Zhang, Wenjia; Wang, Quanquan; Ge, Yi; Huang, Junhui; Chen, Zhengfang

    2018-02-01

    The impact of Multi-infeed HVDC has gradually increased to security and stability operating in Jiangsu power grid. In this paper, an appraisal method of Multi-infeed HVDC power grid security and stability is raised with Multi-Infeed Effective Short Circuit Ratio, Multi-Infeed Interaction Factor and Commutation Failure Immunity Index. These indices are adopted in security and stability simulating calculation of Jiangsu Multi-infeed HVDC system. The simulation results indicate that Jiangsu power grid is operating with a strong DC system. It has high level of power grid security and stability, and meet the safety running requirements. Jinpin-Suzhou DC system is located in the receiving end with huge capacity, which is easily leading to commutation failure of the transmission line. In order to resolve this problem, dynamic reactive power compensation can be applied in power grid near Jinpin-Suzhou DC system. Simulation result shows this method is feasible to commutation failure.

  8. Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report

    Energy Technology Data Exchange (ETDEWEB)

    Wheeler, Timothy A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Denman, Matthew R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Williams, R. A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Martin, Nevin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jankovsky, Zachary Kyle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-09-01

    Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities. iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber exploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by coupling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated impact and the associated degree of difficulty to achieve the attack vector) on accident management establishes a technical risk informed framework for developing effective cyber security controls for nuclear power.

  9. Dynamic evolving spiking neural networks for on-line spatio- and spectro-temporal pattern recognition.

    Science.gov (United States)

    Kasabov, Nikola; Dhoble, Kshitij; Nuntalid, Nuttapod; Indiveri, Giacomo

    2013-05-01

    On-line learning and recognition of spatio- and spectro-temporal data (SSTD) is a very challenging task and an important one for the future development of autonomous machine learning systems with broad applications. Models based on spiking neural networks (SNN) have already proved their potential in capturing spatial and temporal data. One class of them, the evolving SNN (eSNN), uses a one-pass rank-order learning mechanism and a strategy to evolve a new spiking neuron and new connections to learn new patterns from incoming data. So far these networks have been mainly used for fast image and speech frame-based recognition. Alternative spike-time learning methods, such as Spike-Timing Dependent Plasticity (STDP) and its variant Spike Driven Synaptic Plasticity (SDSP), can also be used to learn spatio-temporal representations, but they usually require many iterations in an unsupervised or semi-supervised mode of learning. This paper introduces a new class of eSNN, dynamic eSNN, that utilise both rank-order learning and dynamic synapses to learn SSTD in a fast, on-line mode. The paper also introduces a new model called deSNN, that utilises rank-order learning and SDSP spike-time learning in unsupervised, supervised, or semi-supervised modes. The SDSP learning is used to evolve dynamically the network changing connection weights that capture spatio-temporal spike data clusters both during training and during recall. The new deSNN model is first illustrated on simple examples and then applied on two case study applications: (1) moving object recognition using address-event representation (AER) with data collected using a silicon retina device; (2) EEG SSTD recognition for brain-computer interfaces. The deSNN models resulted in a superior performance in terms of accuracy and speed when compared with other SNN models that use either rank-order or STDP learning. The reason is that the deSNN makes use of both the information contained in the order of the first input spikes

  10. On the security of a novel key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Xiang Tao; Wong, K.-W.; Liao Xiaofeng

    2009-01-01

    Recently, Xiao et al. proposed a novel key agreement protocol based on Chebyshev chaotic map. In this paper, the security of the protocol is analyzed, and two attack methods can be found in different scenarios. The essential principle of Xiao et al.'s scheme is summarized. It is also pointed out with proof that any attempt along this line to improve the security of Chebyshev map is redundant.

  11. Molecular dynamics study of the nanosized droplet spreading: The effect of the contact line forces on the kinetic energy dissipation

    Energy Technology Data Exchange (ETDEWEB)

    Yoon, Hong Min [Department of Mechanical Engineering, Yonsei University, Seoul 120-749 (Korea, Republic of); Kondaraju, Sasidhar [Department of Mechanical Science, Indian Institute of Technology Bhubaneswar, Bhubaneswar, Odisha 751013 (India); Lee, Jung Shin [Department of Mechanical Engineering, Yonsei University, Seoul 120-749 (Korea, Republic of); Suh, Youngho; Lee, Joonho H. [Samsung Electronics, Mechatronics R& D Center, Hwaseong-si, Gyeonggi-do 445-330 (Korea, Republic of); Lee, Joon Sang, E-mail: joonlee@yonsei.ac.kr [Department of Mechanical Engineering, Yonsei University, Seoul 120-749 (Korea, Republic of)

    2017-07-01

    Highlights: • Contact line forces, including friction and spreading forces are directly calculated. • Overall trends of variations in contact line forces during droplet spreading process show characteristics of contact line forces. • Detail relations of contact line forces and atomic kinetics in the contact line provide a clear evidence of the possible energy dissipation mechanism in droplet spreading process. - Abstract: Recent studies have revealed that contact line forces play an important role in the droplet spreading process. Despite their significance, the physics related to them has been studied only indirectly and the effect of contact line forces is still being disputed. We performed a molecular dynamics simulation and mimicked the droplet spreading process at the nanoscale. Based on the results of the simulation, the contact line forces were directly calculated. We found that the forces acting on the bulk and the contact line region showed different trends. Distinct positive and negative forces, contact line spreading, and friction forces were observed near the contact line. We also observed a strong dependency of the atomic kinetics in the contact line region on the variations in the contact line forces. The atoms of the liquid in the contact line region lost their kinetic energy due to the contact line friction force and became partially immobile on the solid surface. The results of the current study will be useful for understanding the role of the contact line forces on the kinetic energy dissipation in the contact line region.

  12. Molecular dynamics study of the nanosized droplet spreading: The effect of the contact line forces on the kinetic energy dissipation

    International Nuclear Information System (INIS)

    Yoon, Hong Min; Kondaraju, Sasidhar; Lee, Jung Shin; Suh, Youngho; Lee, Joonho H.; Lee, Joon Sang

    2017-01-01

    Highlights: • Contact line forces, including friction and spreading forces are directly calculated. • Overall trends of variations in contact line forces during droplet spreading process show characteristics of contact line forces. • Detail relations of contact line forces and atomic kinetics in the contact line provide a clear evidence of the possible energy dissipation mechanism in droplet spreading process. - Abstract: Recent studies have revealed that contact line forces play an important role in the droplet spreading process. Despite their significance, the physics related to them has been studied only indirectly and the effect of contact line forces is still being disputed. We performed a molecular dynamics simulation and mimicked the droplet spreading process at the nanoscale. Based on the results of the simulation, the contact line forces were directly calculated. We found that the forces acting on the bulk and the contact line region showed different trends. Distinct positive and negative forces, contact line spreading, and friction forces were observed near the contact line. We also observed a strong dependency of the atomic kinetics in the contact line region on the variations in the contact line forces. The atoms of the liquid in the contact line region lost their kinetic energy due to the contact line friction force and became partially immobile on the solid surface. The results of the current study will be useful for understanding the role of the contact line forces on the kinetic energy dissipation in the contact line region.

  13. Secure and Efficient Key Coordination Algorithm for Line Topology Network Maintenance for Use in Maritime Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Walid Elgenaidi

    2016-12-01

    Full Text Available There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper.

  14. Dynamic Group Management Scheme for Sustainable and Secure Information Sensing in IoT

    Directory of Open Access Journals (Sweden)

    Hyungjoo Kim

    2016-10-01

    Full Text Available The services provided to users in the environment associated with the Internet of Things (hereinafter referred to as IoT begin with the information collected from sensors. It is imperative to transmit high-quality sensor data for providing better services. It is also required to collect data only from those authenticated sensors. Moreover, it is imperative to collect high-quality data on a sustainable and continuous basis in order to provide services anytime and anywhere in the IoT environment. Therefore, high-quality, authenticated sensor networks should be constructed. The most prominent routing protocol to enhance the energy consumption efficiency for the sustainable data collection in a sensor network is the LEACH routing protocol. The LEACH routing protocol transmits sensor data by measuring the energy of sensors and allocating sensor groups dynamically. However, these sensor networks have vulnerabilities such as key leakage, eavesdropping, replay attack and relay attack, given the nature of wireless network communication. A large number of security techniques have been studied in order to solve these vulnerabilities. Nonetheless, these studies still cannot support the dynamic sensor group allocation of the LEACH routing protocol. Furthermore, they are not suitable for the sensor nodes whose hardware computing ability and energy resources are limited. Therefore, this paper proposed a group sensor communication protocol that utilizes only the four fundamental arithmetic operations and logical operation for the sensor node authentication and secure data transmission. Through the security analysis, this paper verified that the proposed scheme was secure to the vulnerabilities resulting from the nature of wireless network communication. Moreover, this paper verified through the performance analysis that the proposed scheme could be utilized efficiently.

  15. Dynamic Personal Identity and the Dynamic Identity Grid: How Theory and Concept Can Transform Information into Knowledge and Secure the American Homeland

    Science.gov (United States)

    2008-09-01

    80 Figure 12. Dynamic Identity Grid Strategy Canvas ..........................................................81 Figure 13. Hurdles to...GIG Global Information Grid HSPD Homeland Security Presidential Directive IAFIS Integrated Automated Fingerprint Identification System IP...recognizing a person based on a physiological or behavioral characteristic. Biometric features that can be measured include: facial, fingerprint , hand

  16. On the Road to Holistic Decision Making in Adaptive Security

    Directory of Open Access Journals (Sweden)

    Mahsa Emami-Taba

    2013-08-01

    Full Text Available Security is a critical concern in today's software systems. Besides the interconnectivity and dynamic nature of network systems, the increasing complexity in modern software systems amplifies the complexity of IT security. This fact leaves attackers one step ahead in exploiting vulnerabilities and introducing new cyberattacks. The demand for new methodologies in addressing cybersecurity is emphasized by both private and national corporations. A practical solution to dynamically manage the high complexity of IT security is adaptive security, which facilitates analysis of the system's behaviour and hence the prevention of malicious attacks in complex systems. Systems that feature adaptive security detect and mitigate security threats at runtime with little or no administrator involvement. In these systems, decisions at runtime are balanced according to quality and performance goals. This article describes the necessity of holistic decision making in such systems and paves the road to future research.

  17. Providing security assurance in line with national DBT assumptions

    Science.gov (United States)

    Bajramovic, Edita; Gupta, Deeksha

    2017-01-01

    As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the

  18. Dynamic analysis and vibration testing of CFRP drive-line system used in heavy-duty machine tool

    Directory of Open Access Journals (Sweden)

    Mo Yang

    2018-03-01

    Full Text Available Low critical rotary speed and large vibration in the metal drive-line system of heavy-duty machine tool affect the machining precision seriously. Replacing metal drive-line with the CFRP drive-line can effectively solve this problem. Based on the composite laminated theory and the transfer matrix method (TMM, this paper puts forward a modified TMM to analyze dynamic characteristics of CFRP drive-line system. With this modified TMM, the CFRP drive-line of a heavy vertical miller is analyzed. And the finite element modal analysis model of the shafting is established. The results of the modified TMM and finite element analysis (FEA show that the modified TMM can effectively predict the critical rotary speed of CFRP drive-line. And the critical rotary speed of CFRP drive-line is 20% higher than that of the original metal drive-line. Then, the vibration of the CFRP and the metal drive-line were tested. The test results show that application of the CFRP drive shaft in the drive-line can effectively reduce the vibration of the heavy-duty machine tool. Keywords: CFRP drive-line system, Dynamic behavior, Transfer matrix, Vibration measurement

  19. Dynamic security issues in autonomous power systems with increasing wind power penetration

    DEFF Research Database (Denmark)

    Margaris, I.D.; Hansen, Anca Daniela; Sørensen, Poul Ejnar

    2011-01-01

    Asynchronous Generator (DFAG) and Permanent Magnet Synchronous Generator (PMSG) – are applied and issues regarding interaction with the power system are investigated. This paper provides conclusions about the dynamic security of non-interconnected power systems with high wind power penetration based...... on a complete model representation of the individual components of the system; three different types of conventional generators are included in the model, while the protection system is also incorporated. The load shedding following faults is finally discussed....

  20. On-line Learning of Prototypes and Principal Components

    NARCIS (Netherlands)

    Biehl, M.; Freking, A.; Hölzer, M.; Reents, G.; Schlösser, E.; Saad, David

    1998-01-01

    We review our recent investigation of on-line unsupervised learning from high-dimensional structured data. First, on-line competitive learning is studied as a method for the identification of prototype vectors from overlapping clusters of examples. Specifically, we analyse the dynamics of the

  1. Correlating contact line capillarity and dynamic contact angle hysteresis in surfactant-nanoparticle based complex fluids

    Science.gov (United States)

    Harikrishnan, A. R.; Dhar, Purbarun; Agnihotri, Prabhat K.; Gedupudi, Sateesh; Das, Sarit K.

    2018-04-01

    Dynamic wettability and contact angle hysteresis can be correlated to shed insight onto any solid-liquid interaction. Complex fluids are capable of altering the expected hysteresis and dynamic wetting behavior due to interfacial interactions. We report the effect of capillary number on the dynamic advancing and receding contact angles of surfactant-based nanocolloidal solutions on hydrophilic, near hydrophobic, and superhydrophobic surfaces by performing forced wetting and de-wetting experiments by employing the embedded needle method. A segregated study is performed to infer the contributing effects of the constituents and effects of particle morphology. The static contact angle hysteresis is found to be a function of particle and surfactant concentrations and greatly depends on the nature of the morphology of the particles. An order of estimate of line energy and a dynamic flow parameter called spreading factor and the transient variations of these parameters are explored which sheds light on the dynamics of contact line movement and response to perturbation of three-phase contact. The Cox-Voinov-Tanner law was found to hold for hydrophilic and a weak dependency on superhydrophobic surfaces with capillary number, and even for the complex fluids, with a varying degree of dependency for different fluids.

  2. Why SCADA security is NOT like Computer Centre Security

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    Today, the industralized world lives in symbiosis with control systems (aka SCADA systems): it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and discuss the differences (or not) between computer center cyber-security and control system cyber-security.

  3. Anticipating the unintended consequences of security dynamics.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Overfelt, James Robert; Malczynski, Leonard A.; Saltiel, David H.; Simon Paul Moulton

    2010-01-01

    In a globalized world, dramatic changes within any one nation causes ripple or even tsunamic effects within neighbor nations and nations geographically far removed. Multinational interventions to prevent or mitigate detrimental changes can easily cause secondary unintended consequences more detrimental and enduring than the feared change instigating the intervention. This LDRD research developed the foundations for a flexible geopolitical and socioeconomic simulation capability that focuses on the dynamic national security implications of natural and man-made trauma for a nation-state and the states linked to it through trade or treaty. The model developed contains a database for simulating all 229 recognized nation-states and sovereignties with the detail of 30 economic sectors including consumers and natural resources. The model explicitly simulates the interactions among the countries and their governments. Decisions among governments and populations is based on expectation formation. In the simulation model, failed expectations are used as a key metric for tension across states, among ethnic groups, and between population factions. This document provides the foundational documentation for the model.

  4. Screening dynamic evaluation of SRS cooling water line

    International Nuclear Information System (INIS)

    Bezler, P.; Shteyngart, S.; Breidenbach, G.

    1991-01-01

    The production reactors at the Savannah River Site (SRS) have been shut down due to perceived safety concerns. A major concern is the seismic integrity of the plant. A comprehensive program is underway to assess the seismic capacity of the existing systems and components and to upgrade them to acceptable levels. The evaluation of the piping systems at the SRS is a major element of this program. Many of the piping systems at the production reactors were designed without performing dynamic analyses. Instead their design complied with good design practice for dead weight supported systems with proper accommodation of thermal expansion effects. In order to gain some insight as to the seismic capacity of piping installed in this fashion, dynamic analyses were performed for some lines. Since the piping was not seismically supported, the evaluations involved various approximations and the results are only used as a screening test of seismic adequacy. In this paper, the screening evaluations performed for the raw water inlet line are described. This line was selected for evaluation since it was considered typical of the smaller diameter piping systems at the plant. It is a dead weight supported system made up of a run of small diameter piping which extends for great distances over many dead weight supports and through wall penetrations. The results of several evaluations for the system using different approximations to represent the support system are described. 2 figs., 4 tabs

  5. The method of a joint intraday security check system based on cloud computing

    Science.gov (United States)

    Dong, Wei; Feng, Changyou; Zhou, Caiqi; Cai, Zhi; Dan, Xu; Dai, Sai; Zhang, Chuancheng

    2017-01-01

    The intraday security check is the core application in the dispatching control system. The existing security check calculation only uses the dispatch center’s local model and data as the functional margin. This paper introduces the design of all-grid intraday joint security check system based on cloud computing and its implementation. To reduce the effect of subarea bad data on the all-grid security check, a new power flow algorithm basing on comparison and adjustment with inter-provincial tie-line plan is presented. And the numerical example illustrated the effectiveness and feasibility of the proposed method.

  6. On-Line Maintenance Methodology Development

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyo Won; Kim, Jae Ho; Jae, Moo Sung [Hanyang University, Seoul (Korea, Republic of)

    2012-05-15

    Most of domestic maintenance activities for nuclear power plants are performed while overhaul. Therefore, On-Line Maintenance (OLM) is one of the proper risks informed application techniques for diffusing maintenance burden during overhaul with safety of the plant is secured. The NUMARC 93-01 (Rev.3) presents the OLM state of the art and it provides methodology. This study adopts NUMARC 93-01 (Rev.3) and present OLM. The reference component is Emergency Diesel Generator (EDG) of Ulchin 3, 4

  7. Safe and Secure Services Based on NGN

    Science.gov (United States)

    Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito

    Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.

  8. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  9. Human comment dynamics in on-line social systems

    Science.gov (United States)

    Wu, Ye; Zhou, Changsong; Chen, Maoying; Xiao, Jinghua; Kurths, Jürgen

    2010-12-01

    Human comment is studied using data from ‘tianya’ which is one of the most popular on-line social systems in China. We found that the time interval between two consecutive comments on the same topic, called inter-event time, follows a power-law distribution. This result shows that there is no characteristic decay time on a topic. It allows for very long periods without comments that separate bursts of intensive comments. Furthermore, the frequency of a different ID commenting on a topic also follows a power-law distribution. It indicates that there are some “hubs” in the topic who lead the direction of the public opinion. Based on the personal comments habit, a model is introduced to explain these phenomena. The numerical simulations of the model fit well with the empirical results. Our findings are helpful for discovering regular patterns of human behavior in on-line society and the evolution of the public opinion on the virtual as well as real society.

  10. Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security

    Directory of Open Access Journals (Sweden)

    Lu Rao

    2018-01-01

    Full Text Available Remote data auditing service is important for mobile clients to guarantee the intactness of their outsourced data stored at cloud side. To relieve mobile client from the nonnegligible burden incurred by performing the frequent data auditing, more and more literatures propose that the execution of such data auditing should be migrated from mobile client to third-party auditor (TPA. However, existing public auditing schemes always assume that TPA is reliable, which is the potential risk for outsourced data security. Although Outsourced Proofs of Retrievability (OPOR have been proposed to further protect against the malicious TPA and collusion among any two entities, the original OPOR scheme applies only to the static data, which is the limitation that should be solved for enabling data dynamics. In this paper, we design a novel authenticated data structure called bv23Tree, which enables client to batch-verify the indices and values of any number of appointed leaves all at once for efficiency. By utilizing bv23Tree and a hierarchical storage structure, we present the first solution for Dynamic OPOR (DOPOR, which extends the OPOR model to support dynamic updates of the outsourced data. Extensive security and performance analyses show the reliability and effectiveness of our proposed scheme.

  11. Dynamic Auditing Protocol for Efficient and Secure Data Storage in Cloud Computing

    OpenAIRE

    J. Noorul Ameen; J. Jamal Mohamed; N. Nilofer Begam

    2014-01-01

    Cloud computing, where the data has been stored on cloud servers and retrieved by users (data consumers) the data from cloud servers. However, there are some security challenges which are in need of independent auditing services to verify the data integrity and safety in the cloud. Until now a numerous methods has been developed for remote integrity checking whichever only serve for static archive data and cannot be implemented to the auditing service if the data in the cloud is being dynamic...

  12. Security camera resolution measurements: Horizontal TV lines versus modulation transfer function measurements.

    Energy Technology Data Exchange (ETDEWEB)

    Birch, Gabriel Carisle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Griffin, John Clark [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-01-01

    The horizontal television lines (HTVL) metric has been the primary quantity used by division 6000 related to camera resolution for high consequence security systems. This document shows HTVL measurements are fundamen- tally insufficient as a metric to determine camera resolution, and propose a quantitative, standards based methodology by measuring the camera system modulation transfer function (MTF), the most common and accepted metric of res- olution in the optical science community. Because HTVL calculations are easily misinterpreted or poorly defined, we present several scenarios in which HTVL is frequently reported, and discuss their problems. The MTF metric is discussed, and scenarios are presented with calculations showing the application of such a metric.

  13. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  14. Dynamic analysis and vibration testing of CFRP drive-line system used in heavy-duty machine tool

    OpenAIRE

    Mo Yang; Lin Gui; Yefa Hu; Guoping Ding; Chunsheng Song

    2018-01-01

    Low critical rotary speed and large vibration in the metal drive-line system of heavy-duty machine tool affect the machining precision seriously. Replacing metal drive-line with the CFRP drive-line can effectively solve this problem. Based on the composite laminated theory and the transfer matrix method (TMM), this paper puts forward a modified TMM to analyze dynamic characteristics of CFRP drive-line system. With this modified TMM, the CFRP drive-line of a heavy vertical miller is analyzed. ...

  15. Off-line electronic cash based on secret-key certificates

    NARCIS (Netherlands)

    S.A. Brands (Stefan)

    1995-01-01

    textabstractAn off-line electronic coin system is presented that offers multi-party security and unconditional privacy of payments. The system improves significantly on the efficiency of the previously most efficient such system known in the literature, due to application of a recently proposed

  16. An Approach to Dynamic Line Rating State Estimation at Steady State Using Direct and Indirect Measurements

    DEFF Research Database (Denmark)

    Alvarez, David; Silva, Filipe Miguel Faria da; Mombello, Enrique E.

    2018-01-01

    Dynamic line rating has emerged as a solution for reducing congestion in overhead lines, allowing the optimization of power systems assets. This technique is based on direct and/or indirect monitoring of conductor temperature. Different devices and methods have been developed to sense conductor...

  17. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  18. The security system analyzer: An application of the Prolog language

    International Nuclear Information System (INIS)

    Zimmerman, B.D.; Seeman, S.E.

    1986-01-01

    The Prolog programming language and entity-relationship modeling techniques were used to demonstrate a methodology for security system applications. A knowledge base was built that consists of statements modeling a generic building and surrounding area, including security fences and intrusion detectors (sensors and TV cameras). Declarative Prolog statements have the capability to use the knowledge base information in a routine manner to provide descriptive information about sensors, to dynamically update the knowledge base to provide on-line recording of changes in detector status or maintenance history, and to analyze the configuration of the building, surrounding area, and intrusion detector layout and current operability status in order to determine all the pathways from one specified point to another specified point which result in the detection probability being less than some specified value (i.e., find the ''weakest paths''). This ''search'' capability, which is the heart of the SECURITY program, allows the program to perform a CAD (computer aided design) function, and to provide a real-time security degradation analysis if intrusion detectors become inoperable. 2 refs., 3 figs

  19. Some Results On The Modelling Of TSS Manufacturing Lines

    Directory of Open Access Journals (Sweden)

    Viorel MÎNZU

    2000-12-01

    Full Text Available This paper deals with the modelling of a particular class of manufacturing lines, governed by a decentralised control strategy so that they balance themselves. Such lines are known as “bucket brigades” and also as “TSS lines”, after their first implementation, at Toyota, in the 70’s. A first study of their behaviour was based upon modelling as stochastic dynamic systems, which emphasised, in the frame of the so-called “Normative Model”, a sufficient condition for self-balancing, that means for autonomous functioning at a steady production rate (stationary behaviour. Under some particular conditions, a simulation analysis of TSS lines could be made on non-linear block diagrams, showing that the state trajectories are piecewise continuous in between occurrences of certain discrete events, which determine their discontinuity. TSS lines may therefore be modelled as hybrid dynamic systems, more specific, with autonomous switching and autonomous impulses (jumps. A stability analysis of such manufacturing lines is allowed by modelling them as hybrid dynamic systems with discontinuous motions.

  20. The design of a dynamic security system at the XXIII Summer Olympics at Los Angeles

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1985-01-01

    The security requirements of the XXIII Summer Olympic Games at Los Angeles provided a challenge unparalleled in the history of the modern games. This paper discusses the dynamics involved and suggests that the principles used are applicable to many of today's security environments. The success of the Intrusion Detection Systems (IDS) employed at each of the three Olympic villages and at the Piper Technical Center is a known fact. How it was accomplished is addressed in a straightforward, systematic way. The paper also recognizes the contributions made by the security community, law enforcement agencies, the government, military, the security industry and RandD organizations. It was a team effort that reflected the spirit of the games and the American ''can-do'' attitude

  1. A Security Scheme of 5G Ultradense Network Based on the Implicit Certificate

    Directory of Open Access Journals (Sweden)

    Zhonglin Chen

    2018-01-01

    Full Text Available The ultradense network (UDN is one of the most promising technologies in the fifth generation (5G to address the network system capacity issue. It can enhance spatial reuse through the flexible, intensive deployment of small base stations. A universal 5G UDN architecture is necessary to realize the autonomous and dynamic deployment of small base stations. However, the security of the 5G UDN is still in its infancy, and the data communication security among the network entities is facing new challenges. In this paper, we proposed a new security based on implicit certificate (IC scheme; the scheme solves the security problem among the access points (APs in a dynamic APs group (APG and between the AP and user equipment (UE. We present each phase regarding how two network entities obtain the Elliptic Curve Qu-Vanstone (ECQV implicit certificate scheme, verify each other’s identity, and share keys in an UDN. Finally, we extensively analyze our lightweight security communication model in terms of security and performance. The simulation on network bandwidth evaluation is also conducted to prove the efficiency of the solution.

  2. Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes

    Directory of Open Access Journals (Sweden)

    Qinghe Du

    2018-01-01

    Full Text Available The Internet of Things (IoT is expected to accommodate every object which exists in this world or likely to exist in the near future. The enormous scale of the objects is challenged by big security concerns, especially for common information dissemination via multicast services, where the reliability assurance for multiple multicast users at the cost of increasing redundancy and/or retransmissions also benefits eavesdroppers in successfully decoding the overheard signals. The objective of this work is to address the security challenge present in IoT multicast applications. Specifically, with the presence of the eavesdropper, an adaptive fountain code design is proposed in this paper to enhance the security for multicast in IoT. The main novel features of the proposed scheme include two folds: (i dynamical encoding scheme which can effectively decrease intercept probability at the eavesdropper; (ii increasing the transmission efficiency compared with the conventional nondynamical design. The analysis and simulation results show that the proposed scheme can effectively enhance information security while achieving higher transmission efficiency with a little accredited complexity, thus facilitating the secured wireless multicast transmissions over IoT.

  3. Dynamic neural networks based on-line identification and control of high performance motor drives

    Science.gov (United States)

    Rubaai, Ahmed; Kotaru, Raj

    1995-01-01

    In the automated and high-tech industries of the future, there wil be a need for high performance motor drives both in the low-power range and in the high-power range. To meet very straight demands of tracking and regulation in the two quadrants of operation, advanced control technologies are of a considerable interest and need to be developed. In response a dynamics learning control architecture is developed with simultaneous on-line identification and control. the feature of the proposed approach, to efficiently combine the dual task of system identification (learning) and adaptive control of nonlinear motor drives into a single operation is presented. This approach, therefore, not only adapts to uncertainties of the dynamic parameters of the motor drives but also learns about their inherent nonlinearities. In fact, most of the neural networks based adaptive control approaches in use have an identification phase entirely separate from the control phase. Because these approaches separate the identification and control modes, it is not possible to cope with dynamic changes in a controlled process. Extensive simulation studies have been conducted and good performance was observed. The robustness characteristics of neuro-controllers to perform efficiently in a noisy environment is also demonstrated. With this initial success, the principal investigator believes that the proposed approach with the suggested neural structure can be used successfully for the control of high performance motor drives. Two identification and control topologies based on the model reference adaptive control technique are used in this present analysis. No prior knowledge of load dynamics is assumed in either topology while the second topology also assumes no knowledge of the motor parameters.

  4. A dynamic mathematical test of international property securities bubbles and crashes

    Science.gov (United States)

    Hui, Eddie C. M.; Zheng, Xian; Wang, Hui

    2010-04-01

    This study investigates property securities bubbles and crashes by using a dynamic mathematical methodology developed from the previous research (Watanabe et al. 2007a, b [31,32]). The improved model is used to detect the bubble and crash periods in five international countries/cities (namely, United States, United Kingdom, Japan, Hong Kong and Singapore) from Jan, 2000 to Oct, 2008. By this model definition, we are able to detect the beginning of each bubble period even before it bursts. Meanwhile, the empirical results show that most of property securities markets experienced bubble periods between 2003 and 2007, and crashes happened in Apr 2008 triggered by the Subprime Mortgage Crisis of US. In contrast, Japan suffered the shortest bubble period and no evidence has documented the existence of crash there.

  5. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  6. On line routing per mobile phone

    DEFF Research Database (Denmark)

    Bieding, Thomas; Görtz, Simon; Klose, Andreas

    2009-01-01

    On-line routing is concerned with building vehicle routes in an ongoing fashion in such a way that customer requests arriving dynamically in time are efficiently and effectively served. An indispensable prerequisite for applying on-line routing methods is mobile communication technology....... Additionally it is of utmost importance that the employed communication system is suitable integrated with the firm’s enterprise application system and business processes. On basis of a case study, we describe in this paper a system that is cheap and easy to implement due to the use of simple mobile phones...

  7. Magnetic stochasticity in magnetically confined fusion plasmas chaos of field lines and charged particle dynamics

    CERN Document Server

    Abdullaev, Sadrilla

    2014-01-01

    This is the first book to systematically consider the modern aspects of chaotic dynamics of magnetic field lines and charged particles in magnetically confined fusion plasmas.  The analytical models describing the generic features of equilibrium magnetic fields and  magnetic perturbations in modern fusion devices are presented. It describes mathematical and physical aspects of onset of chaos, generic properties of the structure of stochastic magnetic fields, transport of charged particles in tokamaks induced by magnetic perturbations, new aspects of particle turbulent transport, etc. The presentation is based on the classical and new unique mathematical tools of Hamiltonian dynamics, like the action--angle formalism, classical perturbation theory, canonical transformations of variables, symplectic mappings, the Poincaré-Melnikov integrals. They are extensively used for analytical studies as well as for numerical simulations of magnetic field lines, particle dynamics, their spatial structures and  statisti...

  8. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  9. Impacts of Climate Change on Food Security and Poverty Reduction ...

    African Journals Online (AJOL)

    Dynamic interactions between bio-geophysical and human environments lead to the production, processing, distribution, preparation and consumption of foods, resulting in food systems that underpin food security. Food systems encompass food availability, utilization and access, so that food security is diminished when ...

  10. Dynamic Security Assessment Of Computer Networks In Siem-Systems

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Doynikova

    2015-10-01

    Full Text Available The paper suggests an approach to the security assessment of computer networks. The approach is based on attack graphs and intended for Security Information and Events Management systems (SIEM-systems. Key feature of the approach consists in the application of the multilevel security metrics taxonomy. The taxonomy allows definition of the system profile according to the input data used for the metrics calculation and techniques of security metrics calculation. This allows specification of the security assessment in near real time, identification of previous and future attacker steps, identification of attackers goals and characteristics. A security assessment system prototype is implemented for the suggested approach. Analysis of its operation is conducted for several attack scenarios.

  11. On technical security issues in cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg; Gruschka, Nils

    2009-01-01

    , however, there are still some challenges to be solved. Amongst these are security and trust issues, since the user's data has to be released to the Cloud and thus leaves the protection sphere of the data owner. Most of the discussions on this topics are mainly driven by arguments related to organisational......The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure (CapEx) and operational expenditure (OpEx). In order for this to become reality...... means. This paper focusses on technical security issues arising from the usage of Cloud services and especially by the underlying technologies used to build these cross-domain Internet-connected collaborations....

  12. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  13. A correction to 'efficient and secure comparison for on-line auctions'

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Krøigaard, Mikkel; Geisler, Martin

    2009-01-01

    In this paper, we describe a correction to the cryptosystem proposed in Damgard et al. from Int. J. Applied Cryptography, Vol. 1, No. 1. Although, the correction is small and does not affect the performance of the protocols from Damgard et al., it is necessary, as the cryptosystem is not secure...

  14. Computer Security: Computer security threats, vulnerabilities and attacks (3/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Antonio Perez Perez works in the Computer Security Team doing software development, sysadmin tasks and operations. He is also involved on grid security and does 1st line security support at CERN on ROTA. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have shown several successful attacks against e.g. Sony, PBS, UNESCO, RSAsecurity, Citibank, and others. Credit card information of hundreds of thousands of people got exposed. Affected companies not only lost their assets and data, also their reputation has suffered. Thus, proper computer security measures are essential. Without question, security must even more become an inherent ingredient when developing, deploying, and operating applications, web sites, and computing services. These lectures shall give an ove...

  15. Simulation and experimental research on line throwing rocket with flight

    OpenAIRE

    Wen-bin Gu; Ming Lu; Jian-qing Liu; Qin-xing Dong; Zhen-xiong Wang; Jiang-hai Chen

    2014-01-01

    The finite segment method is used to model the line throwing rocket system. A dynamic model of line throwing rocket with flight motion based on Kane's method is presented by the kinematics description of the system and the consideration of the forces acting on the system. The experiment designed according to the parameters of the dynamic model is made. The simulation and experiment results, such as range, velocity and flight time, are compared and analyzed. The simulation results are basicall...

  16. Secure Dynamic Program Repartitioning

    DEFF Research Database (Denmark)

    Hansen, Rene Rydhoff; Probst, Christian

    2005-01-01

    Secure program partitioning has been introduced as a language-based technique to allow the distribution of data and computation across mutualy untrusted hosts, while at the same time guaranteeing the protection of confidential data. Programs that have been annotated with security types......, but the partitioning compiler becomes a part of the network and can recompile applications, thus alowing hosts to enter or leave the framework. We contend that this setting is superior to static partitioning, since it allows redistribution of data and computations. This is especialy beneficial if the new host alows...... data and computations to better fulfil the trust requirements of the users. Erasure Policies ensure that the original host of the redistributed data or computation does not store the data any longer....

  17. Dynamics of fluid lines, sheets, filaments and membranes

    International Nuclear Information System (INIS)

    Coutris, N.

    1988-01-01

    We establish the dynamic equations of two types of fluid structures: 1) lines-filaments and 2) sheets-membranes. In the first part, we consider one-dimensional (line) and two-dimensional (sheet) fluid structures. The second part concerns the associated three- dimensional structures: filaments and membranes. In the third part, we establish the equations for thickened lines and thickened sheets. For that purpose, we introduce a thickness in the models of the first part. The fourth part concerns the thinning of the filament and the membrane. Then, by an asymptotic process, we deduce the corresponding equations from the equations of the second part in order to show the purely formal equivalence of the equations of the third and fourth parts. To obtain the equations, we make use of theorems whose proofs can be found in the appendices. The equations can be applied to many areas of interest: instabilities of liquid jets and liquid films, modelisation of interfaces between two different fluids as sheets or membranes, modelisation with the averaged equations over a cross section of single phase flows and two-phase flows in channels with a nonrectilinear axis such as bends or pump casings [fr

  18. Authentication and Data Security in ITS Telecommunications Solutions

    Directory of Open Access Journals (Sweden)

    Tomas Zelinka

    2014-04-01

    Full Text Available Paper presents telecommunications security issues with dynamically changing networking. Paper also presents performance indicators of authentication as an integral part of the approach to non-public information. Expected level of security depend on relevant ITS services requirements, different solutions require different levels of quality. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure or other vehicles significantly and progressively grow. This trend leads to increase of the fatal problems if security of the wide area networks is not relevantly treated. Relevant communications security treatment becomes crucial part of the ITS telecommunications solution because probability of hazards appearances grow if vehicles networks are integrated in the dynamically organized wide area networks. Besides of available "off shelf" security tools solution based on non-public universal identifier with dynamical extension and data selection according to actor role or category is presented including performances indicators for the authentication process.

  19. Operational and Strategic Implementation of Dynamic Line Rating for Optimized Wind Energy Generation Integration

    Energy Technology Data Exchange (ETDEWEB)

    Gentle, Jake Paul [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2016-12-01

    One primary goal of rendering today’s transmission grid “smarter” is to optimize and better manage its power transfer capacity in real time. Power transfer capacity is affected by three main elements: stability, voltage limits, and thermal ratings. All three are critical, but thermal ratings represent the greatest opportunity to quickly, reliably and economically utilize the grid’s true capacity. With the “Smarter Grid”, new solutions have been sought to give operators a better grasp on real time conditions, allowing them to manage and extend the usefulness of existing transmission infrastructure in a safe and reliable manner. The objective of the INL Wind Program is to provide industry a Dynamic Line Rating (DLR) solution that is state of the art as measured by cost, accuracy and dependability, to enable human operators to make informed decisions and take appropriate actions without human or system overloading and impacting the reliability of the grid. In addition to mitigating transmission line congestion to better integrate wind, DLR also offers the opportunity to improve the grid with optimized utilization of transmission lines to relieve congestion in general. As wind-generated energy has become a bigger part of the nation’s energy portfolio, researchers have learned that wind not only turns turbine blades to generate electricity, but can cool transmission lines and increase transfer capabilities significantly, sometimes up to 60 percent. INL’s DLR development supports EERE and The Wind Energy Technology Office’s goals by informing system planners and grid operators of available transmission capacity, beyond typical Static Line Ratings (SLR). SLRs are based on a fixed set of conservative environmental conditions to establish a limit on the amount of current lines can safely carry without overheating. Using commercially available weather monitors mounted on industry informed custom brackets developed by INL in combination with Computational

  20. Operational and Strategic Implementation of Dynamic Line Rating for Optimized Wind Energy Generation Integration

    International Nuclear Information System (INIS)

    Gentle, Jake Paul

    2016-01-01

    One primary goal of rendering today's transmission grid 'smarter' is to optimize and better manage its power transfer capacity in real time. Power transfer capacity is affected by three main elements: stability, voltage limits, and thermal ratings. All three are critical, but thermal ratings represent the greatest opportunity to quickly, reliably and economically utilize the grid's true capacity. With the 'Smarter Grid', new solutions have been sought to give operators a better grasp on real time conditions, allowing them to manage and extend the usefulness of existing transmission infrastructure in a safe and reliable manner. The objective of the INL Wind Program is to provide industry a Dynamic Line Rating (DLR) solution that is state of the art as measured by cost, accuracy and dependability, to enable human operators to make informed decisions and take appropriate actions without human or system overloading and impacting the reliability of the grid. In addition to mitigating transmission line congestion to better integrate wind, DLR also offers the opportunity to improve the grid with optimized utilization of transmission lines to relieve congestion in general. As wind-generated energy has become a bigger part of the nation's energy portfolio, researchers have learned that wind not only turns turbine blades to generate electricity, but can cool transmission lines and increase transfer capabilities significantly, sometimes up to 60 percent. INL's DLR development supports EERE and The Wind Energy Technology Office's goals by informing system planners and grid operators of available transmission capacity, beyond typical Static Line Ratings (SLR). SLRs are based on a fixed set of conservative environmental conditions to establish a limit on the amount of current lines can safely carry without overheating. Using commercially available weather monitors mounted on industry informed custom brackets developed by INL in combination with Computational Fluid Dynamics (CFD

  1. Using the safety/security interface to the security manager's advantage

    International Nuclear Information System (INIS)

    Stapleton, B.W.

    1993-01-01

    Two aspects of the safety/security interface are discussed: (1) the personal safety of nuclear security officers; and (2) how the security manager can effectively deal with the safety/security interface in solving today's requirements yet supporting the overall mission of the facility. The basis of this presentation is the result of interviews, document analyses, and observations. The conclusion is that proper planning and communication between the players involved in the security/safety interface can benefit the two programs and help achieve overall system integration, ultimately contributing to the bottom line. This is especially important in today's cost conscious environment

  2. SAInt – A novel quasi-dynamic model for assessing security of supply in coupled gas and electricity transmission networks

    NARCIS (Netherlands)

    Pambour, Kwabena Addo; Cakir Erdener, Burcin; Bolado-Lavin, Ricardo; Dijkema, Gerhard P.J.

    2017-01-01

    The integration of renewable energy sources into existing electric power systems is connected with an increased interdependence between natural gas and electricity transmission networks. To analyse this interdependence and its impact on security of supply, we developed a novel quasi-dynamic

  3. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security

    National Research Council Canada - National Science Library

    Ganger, Gregory

    2000-01-01

    This report contains the technical content of a recent funding proposal. In it, we propose a new approach to network security in which each individual device erects its own security perimeter and defends its own critical resources...

  4. Security Enhancement of Knowledge-based User Authentication through Keystroke Dynamics

    Directory of Open Access Journals (Sweden)

    Roy Soumen

    2016-01-01

    Full Text Available Keystroke Dynamics is a behavioural biometrics characteristic in Biometric science, which solve the issues in user identification or verification. In Knowledge-based user authentication technique, we compromise with PIN or password which is unsafe due to different type of attacks. It is good to choose password with the combination of upper and lower case letter with some digits and symbols, but which is very hard to remember or generally we forget to distinguish those passwords for different access control systems. Our system not only takes the users’ entered texts but their typing style is also account for. In our experiment, we have not taken hard password type texts, we have chosen some daily used words where users are habituated and comfortable at typing and we obtained the consisting typing pattern. Different distance-based and data mining algorithms we have applied on collected typing pattern and obtained impressive results. As per our experiment, if we use keystroke dynamics in existing knowledge based user authentication system with minimum of five daily used common texts then it increases the security level up to 97.6% to 98.2% (if we remove some of the irrelevant feature sets.

  5. Design and implementation of a secure workflow system based on PKI/PMI

    Science.gov (United States)

    Yan, Kai; Jiang, Chao-hui

    2013-03-01

    As the traditional workflow system in privilege management has the following weaknesses: low privilege management efficiency, overburdened for administrator, lack of trust authority etc. A secure workflow model based on PKI/PMI is proposed after studying security requirements of the workflow systems in-depth. This model can achieve static and dynamic authorization after verifying user's ID through PKC and validating user's privilege information by using AC in workflow system. Practice shows that this system can meet the security requirements of WfMS. Moreover, it can not only improve system security, but also ensures integrity, confidentiality, availability and non-repudiation of the data in the system.

  6. Lossy transmission line model of hydrofractured well dynamics

    Energy Technology Data Exchange (ETDEWEB)

    Patzek, T.W. [Department of Materials Science and Mineral Engineering, University of California at Berkeley, Berkeley, CA (United States); De, A. [Earth Sciences Division, Lawrence Berkeley National Laboratory, Berkeley, CA (United States)

    2000-01-01

    The real-time detection of hydrofracture growth is crucial to the successful operation of water, CO{sub 2} or steam injection wells in low-permeability reservoirs and to the prevention of subsidence and well failure. In this paper, we describe propagation of very low frequency (1-10 to 100 Hz) Stoneley waves in a fluid-filled wellbore and their interactions with the fundamental wave mode in a vertical hydrofracture. We demonstrate that Stoneley-wave loses energy to the fracture and the energy transfer from the wellbore to the fracture opening is most efficient in soft rocks. We conclude that placing the wave source and receivers beneath the injection packer provides the most efficient means of hydrofracture monitoring. We then present the lossy transmission line model of wellbore and fracture for the detection and characterization of fracture state and volume. We show that this model captures the wellbore and fracture geometry, the physical properties of injected fluid and the wellbore-fracture system dynamics. The model is then compared with experimentally measured well responses. The simulated responses are in good agreement with published experimental data from several water injection wells with depths ranging from 1000 ft to 9000 ft. Hence, we conclude that the transmission line model of water injectors adequately captures wellbore and fracture dynamics. Using an extensive data set for the South Belridge Diatomite waterfloods, we demonstrate that even for very shallow wells the fracture size and state can be adequately recognized at wellhead. Finally, we simulate the effects of hydrofracture extension on the transient response to a pulse signal generated at wellhead. We show that hydrofracture extensions can indeed be detected by monitoring the wellhead pressure at sufficiently low frequencies.

  7. Long-distance pulse propagation on high-frequency dissipative nonlinear transmission lines/resonant tunneling diode line cascaded maps

    International Nuclear Information System (INIS)

    Klofai, Yerima; Essimbi, B Z; Jaeger, D

    2011-01-01

    Pulse propagation on high-frequency dissipative nonlinear transmission lines (NLTLs)/resonant tunneling diode line cascaded maps is investigated for long-distance propagation of short pulses. Applying perturbative analysis, we show that the dynamics of each line is reduced to an expanded Korteweg-de Vries-Burgers equation. Moreover, it is found by computer experiments that the soliton developed in NLTLs experiences an exponential amplitude decay on the one hand and an exponential amplitude growth on the other. As a result, the behavior of a pulse in special electrical networks made of concatenated pieces of lines is closely similar to the transmission of information in optical/electrical communication systems.

  8. Long-distance pulse propagation on high-frequency dissipative nonlinear transmission lines/resonant tunneling diode line cascaded maps

    Energy Technology Data Exchange (ETDEWEB)

    Klofai, Yerima [Department of Physics, Higher Teacher Training College, University of Maroua, PO Box 46 Maroua (Cameroon); Essimbi, B Z [Department of Physics, Faculty of Science, University of Yaounde 1, PO Box 812 Yaounde (Cameroon); Jaeger, D, E-mail: bessimb@yahoo.fr [ZHO, Optoelectronik, Universitaet Duisburg-Essen, D-47048 Duisburg (Germany)

    2011-10-15

    Pulse propagation on high-frequency dissipative nonlinear transmission lines (NLTLs)/resonant tunneling diode line cascaded maps is investigated for long-distance propagation of short pulses. Applying perturbative analysis, we show that the dynamics of each line is reduced to an expanded Korteweg-de Vries-Burgers equation. Moreover, it is found by computer experiments that the soliton developed in NLTLs experiences an exponential amplitude decay on the one hand and an exponential amplitude growth on the other. As a result, the behavior of a pulse in special electrical networks made of concatenated pieces of lines is closely similar to the transmission of information in optical/electrical communication systems.

  9. Impact of market forces on security of supply; Markedsgoerelse af forsyningssikkerhed

    Energy Technology Data Exchange (ETDEWEB)

    Klinge Jakobsen, H.; Kromann, M.T.; Hoermann, M. (and others)

    2010-05-15

    by putting power sufficiency on the market. In the model, these savings quantified to 15-20 billion DKK annually for the Nordic countries and Germany (just over 1 oere per kWh). The savings are primarily due to avoiding keeping the production capacity in reserve. Instead, one allows the market to generate a direct incentive to consumers, or their utilities, to invest in technology that gives more flexibility and dynamics to the system. Moreover, the likelihood is reduced that a too high level of security of supply is kept through conservative planning. Much of the investment in the dynamic power system is not profitable only for the sake of security. Increased activation of consumption resources has a larger value for power systems based on wind power and thermal generation, rather than for the hydro-intensive northern Europe. Developments to activate consumption reserves are already under way within the current market environment. Security of supply, increased demand for integration of fluctuating wind power and the desire for a more efficient use of both energy and capital resources pull in the same direction relative to the dynamic energy system. (ln)

  10. Chaotic secure communication based on strong tracking filtering

    International Nuclear Information System (INIS)

    Li Xiongjie; Xu Zhengguo; Zhou Donghua

    2008-01-01

    A scheme for implementing secure communication based on chaotic maps and strong tracking filter (STF) is presented, and a modified STF algorithm with message estimation is developed for the special requirement of chaotic secure communication. At the emitter, the message symbol is modulated by chaotic mapping and is output through a nonlinear function. At the receiver, the driving signal is received and the message symbol is recovered dynamically by the STF with estimation of message symbol. Simulation results of Holmes map demonstrate that when message symbols are binary codes, STF can effectively recover the codes of the message from the noisy chaotic signals. Compared with the extended Kalman filter (EKF), STF has a lower bit error rate

  11. Two Stage Secure Dynamic Load Balancing Architecture for SIP Server Clusters

    Directory of Open Access Journals (Sweden)

    G. Vennila

    2014-08-01

    Full Text Available Session Initiation Protocol (SIP is a signaling protocol emerged with an aim to enhance the IP network capabilities in terms of complex service provision. SIP server scalability with load balancing has a greater concern due to the dramatic increase in SIP service demand. Load balancing of session method (request/response and security measures optimizes the SIP server to regulate of network traffic in Voice over Internet Protocol (VoIP. Establishing a honeywall prior to the load balancer significantly reduces SIP traffic and drops inbound malicious load. In this paper, we propose Active Least Call in SIP Server (ALC_Server algorithm fulfills objectives like congestion avoidance, improved response times, throughput, resource utilization, reducing server faults, scalability and protection of SIP call from DoS attacks. From the test bed, the proposed two-tier architecture demonstrates that the ALC_Server method dynamically controls the overload and provides robust security, uniform load distribution for SIP servers.

  12. Updating energy security and environmental policy: Energy security theories revisited.

    Science.gov (United States)

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  13. Brazilian Hybrid Security in South America

    Directory of Open Access Journals (Sweden)

    Rafael Duarte Villa

    2017-10-01

    Full Text Available Abstract Existing research on security governance in South America functions on dichotomous lines. Analysis of Brazil’s security practices is a case in point. On the one hand, scholars point out the balance of power and hegemonic institutions as the main discourse in the security practices between Brazil and its South American neighbors. On the other hand, some other emphasize the importance of democracy, cooperation on defense and security, and peaceful conflict resolution between states in the region as indicators for the emergence of a security community between Brazil and its neighbors in the South American region. The way in which multiple orders coexist is not given adequate attention in empirical research. This article seeks to overcome this dichotomy. By foregrounding Brazil’s regional security practices, particularly during the Lula and Rousseff administration, I show the hybrid and sometimes ambivalent security governance system in Brazil, where mechanisms of balance of power and security community overlap in important ways.

  14. Security Management Model in Cloud Computing Environment

    OpenAIRE

    Ahmadpanah, Seyed Hossein

    2016-01-01

    In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which virtual machine security architecture, based on AHP (Analytic Hierarchy Process) virtual machine de...

  15. Software Safety and Security

    CERN Document Server

    Nipkow, T; Hauptmann, B

    2012-01-01

    Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was

  16. On-line determination of operating limits incorporating constraint costs and reliability assessment

    International Nuclear Information System (INIS)

    Meisingset, M.; Lovas, G. G.

    1997-01-01

    Problems regarding power system operation following deregulation were discussed. The problems arise as a result of the increased power flow pattern created by deregulation and competitive power markets, resulting in power in excess of N-1, (the capacity of transmission lines available), which in turn creates bottlenecks. In a situation like this, constraint costs and security costs (i.e. the cost of supply interruptions) are incurred as the direct result of the deterministic criteria used in reliability assessment. This paper describes an on-line probabilistic method to determine operating limits based on a trade-off between constraint costs and security costs. The probability of the contingencies depend on the existing weather conditions, which therefore has significant impact on the calculated operating limit. In consequence, the proposed method allows power flow to exceed the N-1 limit during normal weather. Under adverse weather conditions the N-1 criteria should be maintained. 15 refs., 13 figs

  17. The Underbelly of Global Security

    DEFF Research Database (Denmark)

    Mynster Christensen, Maya

    2015-01-01

    -militias, facilitated by a British security company and the Sierra Leone government. In doing so, the article contributes to the ongoing scholarly debate on the privatization of security by offering a “local” ethnographically informed perspective on the micro-dynamics of “global” security. It is argued that the supply......In the aftermath of the Sierra Leone civil war, demobilized militia soldiers have become an attractive resource to private security companies. Based on extensive ethnographic fieldwork, this article traces the outsourcing of security at American military bases in Iraq to Sierra Leonean ex...... of global security depends on a form of local immobility: on a population that is “stuck”, yet constantly on the move to seize opportunities for survival and recognition. Structured by a chronological account of the recruitment, deployment, and deportation of Sierra Leonean ex-militias, the article...

  18. A Survey on Security-Aware Measurement in SDN

    Directory of Open Access Journals (Sweden)

    Heng Zhang

    2018-01-01

    Full Text Available Software-defined networking (SDN is one of the most prevailing networking paradigms in current and next-generation networks. Basically, the highly featured separation of control and data planes makes SDN a proper solution towards many practical problems that challenge legacy networks, for example, energy efficiency, dynamic network configuration, agile network measurement, and flexible network deployment. Although the SDN and its applications have been extensively studied for several years, the research of SDN security is still in its infancy. Typically, the SDN suffers from architecture defect and OpenFlow protocol loopholes such as single controller problem, deficiency of communication verification, and network resources constraint. Hence, network measurement is a fundamental technique of protecting SDN against the above security threats. Specifically, network measurement aims to understand and quantify a variety of network behaviors to facilitate network management and monitoring, anomaly detection, network troubleshooting, and the establishment of security mechanisms. In this paper, we present a systematic survey on security-aware measurement technology in SDN. In particular, we first review the basic architecture of SDN and corresponding security challenges. Then, we investigate two performance measurement techniques in SDN, namely, link latency and available bandwidth measurements. After that, we further provide a general overview of topology measurement in SDN including intradomain and interdomain topology discovering techniques. Finally, we list three interesting future directions of security-aware measurement in SDN followed by giving conclusion remarks.

  19. Changes in cytoskeletal dynamics and nonlinear rheology with metastatic ability in cancer cell lines

    International Nuclear Information System (INIS)

    Coughlin, Mark F; Fredberg, Jeffrey J

    2013-01-01

    Metastatic outcome is impacted by the biophysical state of the primary tumor cell. To determine if changes in cancer cell biophysical properties facilitate metastasis, we quantified cytoskeletal biophysics in well-characterized human skin, bladder, prostate and kidney cell line pairs that differ in metastatic ability. Using magnetic twisting cytometry with optical detection, cytoskeletal dynamics was observed through spontaneous motion of surface bound marker beads and nonlinear rheology was characterized through large amplitude forced oscillations of probe beads. Measurements of cytoskeletal dynamics and nonlinear rheology differed between strongly and weakly metastatic cells. However, no set of biophysical parameters changed systematically with metastatic ability across all cell lines. Compared to their weakly metastatic counterparts, the strongly metastatic kidney cancer cells exhibited both increased cytoskeletal dynamics and stiffness at large deformation which are thought to facilitate the process of vascular invasion. (paper)

  20. Dynamic Voltage Stability Studies using a Modified IEEE 30-Bus System

    Directory of Open Access Journals (Sweden)

    Oluwafemi Emmanuel Oni

    2016-09-01

    Full Text Available Power System stability is an essential study in the planning and operation of an efficient, economic, reliable and secure electric power system because it encompasses all the facet of power systems operations, from planning, to conceptual design stages of the project as well as during the systems operating life span. This paper presents different scenario of power system stability studies on a modified IEEE 30-bus system which is subjected to different faults conditions. A scenario whereby the longest high voltage alternating current (HVAC line is replaced with a high voltage direct current (HVDC line was implemented. The results obtained show that the HVDC line enhances system stability more compared to the contemporary HVAC line. Dynamic analysis using RMS simulation tool was used on DigSILENT PowerFactory.

  1. Coastal Ocean Ecosystem Dynamics Imager Pointing Line-of-Sight Solution Development and Testing

    Data.gov (United States)

    National Aeronautics and Space Administration — A stable pointing line of sight solution is developed and tested in support of the Coastal Ocean Ecosystem Dynamics Imager for the GEOstationary Coastal and Air...

  2. Extending the Capabilities of the Mooring Analysis Program: A Survey of Dynamic Mooring Line Theories for Integration into FAST: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Masciola, M.; Jonkman, J.; Robertson, A.

    2014-03-01

    Techniques to model dynamic mooring lines come in various forms. The most widely used models include either a heuristic representation of the physics (such as a Lumped-Mass, LM, system), a Finite-Element Analysis (FEA) discretization of the lines (discretized in space), or a Finite-Difference (FD) model (which is discretized in both space and time). In this paper, we explore the features of the various models, weigh the advantages of each, and propose a plan for implementing one dynamic mooring line model into the open-source Mooring Analysis Program (MAP). MAP is currently used as a module for the FAST offshore wind turbine computer-aided engineering (CAE) tool to model mooring systems quasi-statically, although dynamic mooring capabilities are desired. Based on the exploration in this manuscript, the lumped-mass representation is selected for implementation in MAP based on its simplicity, computational cost, and ability to provide similar physics captured by higher-order models.

  3. Dynamical analysis of the magnetic field line evolution in tokamaks with ergodic limiters

    Energy Technology Data Exchange (ETDEWEB)

    Ullmann, Kai; Caldas, Ibere L. [Sao Paulo Univ., SP (Brazil). Inst. de Fisica

    1997-12-31

    Full text. Magnetic ergodic limiters are commonly used to control chaos in the tokamak border and several models have been developed to study the influence of these limiters on the magnetic field line evolution in the tokamak vessel. In this work we derive a bidimensional symplectic mapping describing this evolution with toroidal corrections. Poincare plots presenting typical Hamiltonian behaviour, such as island chains and hetero clinic and homo clinic orbits are obtained. Then we perform the dynamical analysis of these Poincare plots using standard algorithms such as calculation of Lyapunov exponents, safety factors, FFT spectra and parameters space plots to perform the dynamical analysis. (author)

  4. Dynamic analysis and vibration testing of CFRP drive-line system used in heavy-duty machine tool

    Science.gov (United States)

    Yang, Mo; Gui, Lin; Hu, Yefa; Ding, Guoping; Song, Chunsheng

    2018-03-01

    Low critical rotary speed and large vibration in the metal drive-line system of heavy-duty machine tool affect the machining precision seriously. Replacing metal drive-line with the CFRP drive-line can effectively solve this problem. Based on the composite laminated theory and the transfer matrix method (TMM), this paper puts forward a modified TMM to analyze dynamic characteristics of CFRP drive-line system. With this modified TMM, the CFRP drive-line of a heavy vertical miller is analyzed. And the finite element modal analysis model of the shafting is established. The results of the modified TMM and finite element analysis (FEA) show that the modified TMM can effectively predict the critical rotary speed of CFRP drive-line. And the critical rotary speed of CFRP drive-line is 20% higher than that of the original metal drive-line. Then, the vibration of the CFRP and the metal drive-line were tested. The test results show that application of the CFRP drive shaft in the drive-line can effectively reduce the vibration of the heavy-duty machine tool.

  5. Numerical method of lines for the relaxational dynamics of nematic liquid crystals.

    Science.gov (United States)

    Bhattacharjee, A K; Menon, Gautam I; Adhikari, R

    2008-08-01

    We propose an efficient numerical scheme, based on the method of lines, for solving the Landau-de Gennes equations describing the relaxational dynamics of nematic liquid crystals. Our method is computationally easy to implement, balancing requirements of efficiency and accuracy. We benchmark our method through the study of the following problems: the isotropic-nematic interface, growth of nematic droplets in the isotropic phase, and the kinetics of coarsening following a quench into the nematic phase. Our results, obtained through solutions of the full coarse-grained equations of motion with no approximations, provide a stringent test of the de Gennes ansatz for the isotropic-nematic interface, illustrate the anisotropic character of droplets in the nucleation regime, and validate dynamical scaling in the coarsening regime.

  6. Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line

    International Nuclear Information System (INIS)

    Mingesz, Robert; Gingl, Zoltan; Kish, Laszlo B.

    2008-01-01

    A pair of Kirchhoff-loop-Johnson(-like)-Noise communicators, which is able to work over variable ranges, was designed and built. Tests have been carried out on a model-line performance characteristics were obtained for ranges beyond the ranges of any known direct quantum communication channel and they indicate unrivalled signal fidelity and security performance of the exchanged raw key bits. This simple device has single-wire secure key generation and sharing rates of 0.1, 1, 10, and 100 bit/second for corresponding copper wire diameters/ranges of 21 mm/2000 km, 7 mm/200 km, 2.3 mm/20 km, and 0.7 mm/2 km, respectively and it performs with 0.02% raw-bit error rate (99.98% fidelity). The raw-bit security of this practical system significantly outperforms raw-bit quantum security. Current injection breaking tests show zero bit eavesdropping ability without triggering the alarm signal, therefore no multiple measurements are needed to build an error statistics to detect the eavesdropping as in quantum communication. Wire resistance based breaking tests of Bergou-Scheuer-Yariv type give an upper limit of eavesdropped raw-bit ratio of 0.19% and this limit is inversely proportional to the sixth power of cable diameter. Hao's breaking method yields zero (below measurement resolution) eavesdropping information

  7. Investigating Margin and Grounding Line Dynamics with a Coupled Ice and Sea Level Model

    Science.gov (United States)

    Kuchar, J.; Milne, G. A.

    2017-12-01

    We present results from the coupling of an adaptive mesh glaciological model (BISICLES) with a model of glacial isostatic adjustment and sea level. We apply this coupled model to study the deglaciation of the Greenland Ice Sheet (GrIS) from the last glacial maximum. The proximity of the GrIS to the much larger Laurentide results in an east-west gradient in sea level rates across Greenland during the deglaciation. We investigate the impacts of this sea level gradient on ice and grounding line dynamics at the margins, as well as the influence of both local and non-local ice on sea level and ice dynamics.

  8. Intelligent on-line fault tolerant control for unanticipated catastrophic failures.

    Science.gov (United States)

    Yen, Gary G; Ho, Liang-Wei

    2004-10-01

    As dynamic systems become increasingly complex, experience rapidly changing environments, and encounter a greater variety of unexpected component failures, solving the control problems of such systems is a grand challenge for control engineers. Traditional control design techniques are not adequate to cope with these systems, which may suffer from unanticipated dynamic failures. In this research work, we investigate the on-line fault tolerant control problem and propose an intelligent on-line control strategy to handle the desired trajectories tracking problem for systems suffering from various unanticipated catastrophic faults. Through theoretical analysis, the sufficient condition of system stability has been derived and two different on-line control laws have been developed. The approach of the proposed intelligent control strategy is to continuously monitor the system performance and identify what the system's current state is by using a fault detection method based upon our best knowledge of the nominal system and nominal controller. Once a fault is detected, the proposed intelligent controller will adjust its control signal to compensate for the unknown system failure dynamics by using an artificial neural network as an on-line estimator to approximate the unexpected and unknown failure dynamics. The first control law is derived directly from the Lyapunov stability theory, while the second control law is derived based upon the discrete-time sliding mode control technique. Both control laws have been implemented in a variety of failure scenarios to validate the proposed intelligent control scheme. The simulation results, including a three-tank benchmark problem, comply with theoretical analysis and demonstrate a significant improvement in trajectory following performance based upon the proposed intelligent control strategy.

  9. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  10. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  11. Droplets and the three-phase contact line at the nano-scale. Statics and dynamics

    Science.gov (United States)

    Yatsyshin, Petr; Sibley, David; Savva, Nikos; Kalliadasis, Serafim

    2014-11-01

    Understanding the behaviour of the solid-liquid-vapour contact line at the scale of several tens of molecular diameters is important in wetting hydrodynamics with applications in micro- and nano-fluidics, including the design of lab-on-a-chip devices and surfaces with specific wetting properties. Due to the fluid inhomogeneity at the nano-scale, the application of continuum-mechanical approaches is limited, and a natural way to remedy this is to seek descriptions accounting for the non-local molecular-level interactions. Density Functional Theory (DFT) for fluids offers a statistical-mechanical framework based on expressing the free energy of the fluid-solid pair as a functional of the spatially varying fluid density. DFT allows us to investigate small drops deposited on planar substrates whilst keeping track of the microscopic structural details of the fluid. Starting from a model of intermolecular forces, we systematically obtain interfaces, surface tensions, and the microscopic contact angle. Using a dynamic extension of equilibrium DFT, we investigate the diffusion-driven evolution of the three-phase contact line to gain insight into the dynamic behaviour of the microscopic contact angle, which is still under debate.

  12. Dynamical Analysis, Synchronization, Circuit Design, and Secure Communication of a Novel Hyperchaotic System

    Directory of Open Access Journals (Sweden)

    Li Xiong

    2017-01-01

    Full Text Available This paper is devoted to introduce a novel fourth-order hyperchaotic system. The hyperchaotic system is constructed by adding a linear feedback control level based on a modified Lorenz-like chaotic circuit with reduced number of amplifiers. The local dynamical entities, such as the basic dynamical behavior, the divergence, the eigenvalue, and the Lyapunov exponents of the new hyperchaotic system, are all investigated analytically and numerically. Then, an active control method is derived to achieve global chaotic synchronization of the novel hyperchaotic system through making the synchronization error system asymptotically stable at the origin based on Lyapunov stability theory. Next, the proposed novel hyperchaotic system is applied to construct another new hyperchaotic system with circuit deformation and design a new hyperchaotic secure communication circuit. Furthermore, the implementation of two novel electronic circuits of the proposed hyperchaotic systems is presented, examined, and realized using physical components. A good qualitative agreement is shown between the simulations and the experimental results around 500 kHz and below 1 MHz.

  13. A three-dimensional full Stokes model of the grounding line dynamics: effect of a pinning point beneath the ice shelf

    Directory of Open Access Journals (Sweden)

    L. Favier

    2012-01-01

    Full Text Available The West Antarctic ice sheet is confined by a large area of ice shelves, fed by inland ice through fast flowing ice streams. The dynamics of the grounding line, which is the line-boundary between grounded ice and the downstream ice shelf, has a major influence on the dynamics of the whole ice sheet. However, most ice sheet models use simplifications of the flow equations, as they do not include all the stress components, and are known to fail in their representation of the grounding line dynamics. Here, we present a 3-D full Stokes model of a marine ice sheet, in which the flow problem is coupled with the evolution of the upper and lower free surfaces, and the position of the grounding line is determined by solving a contact problem between the shelf/sheet lower surface and the bedrock. Simulations are performed using the open-source finite-element code Elmer/Ice within a parallel environment. The model's ability to cope with a curved grounding line and the effect of a pinning point beneath the ice shelf are investigated through prognostic simulations. Starting from a steady state, the sea level is slightly decreased to create a contact point between a seamount and the ice shelf. The model predicts a dramatic decrease of the shelf velocities, leading to an advance of the grounding line until both grounded zones merge together, during which an ice rumple forms above the contact area at the pinning point. Finally, we show that once the contact is created, increasing the sea level to its initial value does not release the pinning point and has no effect on the ice dynamics, indicating a stabilising effect of pinning points.

  14. On-line learning in radial basis functions networks

    OpenAIRE

    Freeman, Jason; Saad, David

    1997-01-01

    An analytic investigation of the average case learning and generalization properties of Radial Basis Function Networks (RBFs) is presented, utilising on-line gradient descent as the learning rule. The analytic method employed allows both the calculation of generalization error and the examination of the internal dynamics of the network. The generalization error and internal dynamics are then used to examine the role of the learning rate and the specialization of the hidden units, which gives ...

  15. Interactive telemedicine solution based on a secure mHealth application.

    Science.gov (United States)

    Eldeib, Ayman M

    2014-01-01

    In dynamic healthcare environments, caregivers and patients are constantly moving. To increase the healthcare quality when it is necessary, caregivers need the ability to reach each other and securely access medical information and services from wherever they happened to be. This paper presents an Interactive Telemedicine Solution (ITS) to facilitate and automate the communication within a healthcare facility via Voice over Internet Protocol (VOIP), regular mobile phones, and Wi-Fi connectivity. Our system has the capability to exchange/provide securely healthcare information/services across geographic barriers through 3G/4G wireless communication network. Our system assumes the availability of an Electronic Health Record (EHR) system locally in the healthcare organization and/or on the cloud network such as a nation-wide EHR system. This paper demonstrate the potential of our system to provide effectively and securely remote healthcare solution.

  16. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  17. Adaptive Pulsed Laser Line Extraction for Terrain Reconstruction using a Dynamic Vision Sensor

    Directory of Open Access Journals (Sweden)

    Christian eBrandli

    2014-01-01

    Full Text Available Mobile robots need to know the terrain in which they are moving for path planning and obstacle avoidance. This paper proposes the combination of a bio-inspired, redundancy-suppressing dynamic vision sensor with a pulsed line laser to allow fast terrain reconstruction. A stable laser stripe extraction is achieved by exploiting the sensor’s ability to capture the temporal dynamics in a scene. An adaptive temporal filter for the sensor output allows a reliable reconstruction of 3D terrain surfaces. Laser stripe extractions up to pulsing frequencies of 500Hz were achieved using a line laser of 3mW at a distance of 45cm using an event-based algorithm that exploits the sparseness of the sensor output. As a proof of concept, unstructured rapid prototype terrain samples have been successfully reconstructed with an accuracy of 2mm.

  18. PRIVATE SECURITY IN SPORT

    Directory of Open Access Journals (Sweden)

    Dragan Vukasović

    2011-09-01

    Full Text Available Given the importance of sport for international integration, affirmation, a sense of belonging and other values of general interest, in order to maintain and open new prospects of development, it is necessary to form the private security system along with state security system, with a view to creating conditions for development sports athletes to achieve better results both in domestic and international competitions. Private security is only one element of an integrated security system which, with its efficient organization with the use of adequate means and measures should provide answers to new challenges, risks and threats. Private security in line with the new understanding of the concept of security has an important role in providing athletes.

  19. Network secure communications based on beam halo-chaos

    International Nuclear Information System (INIS)

    Liu Qiang; Fang Jinqing; Li Yong

    2010-01-01

    Based on beam halo-chaos synchronization in the beam transport network (line)with small-world effect, using three synchronization methods:the driver-response synchronization, small-world topology coupling synchronization and multi-local small-world topology coupling synchronization, three kinds of secure communication projects were designed respectively, and were studied numerically by the Simulink tool of the Matlab software. Numerical experimental results demonstrate that encryption and decryption of the original signal are realized successfully. It provides effective theoretical foundation and reference for the next engineering design and network experiment. (authors)

  20. Ultrafast method of calculating the dynamic spectral line shapes for integrated modelling of plasmas

    International Nuclear Information System (INIS)

    Lisitsa, V.S.

    2009-01-01

    An ultrafast code for spectral line shape calculations is presented to be used in the integrated modelling of plasmas. The code is based on the close analogy between two mechanisms: (i) Dicke narrowing of the Doppler-broadened spectral lines and (ii) transition from static to impact regime in the Stark broadening. The analogy makes it possible to describe the dynamic Stark broadening in terms of an analytical functional of the static line shape. A comparison of new method with the widely used Frequency Fluctuating Method (FFM) developed by the Marseille University group (B. Talin, R. Stamm, et al.) shows good agreement, with the new method being faster than the standard FFM by nearly two orders of magnitude. The method proposed may significantly simplify the radiation transport modeling and opens new possibilities for integrated modeling of the edge and divertor plasma in tokamaks. (author)

  1. A signal-flow-graph approach to on-line gradient calculation.

    Science.gov (United States)

    Campolucci, P; Uncini, A; Piazza, F

    2000-08-01

    A large class of nonlinear dynamic adaptive systems such as dynamic recurrent neural networks can be effectively represented by signal flow graphs (SFGs). By this method, complex systems are described as a general connection of many simple components, each of them implementing a simple one-input, one-output transformation, as in an electrical circuit. Even if graph representations are popular in the neural network community, they are often used for qualitative description rather than for rigorous representation and computational purposes. In this article, a method for both on-line and batch-backward gradient computation of a system output or cost function with respect to system parameters is derived by the SFG representation theory and its known properties. The system can be any causal, in general nonlinear and time-variant, dynamic system represented by an SFG, in particular any feedforward, time-delay, or recurrent neural network. In this work, we use discrete-time notation, but the same theory holds for the continuous-time case. The gradient is obtained in a straightforward way by the analysis of two SFGs, the original one and its adjoint (obtained from the first by simple transformations), without the complex chain rule expansions of derivatives usually employed. This method can be used for sensitivity analysis and for learning both off-line and on-line. On-line learning is particularly important since it is required by many real applications, such as digital signal processing, system identification and control, channel equalization, and predistortion.

  2. Stabilization and control of tie-line power flow of microgrid including wind generation by distributed energy storage

    Energy Technology Data Exchange (ETDEWEB)

    Molina, M.G.; Mercado, P.E. [CONICET, Instituto de Energia Electrica, Universidad Nacional de San Juan, Av. Libertador San Martin Oeste 1109, J5400ARL San Juan (Argentina)

    2010-06-15

    High penetration of wind generation in electrical microgrids causes fluctuations of tie-line power flow and significantly affects the power system operation. This can lead to severe problems, such as system frequency oscillations, and/or violations of power lines capability. With proper control, a distribution static synchronous compensator (DSTATCOM) integrated with superconducting magnetic energy storage (SMES) is able to significantly enhance the dynamic security of the power system. This paper proposes the use of a SMES system in combination with a DSTATCOM as effective distributed energy storage (DES) for stabilization and control of the tie-line power flow of microgrids incorporating wind generation. A new detailed model of the integrated DSTATCOM-SMES device is derived and a novel three-level control scheme is designed. The dynamic performance of the proposed control schemes is fully validated using MATLAB/Simulink. (author)

  3. Dynamic Tunnel Usability Study: Format Recommendations for Synthetic Vision System Primary Flight Displays

    Science.gov (United States)

    Arthur, Jarvis J., III; Prinzel, Lawrence J., III; Kramer, Lynda J.; Bailey, Randall E.

    2006-01-01

    A usability study evaluating dynamic tunnel concepts has been completed under the Aviation Safety and Security Program, Synthetic Vision Systems Project. The usability study was conducted in the Visual Imaging Simulator for Transport Aircraft Systems (VISTAS) III simulator in the form of questionnaires and pilot-in-the-loop simulation sessions. Twelve commercial pilots participated in the study to determine their preferences via paired comparisons and subjective rankings regarding the color, line thickness and sensitivity of the dynamic tunnel. The results of the study showed that color was not significant in pilot preference paired comparisons or in pilot rankings. Line thickness was significant for both pilot preference paired comparisons and in pilot rankings. The preferred line/halo thickness combination was a line width of 3 pixels and a halo of 4 pixels. Finally, pilots were asked their preference for the current dynamic tunnel compared to a less sensitive dynamic tunnel. The current dynamic tunnel constantly gives feedback to the pilot with regard to path error while the less sensitive tunnel only changes as the path error approaches the edges of the tunnel. The tunnel sensitivity comparison results were not statistically significant.

  4. Straight-Line: A nuclear material storage information management system

    International Nuclear Information System (INIS)

    Nilsen, C.; Mangan, D.

    1995-01-01

    Sandia National Laboratories is developing Straight-Line -- a pilot system to demonstrate comprehensive monitoring of nuclear material in storage. Straight-Line is an integrated system of sensors providing information that will enhance the safety, security, and international accountability of stored nuclear material. The goals of this effort are to: (1) Provide the right sensor information to the right user immediately. (2) Reduce the expenses, risks, and frequency of human inspection of the material. (3) Provide trustworthy data to international inspectors to minimize their need to make on site inspections. In pursuit of these goals, Straight-Line unites technology from Sandia's Authenticated Item Monitoring System (AIMS) and other programs to communicate the authenticated status of the monitored item back to central magazine receivers. Straight-Line, however, incorporates several important features not found in previous systems: (1) Information Security -- the ability to collect and safely disseminate both classified and unclassified sensor data to users on a need-to-know basis. (2) Integrate into a single system the monitoring needs of safety, security, and international accountability. (3) Incorporate the use of sensors providing analog or digital output. This paper will present the overall architecture and status of the Straight-Line project

  5. Straight-Line: A nuclear material storage information management system

    Energy Technology Data Exchange (ETDEWEB)

    Nilsen, C.; Mangan, D.

    1995-07-01

    Sandia National Laboratories is developing Straight-Line -- a pilot system to demonstrate comprehensive monitoring of nuclear material in storage. Straight-Line is an integrated system of sensors providing information that will enhance the safety, security, and international accountability of stored nuclear material. The goals of this effort are to: (1) Provide the right sensor information to the right user immediately. (2) Reduce the expenses, risks, and frequency of human inspection of the material. (3) Provide trustworthy data to international inspectors to minimize their need to make on site inspections. In pursuit of these goals, Straight-Line unites technology from Sandia`s Authenticated Item Monitoring System (AIMS) and other programs to communicate the authenticated status of the monitored item back to central magazine receivers. Straight-Line, however, incorporates several important features not found in previous systems: (1) Information Security -- the ability to collect and safely disseminate both classified and unclassified sensor data to users on a need-to-know basis. (2) Integrate into a single system the monitoring needs of safety, security, and international accountability. (3) Incorporate the use of sensors providing analog or digital output. This paper will present the overall architecture and status of the Straight-Line project.

  6. A Secure, Scalable and Elastic Autonomic Computing Systems Paradigm: Supporting Dynamic Adaptation of Self-* Services from an Autonomic Cloud

    Directory of Open Access Journals (Sweden)

    Abdul Jaleel

    2018-05-01

    Full Text Available Autonomic computing embeds self-management features in software systems using external feedback control loops, i.e., autonomic managers. In existing models of autonomic computing, adaptive behaviors are defined at the design time, autonomic managers are statically configured, and the running system has a fixed set of self-* capabilities. An autonomic computing design should accommodate autonomic capability growth by allowing the dynamic configuration of self-* services, but this causes security and integrity issues. A secure, scalable and elastic autonomic computing system (SSE-ACS paradigm is proposed to address the runtime inclusion of autonomic managers, ensuring secure communication between autonomic managers and managed resources. Applying the SSE-ACS concept, a layered approach for the dynamic adaptation of self-* services is presented with an online ‘Autonomic_Cloud’ working as the middleware between Autonomic Managers (offering the self-* services and Autonomic Computing System (requiring the self-* services. A stock trading and forecasting system is used for simulation purposes. The security impact of the SSE-ACS paradigm is verified by testing possible attack cases over the autonomic computing system with single and multiple autonomic managers running on the same and different machines. The common vulnerability scoring system (CVSS metric shows a decrease in the vulnerability severity score from high (8.8 for existing ACS to low (3.9 for SSE-ACS. Autonomic managers are introduced into the system at runtime from the Autonomic_Cloud to test the scalability and elasticity. With elastic AMs, the system optimizes the Central Processing Unit (CPU share resulting in an improved execution time for business logic. For computing systems requiring the continuous support of self-management services, the proposed system achieves a significant improvement in security, scalability, elasticity, autonomic efficiency, and issue resolving time

  7. On the Modelling of Context-Aware Security for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Tomasz Zurek

    2016-01-01

    Full Text Available Security management in wireless networks has to deal with the changing character of the environment, which can further lead to decision making problem for unexpected events. Among a huge list of devices, the mobile ones are especially vulnerable to this situation. The solution for adapting systems and applications to dynamic environments can be context-aware description of the user actions, which gives a possibility to take into account the factors that influence these actions. In the article, we propose a context-aware security adjusting model, which is based on proposition logic and incorporates mechanisms that assist in the reasoning process. The main benefits that differentiate our approach from similar ones are a formal representation of the model, the usage of the whole spectrum of context attributes, the detection and analysis of contextual data integrity, and conflicting rules’ eradication capability. All these traits transcribe into a more effective way of adjusting security measures in accordance with existing circumstances. To illustrate the proposed approach, we present the case study of context-aware security management for mobile devices.

  8. Dynamics of Line-Driven Winds from Disks in Cataclysmic Variables. I. Solution Topology and Wind Geometry

    OpenAIRE

    Feldmeier, Achim; Shlosman, Isaac

    1999-01-01

    We analyze the dynamics of 2-D stationary, line-driven winds from accretion disks in cataclysmic variable stars. The driving force is that of line radiation pressure, in the formalism developed by Castor, Abbott & Klein for O stars. Our main assumption is that wind helical streamlines lie on straight cones. We find that the Euler equation for the disk wind has two eigenvalues, the mass loss rate and the flow tilt angle with the disk. Both are calculated self-consistently. The wind is characte...

  9. The complexity of an investment competition dynamical model with imperfect information in a security market

    International Nuclear Information System (INIS)

    Xin Baogui; Ma Junhai; Gao Qin

    2009-01-01

    We present a nonlinear discrete dynamical model of investment competition with imperfect information for N heterogeneous oligopolists in a security market. In this paper, our focus is on a given three-dimensional model which exhibits highly rich dynamical behaviors. Based on Wen's Hopf bifurcation criterion [Wen GL. Criterion to identify Hopf bifurcations in maps of arbitrary dimension. Phys Rev E 2005;72:026201-3; Wen GL, Xu DL, Han X. On creation of Hopf bifurcations in discrete-time nonlinear systems. Chaos 2002;12(2):350-5] and Kuznetsov's normal form theory [Kuznetsov YA. Elements of applied bifurcation theory. New York: Springer-Verlag; 1998. p. 125-37], we study the model's stability, criterion and direction of Neimark-Sacker bifurcation. Moreover, we numerically simulate a complexity evolution route: fixed point, closed invariant curve, double closed invariant curves, fourfold closed invariant curves, strange attractor, period-3 closed invariant curve, period-3 2-tours, period-4 closed invariant curve, period-4 2-tours.

  10. Base Flood Elevation (BFE) Lines

    Data.gov (United States)

    Department of Homeland Security — The Base Flood Elevation (BFE) table is required for any digital data where BFE lines will be shown on the corresponding Flood Insurance Rate Map (FIRM). Normally if...

  11. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  12. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  13. On-line transient stability assessment of large-scale power systems by using ball vector machines

    International Nuclear Information System (INIS)

    Mohammadi, M.; Gharehpetian, G.B.

    2010-01-01

    In this paper ball vector machine (BVM) has been used for on-line transient stability assessment of large-scale power systems. To classify the system transient security status, a BVM has been trained for all contingencies. The proposed BVM based security assessment algorithm has very small training time and space in comparison with artificial neural networks (ANN), support vector machines (SVM) and other machine learning based algorithms. In addition, the proposed algorithm has less support vectors (SV) and therefore is faster than existing algorithms for on-line applications. One of the main points, to apply a machine learning method is feature selection. In this paper, a new Decision Tree (DT) based feature selection technique has been presented. The proposed BVM based algorithm has been applied to New England 39-bus power system. The simulation results show the effectiveness and the stability of the proposed method for on-line transient stability assessment procedure of large-scale power system. The proposed feature selection algorithm has been compared with different feature selection algorithms. The simulation results demonstrate the effectiveness of the proposed feature algorithm.

  14. Optimization of airport security process

    Science.gov (United States)

    Wei, Jianan

    2017-05-01

    In order to facilitate passenger travel, on the basis of ensuring public safety, the airport security process and scheduling to optimize. The stochastic Petri net is used to simulate the single channel security process, draw the reachable graph, construct the homogeneous Markov chain to realize the performance analysis of the security process network, and find the bottleneck to limit the passenger throughput. Curve changes in the flow of passengers to open a security channel for the initial state. When the passenger arrives at a rate that exceeds the processing capacity of the security channel, it is queued. The passenger reaches the acceptable threshold of the queuing time as the time to open or close the next channel, simulate the number of dynamic security channel scheduling to reduce the passenger queuing time.

  15. A generalized Halanay inequality on impulsive delayed dynamical systems and its applications

    International Nuclear Information System (INIS)

    Wu Quanjun; Zhang Hua; Xiang Lan; Zhou Jin

    2012-01-01

    Highlights: ► A generalized Halanay differential inequality is derived. ► By using the inequality, we can stabilize an unstable dynamical system via impulses. ► The results are applied to chaos-based secure communication systems. ► The results may develop an effective impulsive control strategy. - Abstract: The main objective of this paper is to extend previous results on Halanay inequality for impulsive delayed dynamical systems. Based on the Razumikhin technique, a generalized Halanay differential inequality on impulsive delayed dynamical systems is analytically established. Compared with some existing works, the distinctive feature of this work is that it can be used to stabilize an unstable delayed dynamical system via impulses. The generalized Halanay inequality may be applied to secure communication systems, and a numerical example is given for illustrating and interpreting the theoretical results.

  16. Virtual real-time inspection of nuclear material via VRML and secure web pages

    International Nuclear Information System (INIS)

    Nilsen, C.; Jortner, J.; Damico, J.; Friesen, J.; Schwegel, J.

    1996-01-01

    Sandia National Laboratories'' Straight-Line project is working to provide the right sensor information to the right user to enhance the safety, security, and international accountability of nuclear material. One of Straight-Line''s efforts is to create a system to securely disseminate this data on the Internet''s World-Wide-Web. To make the user interface more intuitive, Sandia has generated a three dimensional VRML (virtual reality modeling language) interface for a secure web page. This paper will discuss the implementation of the Straight-Line secure 3-D web page. A discussion of the pros and cons of a 3-D web page is also presented. The public VRML demonstration described in this paper can be found on the Internet at this address, http://www.ca.sandia.gov/NMM/. A Netscape browser, version 3 is strongly recommended

  17. Virtual real-time inspection of nuclear material via VRML and secure web pages

    International Nuclear Information System (INIS)

    Nilsen, C.; Jortner, J.; Damico, J.; Friesen, J.; Schwegel, J.

    1997-04-01

    Sandia National Laboratories' Straight Line project is working to provide the right sensor information to the right user to enhance the safety, security, and international accountability of nuclear material. One of Straight Line's efforts is to create a system to securely disseminate this data on the Internet's World-Wide-Web. To make the user interface more intuitive, Sandia has generated a three dimensional VRML (virtual reality modeling language) interface for a secure web page. This paper will discuss the implementation of the Straight Line secure 3-D web page. A discussion of the ''pros and cons'' of a 3-D web page is also presented. The public VRML demonstration described in this paper can be found on the Internet at the following address: http://www.ca.sandia.gov/NMM/. A Netscape browser, version 3 is strongly recommended

  18. Water security, risk, and economic growth: Insights from a dynamical systems model

    Science.gov (United States)

    Dadson, Simon; Hall, Jim W.; Garrick, Dustin; Sadoff, Claudia; Grey, David; Whittington, Dale

    2017-08-01

    Investments in the physical infrastructure, human capital, and institutions needed for water resources management have been noteworthy in the development of most civilizations. These investments affect the economy in two distinct ways: (i) by improving the factor productivity of water in multiple economic sectors, especially those that are water intensive such as agriculture and energy and (ii) by reducing acute and chronic harmful effects of water-related hazards like floods, droughts, and water-related diseases. The need for capital investment to mitigate risks and promote economic growth is widely acknowledged, but prior conceptual work on the relationship between water-related investments and economic growth has focused on the productive and harmful roles of water in the economy independently. Here the two influences are combined using a simple, dynamical systems model of water-related investment, risk, and growth. In cases where initial water security is low, initial investment in water-related assets enables growth. Without such investment, losses due to water-related hazards exert a drag on economic growth and may create a poverty trap. The presence and location of the poverty trap is context-specific and depends on the exposure of productive water-related assets to water-related risk. Exogenous changes in water-related risk can potentially push an economy away from a growth path toward a poverty trap. Our investigation shows that an inverted-U-shaped investment relation between the level of investment in water security and the current level of water security leads to faster rates of growth than the alternatives that we consider here, and that this relation is responsible for the "S"-curve that is posited in the literature. These results illustrate the importance of accounting for environmental and health risks in economic models and offer insights for the design of robust policies for investment in water-related productive assets to manage risk, in the face

  19. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  20. Application of Computer Systems of Dynamic Modeling for Evaluation of Protection Behavior of Electric Power Lines

    Directory of Open Access Journals (Sweden)

    F. A. Romaniouk

    2008-01-01

    Full Text Available The paper considers problems pertaining to mathematical modeling of a transformer substation with protected electric power lines. It is proposed to use systems of dynamic modeling for investigations applying a method of calculative experiment with the purpose to evaluate behavior of protection and automation at short circuits. The paper contains comparison of results obtained with the help of program-simulated complex on the basis of a complex mathematical model of an object and with the help of dynamic modeling system – MathLab.

  1. Power system security enhancement with unified power flow controller under multi-event contingency conditions

    Directory of Open Access Journals (Sweden)

    S. Ravindra

    2017-03-01

    Full Text Available Power system security analysis plays key role in enhancing the system security and to avoid the system collapse condition. In this paper, a novel severity function is formulated using transmission line loadings and bus voltage magnitude deviations. The proposed severity function and generation fuel cost objectives are analyzed under transmission line(s and/or generator(s contingency conditions. The system security under contingency conditions is analyzed using optimal power flow problem. An improved teaching learning based optimization (ITLBO algorithm has been presented. To enhance the system security under contingency conditions in the presence of unified power flow controller (UPFC, it is necessary to identify an optimal location to install this device. Voltage source based power injection model of UPFC, incorporation procedure and optimal location identification strategy based on line overload sensitivity indexes are proposed. The entire proposed methodology is tested on standard IEEE-30 bus test system with supporting numerical and graphical results.

  2. On-line dynamic monitoring automotive exhausts: using BP-ANN for distinguishing multi-components

    Science.gov (United States)

    Zhao, Yudi; Wei, Ruyi; Liu, Xuebin

    2017-10-01

    Remote sensing-Fourier Transform infrared spectroscopy (RS-FTIR) is one of the most important technologies in atmospheric pollutant monitoring. It is very appropriate for on-line dynamic remote sensing monitoring of air pollutants, especially for the automotive exhausts. However, their absorption spectra are often seriously overlapped in the atmospheric infrared window bands, i.e. MWIR (3 5μm). Artificial Neural Network (ANN) is an algorithm based on the theory of the biological neural network, which simplifies the partial differential equation with complex construction. For its preferable performance in nonlinear mapping and fitting, in this paper we utilize Back Propagation-Artificial Neural Network (BP-ANN) to quantitatively analyze the concentrations of four typical industrial automotive exhausts, including CO, NO, NO2 and SO2. We extracted the original data of these automotive exhausts from the HITRAN database, most of which virtually overlapped, and established a mixed multi-component simulation environment. Based on Beer-Lambert Law, concentrations can be retrieved from the absorbance of spectra. Parameters including learning rate, momentum factor, the number of hidden nodes and iterations were obtained when the BP network was trained with 80 groups of input data. By improving these parameters, the network can be optimized to produce necessarily higher precision for the retrieved concentrations. This BP-ANN method proves to be an effective and promising algorithm on dealing with multi-components analysis of automotive exhausts.

  3. Islanding the power grid on the transmission level: less connections for more security

    Science.gov (United States)

    Mureddu, Mario; Caldarelli, Guido; Damiano, Alfonso; Scala, Antonio; Meyer-Ortmanns, Hildegard

    2016-10-01

    Islanding is known as a management procedure of the power system that is implemented at the distribution level to preserve sensible loads from outages and to guarantee the continuity in electricity supply, when a high amount of distributed generation occurs. In this paper we study islanding on the level of the transmission grid and shall show that it is a suitable measure to enhance energy security and grid resilience. We consider the German and Italian transmission grids. We remove links either randomly to mimic random failure events, or according to a topological characteristic, their so-called betweenness centrality, to mimic an intentional attack and test whether the resulting fragments are self-sustainable. We test this option via the tool of optimized DC power flow equations. When transmission lines are removed according to their betweenness centrality, the resulting islands have a higher chance of being dynamically self-sustainable than for a random removal. Less connections may even increase the grid’s stability. These facts should be taken into account in the design of future power grids.

  4. Enabling SDN in VANETs: What is the Impact on Security?

    Science.gov (United States)

    Di Maio, Antonio; Palattella, Maria Rita; Soua, Ridha; Lamorte, Luca; Vilajosana, Xavier; Alonso-Zarate, Jesus; Engel, Thomas

    2016-12-06

    The demand for safe and secure journeys over roads and highways has been growing at a tremendous pace over recent decades. At the same time, the smart city paradigm has emerged to improve citizens' quality of life by developing the smart mobility concept. Vehicular Ad hoc NETworks (VANETs) are widely recognized to be instrumental in realizing such concept, by enabling appealing safety and infotainment services. Such networks come with their own set of challenges, which range from managing high node mobility to securing data and user privacy. The Software Defined Networking (SDN) paradigm has been identified as a suitable solution for dealing with the dynamic network environment, the increased number of connected devices, and the heterogeneity of applications. While some preliminary investigations have been already conducted to check the applicability of the SDN paradigm to VANETs, and its presumed benefits for managing resources and mobility, it is still unclear what impact SDN will have on security and privacy. Security is a relevant issue in VANETs, because of the impact that threats can have on drivers' behavior and quality of life. This paper opens a discussion on the security threats that future SDN-enabled VANETs will have to face, and investigates how SDN could be beneficial in building new countermeasures. The analysis is conducted in real use cases (smart parking, smart grid of electric vehicles, platooning, and emergency services), which are expected to be among the vehicular applications that will most benefit from introducing an SDN architecture.

  5. Off-Line and Dynamic Production Scheduling – A Comparative Case Study

    OpenAIRE

    Bożek Andrzej; Wysocki Marian

    2016-01-01

    A comprehensive case study of manufacturing scheduling solutions development is given. It includes highly generalized scheduling problem as well as a few scheduling modes, methods and problem models. The considered problem combines flexible job shop structure, lot streaming with variable sublots, transport times, setup times, and machine calendars. Tabu search metaheuristic and constraint programming methods have been used for the off-line scheduling. Two dynamic scheduling methods have also ...

  6. Study on dynamic behavior analysis of towed line array sensor

    Directory of Open Access Journals (Sweden)

    Hyun Kyoung Shin

    2012-03-01

    Full Text Available A set of equations of motion is derived for vibratory motions of an underwater cable connected to a moving vehicle at one end and with drogues at the other end. From the static analysis, cable configurations are obtained for different vehicle speeds and towing pretensions are determined by fluid resistance of drogues. Also the dynamic analysis is required to predict its vibratory motion. Nonlinear fluid drag forces greatly influence the dynamic tension. In this study, a numerical analysis program was developed to find out the characteristic of cable behaviour. The motion is described in terms of space and time coordinates based on Chebyshev polynomial expansions. For the spatial integration the collocation method is employed and the Newmark method is applied for the time integration. Dynamic tensions, displacements, velocities, accelerations were predicted in the time domain while natural frequencies and transfer functions were obtained in the frequency domain.

  7. Dynamics of the density of quantized vortex lines in counterflow turbulence: Experimental investigation

    Science.gov (United States)

    Varga, E.; Skrbek, L.

    2018-02-01

    Recently the interest in thermal counterflow of superfluid 4He, the most extensively studied form of quantum turbulence, has been renewed. Particularly, an intense theoretical debate has arisen about what form, if any, of the so-called Vinen equation accurately captures the dynamics of vortex line density, L . We address this problem experimentally, in a 21 cm long channel of square 7 ×7 mm2 cross section. Based on large statistics of second-sound data measured in nonequilibrium square-wave modulated thermally induced counterflow we investigate the phase portrait of the general form of the governing dynamical equation and conclude that for sparse tangles (L ≲105cm-2) all proposed forms of this equation based on the concept of a homogeneous random tangle of quantized vortices provide equally adequate descriptions of the growth of L , while for dense tangles (L >105cm-2) none of them is satisfactory or able to account for the significant slow-down in tangle growth rate as the steady state is approached. We claim, however, that agreement with theory is recovered if the geometrical parameter c2 introduced in numerical studies by K. W. Schwarz [Phys. Rev. B 38, 2398 (1988), 10.1103/PhysRevB.38.2398] is allowed to vary with vortex line density which also greatly improves the prediction of the observed early decay rate.

  8. Trust in Security-Policy Enforcement Mechanisms

    National Research Council Canada - National Science Library

    Schneider, Fred B; Morrisett, Greg

    2006-01-01

    .... but provides the strong security guarantees of modern languages such as Java. A second avenue of language-based work explored a general class of policy enforcement mechanism based on in-line reference monitors (IRM...

  9. Integrated assessment and scenarios simulation of urban water security system in the southwest of China with system dynamics analysis.

    Science.gov (United States)

    Yin, Su; Dongjie, Guan; Weici, Su; Weijun, Gao

    2017-11-01

    The demand for global freshwater is growing, while global freshwater available for human use is limited within a certain time and space. Its security has significant impacts on both the socio-economic system and ecological system. Recently, studies have focused on the urban water security system (UWSS) in terms of either water quantity or water quality. In this study, water resources, water environment, and water disaster issues in the UWSS were combined to establish an evaluation index system with system dynamics (SD) and geographic information systems (GIS). The GIS method performs qualitative analysis from the perspective of the spatial dimension; meanwhile, the SD method performs quantitative calculation about related water security problems from the perspective of the temporal dimension. We established a UWSS model for Guizhou province, China to analyze influencing factors, main driving factors, and system variation law, by using the SD method. We simulated the water security system from 2005 to 2025 under four scenarios (Guiyang scenario, Zunyi scenario, Bijie scenario and combined scenario). The results demonstrate that: (1) the severity of water security in cities is ranked as follows: three cities are secure in Guizhou province, four cities are in basic security and two cities are in a situation of insecurity from the spatial dimension of GIS through water security synthesis; and (2) the major driving factors of UWSS in Guizhou province include agricultural irrigation water demand, soil and water losses area, a ratio increase to the standard of water quality, and investment in environmental protection. A combined scenario is the best solution for UWSS by 2025 in Guizhou province under the four scenarios from the temporal dimension of SD. The results of this study provide a useful suggestion for the management of freshwater for the cities of Guizhou province in southwest China.

  10. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  11. Straight-Line -- A nuclear material storage information management system

    International Nuclear Information System (INIS)

    Nilsen, C.; Mangan, D.

    1995-01-01

    Sandia National Laboratories is developing Straight-Line -- a pilot system to demonstrate comprehensive monitoring of nuclear material in storage. Straight-Line is an integrated system of sensors providing information that will enhance the safety, security, and international accountability of stored nuclear material. The goals of this effort are to (1) Provide the right sensor information to the right user in a timely manner. (2) Reduce the expenses, risks, and frequency of human inspection of the material. (3) Provide trustworthy data to international inspectors to minimize their need to make on site inspections. In pursuit of these goals, Straight-Line unites technology from Sandia's Authenticated Item Monitoring System (AIMS) and other programs to communicate the authenticated status of the monitored item back to central magazine receivers. Straight-Line, however, incorporates several important features not found in previous systems: (1) Information Security -- the ability to collect and safely disseminate both classified and unclassified sensor data to users on a need-to-know basis. (2) Integrate into a single system the monitoring needs of safety, security, and international accountability. (3) Incorporate the use of sensors providing analog or digital output. This paper will present the overall architecture and status of the Straight-Line project

  12. Straight-Line -- A nuclear material storage information management system

    Energy Technology Data Exchange (ETDEWEB)

    Nilsen, C. [Sandia National Labs., Livermore, CA (United States); Mangan, D. [Sandia National Labs., Albuquerque, NM (United States)

    1995-12-31

    Sandia National Laboratories is developing Straight-Line -- a pilot system to demonstrate comprehensive monitoring of nuclear material in storage. Straight-Line is an integrated system of sensors providing information that will enhance the safety, security, and international accountability of stored nuclear material. The goals of this effort are to (1) Provide the right sensor information to the right user in a timely manner. (2) Reduce the expenses, risks, and frequency of human inspection of the material. (3) Provide trustworthy data to international inspectors to minimize their need to make on site inspections. In pursuit of these goals, Straight-Line unites technology from Sandia`s Authenticated Item Monitoring System (AIMS) and other programs to communicate the authenticated status of the monitored item back to central magazine receivers. Straight-Line, however, incorporates several important features not found in previous systems: (1) Information Security -- the ability to collect and safely disseminate both classified and unclassified sensor data to users on a need-to-know basis. (2) Integrate into a single system the monitoring needs of safety, security, and international accountability. (3) Incorporate the use of sensors providing analog or digital output. This paper will present the overall architecture and status of the Straight-Line project.

  13. Methods for Calculating Frequency of Maintenance of Complex Information Security System Based on Dynamics of Its Reliability

    Science.gov (United States)

    Varlataya, S. K.; Evdokimov, V. E.; Urzov, A. Y.

    2017-11-01

    This article describes a process of calculating a certain complex information security system (CISS) reliability using the example of the technospheric security management model as well as ability to determine the frequency of its maintenance using the system reliability parameter which allows one to assess man-made risks and to forecast natural and man-made emergencies. The relevance of this article is explained by the fact the CISS reliability is closely related to information security (IS) risks. Since reliability (or resiliency) is a probabilistic characteristic of the system showing the possibility of its failure (and as a consequence - threats to the protected information assets emergence), it is seen as a component of the overall IS risk in the system. As it is known, there is a certain acceptable level of IS risk assigned by experts for a particular information system; in case of reliability being a risk-forming factor maintaining an acceptable risk level should be carried out by the routine analysis of the condition of CISS and its elements and their timely service. The article presents a reliability parameter calculation for the CISS with a mixed type of element connection, a formula of the dynamics of such system reliability is written. The chart of CISS reliability change is a S-shaped curve which can be divided into 3 periods: almost invariable high level of reliability, uniform reliability reduction, almost invariable low level of reliability. Setting the minimum acceptable level of reliability, the graph (or formula) can be used to determine the period of time during which the system would meet requirements. Ideally, this period should not be longer than the first period of the graph. Thus, the proposed method of calculating the CISS maintenance frequency helps to solve a voluminous and critical task of the information assets risk management.

  14. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas

    Directory of Open Access Journals (Sweden)

    Ze Wang

    2015-09-01

    Full Text Available Network security is one of the most important issues in mobile sensor networks (MSNs. Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA is proposed to resist malicious attacks by using mobile nodes’ dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  15. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.

    Science.gov (United States)

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-09-25

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  16. On the relict recombination lines

    International Nuclear Information System (INIS)

    Bershtejn, I.N.; Bernshtejn, D.N.; Dubrovich, V.K.

    1977-01-01

    Accurate numerical calculation of intensities and profiles of hydrogen recombination lines of cosmological origin is made. Relie radiation distortions stipulated by recombination quantum release at the irrevocable recombination are investigated. Mean number calculation is given for guantums educing for one irrevocably-lost electron. The account is taken of the educed quantums interraction with matter. The main quantum-matter interrraction mechanisms are considered: electronic blow broadening; free-free, free-bound, bound-bound absorptions Recombination dynamics is investigated depending on hydrogen density and total density of all the matter kinds in the Universe

  17. The impact of aviation checkpoint queues on optimizing security screening effectiveness

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Adrian J., E-mail: ajlee@citeri.or [Central Illinois Technology and Education Research Institute, 2312 Connie Drive, Springfield, IL 62704-8722 (United States); Jacobson, Sheldon H., E-mail: shj@illinois.ed [Department of Computer Science, University of Illinois at Urbana-Champaign, 201 N. Goodwin Ave. M/C 258, Urbana, IL 61801-2302 (United States)

    2011-08-15

    Passenger screening at aviation security checkpoints is a critical component in protecting airports and aircraft from terrorist threats. Recent developments in screening device technology have increased the ability to detect these threats; however, the average amount of time it takes to screen a passenger still remains a concern. This paper models the queueing process for a multi-level airport checkpoint security system, where multiple security classes are formed through subsets of specialized screening devices. An optimal static assignment policy is obtained which minimizes the steady-state expected amount of time a passenger spends in the security system. Then, an optimal dynamic assignment policy is obtained through a transient analysis that balances the expected number of true alarms with the expected amount of time a passenger spends in the security system. Performance of a two-class system is compared to that of a selective security system containing primary and secondary levels of screening. The key contribution is that the resulting optimal assignment policies increase security and passenger throughput by efficiently and effectively utilizing available screening resources.

  18. The impact of aviation checkpoint queues on optimizing security screening effectiveness

    International Nuclear Information System (INIS)

    Lee, Adrian J.; Jacobson, Sheldon H.

    2011-01-01

    Passenger screening at aviation security checkpoints is a critical component in protecting airports and aircraft from terrorist threats. Recent developments in screening device technology have increased the ability to detect these threats; however, the average amount of time it takes to screen a passenger still remains a concern. This paper models the queueing process for a multi-level airport checkpoint security system, where multiple security classes are formed through subsets of specialized screening devices. An optimal static assignment policy is obtained which minimizes the steady-state expected amount of time a passenger spends in the security system. Then, an optimal dynamic assignment policy is obtained through a transient analysis that balances the expected number of true alarms with the expected amount of time a passenger spends in the security system. Performance of a two-class system is compared to that of a selective security system containing primary and secondary levels of screening. The key contribution is that the resulting optimal assignment policies increase security and passenger throughput by efficiently and effectively utilizing available screening resources.

  19. Application of HGSO to security based optimal placement and parameter setting of UPFC

    International Nuclear Information System (INIS)

    Tarafdar Hagh, Mehrdad; Alipour, Manijeh; Teimourzadeh, Saeed

    2014-01-01

    Highlights: • A new method for solving the security based UPFC placement and parameter setting problem is proposed. • The proposed method is a global method for all mixed-integer problems. • The proposed method has the ability of the parallel search in binary and continues space. • By using the proposed method, most of the problems due to line contingencies are solved. • Comparison studies are done to compare the performance of the proposed method. - Abstract: This paper presents a novel method to solve security based optimal placement and parameter setting of unified power flow controller (UPFC) problem based on hybrid group search optimization (HGSO) technique. Firstly, HGSO is introduced in order to solve mix-integer type problems. Afterwards, the proposed method is applied to the security based optimal placement and parameter setting of UPFC problem. The focus of the paper is to enhance the power system security through eliminating or minimizing the over loaded lines and the bus voltage limit violations under single line contingencies. Simulation studies are carried out on the IEEE 6-bus, IEEE 14-bus and IEEE 30-bus systems in order to verify the accuracy and robustness of the proposed method. The results indicate that by using the proposed method, the power system remains secure under single line contingencies

  20. Understanding human factors in cyber security as a dynamic system

    NARCIS (Netherlands)

    Young, H.J.; Vliet, A.J. van; Ven, J.G.S. van de; Jol, S.C.; Broekman, C.C.M.T.

    2018-01-01

    The perspective of human factors is largely missing from the wider cyber security dialogue and its scope is often limited. We propose a framework in which we consider cyber security as a state of a system. System change is brought on by an entity’s behavior. Interventions are ways of changing

  1. 76 FR 7102 - Simplified Network Application Processing System, On-line Registration and Account Maintenance

    Science.gov (United States)

    2011-02-09

    ... the Chief Counsel for Advocacy of the Small Business Administration that the proposed rule, if adopted... Industry and Security (BIS) amends the Export Administration Regulations to implement a mandatory on-line... in their accounts current. This rulemaking is consistent with the goals and principles of Executive...

  2. Security of supply and line flow following the shut-down of nuclear power plants in Germany. Have shortages to be expected?

    International Nuclear Information System (INIS)

    Kunz, Friedrich; Moest, Dominik

    2011-01-01

    This paper, which examines the impacts of phasing out nuclear power in Germany, is the first to include an analysis of energy supply security and critical line flows in both the German and Central European electricity networks. The technical-economic model of the European electricity market, ELMOD, is used to simulate alternative power plant dispatch, imports, exports, and network use for a representative winter day. The results suggest that the shutdown of Germany's nuclear plants will result in higher net imports, especially from the Netherlands, Austria, and Poland, and that electricity generation from fossil fuels will increase slightly in Germany and in Central Europe. We find that no additional imports will come from nuclear plants since they are already fully utilized in the merit order, and that electricity prices will rise on average by a few Euros per MWh. We conclude that closing the seven nuclear power plants within the government's moratorium will cause no significant supply security issues or network constraints and an eventual full phase-out seem to be possible due to the completion of several new conventional power plants now under construction. Finally, we suggest that a nuclear phase-out in Germany within the next 3-7 years will not undermine security of supply and network stability in Germany and Central Europe.

  3. A Finite Element Method for Free-Surface Flows of Incompressible Fluids in Three Dimensions, Part II: Dynamic Wetting Lines

    Energy Technology Data Exchange (ETDEWEB)

    Baer, T.A.; Cairncross, R.A.; Rao, R.R.; Sackinger, P.A.; Schunk, P.R.

    1999-01-29

    To date, few researchers have solved three-dimensional free-surface problems with dynamic wetting lines. This paper extends the free-surface finite element method described in a companion paper [Cairncross, R.A., P.R. Schunk, T.A. Baer, P.A. Sackinger, R.R. Rao, "A finite element method for free surface flows of incompressible fluid in three dimensions, Part I: Boundary-Fitted mesh motion.", to be published (1998)] to handle dynamic wetting. A generalization of the technique used in two dimensional modeling to circumvent double-valued velocities at the wetting line, the so-called kinematic paradox, is presented for a wetting line in three dimensions. This approach requires the fluid velocity normal to the contact line to be zero, the fluid velocity tangent to the contact line to be equal to the tangential component of web velocity, and the fluid velocity into the web to be zero. In addition, slip is allowed in a narrow strip along the substrate surface near the dynamic contact line. For realistic wetting-line motion, a contact angle which varies with wetting speed is required because contact lines in three dimensions typically advance or recede a different rates depending upon location and/or have both advancing and receding portions. The theory is applied to capillary rise of static fluid in a corner, the initial motion of a Newtonian droplet down an inclined plane, and extrusion of a Newtonian fluid from a nozzle onto a moving substrate. The extrusion results are compared to experimental visualization. Subject Categories

  4. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  5. Architecting security with Paradigm

    NARCIS (Netherlands)

    Andova, S.; Groenewegen, L.P.J.; Verschuren, J.H.S.; Vink, de E.P.; Lemos, de R.; Fabre, J.C.; Gacek, C.; Gadducci, F.; Beek, ter M.

    2009-01-01

    For large security systems a clear separation of concerns is achieved through architecting. Particularly the dynamic consistency between the architectural components should be addressed, in addition to individual component behaviour. In this paper, relevant dynamic consistency is specified through

  6. Building Psychological Contracts in Security-Risk Environments

    DEFF Research Database (Denmark)

    Ramirez, Jacobo; Madero, Sergio; Vélez-Zapata, Claudia

    2015-01-01

    This paper examines the reciprocal obligations between employers and employees that are framed as psychological contracts in security-risk environments. A total of 30 interviews based on psychological contract frameworks, duty-of-care strategies in terms of human resource management (HRM) systems...... and the impacts of narcoterrorism on firms were conducted with human resources (HR) personnel, line managers and subordinates at eight national and multinational corporations (MNCs) with subsidiaries in Colombia and Mexico. Our findings generally support the existence of a relational psychological contract in our...... sample. Duty-of-care strategies based on both HRM systems and the sensitivities of HR personnel and line managers to the narcoterrorism context, in combination with both explicit and implicit security policies, tend to be the sources of the content of psychological contracts. We propose a psychological...

  7. Enabling SDN in VANETs: What is the Impact on Security?

    Directory of Open Access Journals (Sweden)

    Antonio Di Maio

    2016-12-01

    Full Text Available The demand for safe and secure journeys over roads and highways has been growing at a tremendous pace over recent decades. At the same time, the smart city paradigm has emerged to improve citizens’ quality of life by developing the smart mobility concept. Vehicular Ad hoc NETworks (VANETs are widely recognized to be instrumental in realizing such concept, by enabling appealing safety and infotainment services. Such networks come with their own set of challenges, which range from managing high node mobility to securing data and user privacy. The Software Defined Networking (SDN paradigm has been identified as a suitable solution for dealing with the dynamic network environment, the increased number of connected devices, and the heterogeneity of applications. While some preliminary investigations have been already conducted to check the applicability of the SDN paradigm to VANETs, and its presumed benefits for managing resources and mobility, it is still unclear what impact SDN will have on security and privacy. Security is a relevant issue in VANETs, because of the impact that threats can have on drivers’ behavior and quality of life. This paper opens a discussion on the security threats that future SDN-enabled VANETs will have to face, and investigates how SDN could be beneficial in building new countermeasures. The analysis is conducted in real use cases (smart parking, smart grid of electric vehicles, platooning, and emergency services, which are expected to be among the vehicular applications that will most benefit from introducing an SDN architecture.

  8. Enabling SDN in VANETs: What is the Impact on Security?

    Science.gov (United States)

    Di Maio, Antonio; Palattella, Maria Rita; Soua, Ridha; Lamorte, Luca; Vilajosana, Xavier; Alonso-Zarate, Jesus; Engel, Thomas

    2016-01-01

    The demand for safe and secure journeys over roads and highways has been growing at a tremendous pace over recent decades. At the same time, the smart city paradigm has emerged to improve citizens’ quality of life by developing the smart mobility concept. Vehicular Ad hoc NETworks (VANETs) are widely recognized to be instrumental in realizing such concept, by enabling appealing safety and infotainment services. Such networks come with their own set of challenges, which range from managing high node mobility to securing data and user privacy. The Software Defined Networking (SDN) paradigm has been identified as a suitable solution for dealing with the dynamic network environment, the increased number of connected devices, and the heterogeneity of applications. While some preliminary investigations have been already conducted to check the applicability of the SDN paradigm to VANETs, and its presumed benefits for managing resources and mobility, it is still unclear what impact SDN will have on security and privacy. Security is a relevant issue in VANETs, because of the impact that threats can have on drivers’ behavior and quality of life. This paper opens a discussion on the security threats that future SDN-enabled VANETs will have to face, and investigates how SDN could be beneficial in building new countermeasures. The analysis is conducted in real use cases (smart parking, smart grid of electric vehicles, platooning, and emergency services), which are expected to be among the vehicular applications that will most benefit from introducing an SDN architecture. PMID:27929443

  9. Transmission grid security

    CERN Document Server

    Haarla, Liisa; Hirvonen, Ritva; Labeau, Pierre-Etienne

    2011-01-01

    In response to the growing importance of power system security and reliability, ""Transmission Grid Security"" proposes a systematic and probabilistic approach for transmission grid security analysis. The analysis presented uses probabilistic safety assessment (PSA) and takes into account the power system dynamics after severe faults. In the method shown in this book the power system states (stable, not stable, system breakdown, etc.) are connected with the substation reliability model. In this way it is possible to: estimate the system-wide consequences of grid faults; identify a chain of eve

  10. Probabilistic Forecasting for On-line Operation of Urban Drainage Systems

    DEFF Research Database (Denmark)

    Löwe, Roland

    This thesis deals with the generation of probabilistic forecasts in urban hydrology. In particular, we focus on the case of runoff forecasting for real-time control (RTC) on horizons of up to two hours. For the generation of probabilistic on-line runoff forecasts, we apply the stochastic grey...... and forecasts have on on-line runoff forecast quality. Finally, we implement the stochastic grey-box model approach in a real-world real-time control (RTC) setup and study how RTC can benefit from a dynamic quantification of runoff forecast uncertainty....

  11. Information Security and Integrity Systems

    Science.gov (United States)

    1990-01-01

    Viewgraphs from the Information Security and Integrity Systems seminar held at the University of Houston-Clear Lake on May 15-16, 1990 are presented. A tutorial on computer security is presented. The goals of this tutorial are the following: to review security requirements imposed by government and by common sense; to examine risk analysis methods to help keep sight of forest while in trees; to discuss the current hot topic of viruses (which will stay hot); to examine network security, now and in the next year to 30 years; to give a brief overview of encryption; to review protection methods in operating systems; to review database security problems; to review the Trusted Computer System Evaluation Criteria (Orange Book); to comment on formal verification methods; to consider new approaches (like intrusion detection and biometrics); to review the old, low tech, and still good solutions; and to give pointers to the literature and to where to get help. Other topics covered include security in software applications and development; risk management; trust: formal methods and associated techniques; secure distributed operating system and verification; trusted Ada; a conceptual model for supporting a B3+ dynamic multilevel security and integrity in the Ada runtime environment; and information intelligence sciences.

  12. Dynamic (2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication

    International Nuclear Information System (INIS)

    Lai Hong; Xiao Jing-Hua; Mehmet, Orgun A.; Josef, Pieprzyk; Xue Li-Yin

    2015-01-01

    In this paper, we show that a (2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely. (paper)

  13. Considerations in applying on-line IC techniques to BWR's

    International Nuclear Information System (INIS)

    Kaleda, R.J.

    1992-01-01

    Ion-Chromatography (IC) has moved from its traditional role as a laboratory analytical tool to a real time, dynamic, on-line measurement device to follow ppb and sub-ppb concentrations of deleterious impurities in nuclear power plants. Electric Power Research Institute (EPRI), individual utilities, and industry all have played significant roles in effecting the transition. This paper highlights considerations and the evolution in current on-line Ion Chromatography systems. The first applications of on-line techniques were demonstrated by General Electric (GE) under EPRI sponsorship at Rancho Seco (1980), Calvert Cliffs, and McGuire nuclear units. The primary use was for diagnostic purposes. Today the on-line IC applications have been expanded to include process control and routine plant monitoring. Current on-line IC's are innovative in design, promote operational simplicity, are modular for simplified maintenance and repair, and use field-proven components which enhance reliability. Conductivity detection with electronic or chemical suppression and spectrometric detection techniques are intermixed in applications. Remote multi-point sample systems have addressed memory effects. Early applications measured ionic species in the part per billion range. Today reliable part per trillion measurements are common for on-line systems. Current systems are meeting the challenge of EPRI guideline requirements. Today's on-line IC's, with programmed sampling systems, monitor fluid streams throughout a power plant, supplying data that can be trended, stored and retrieved easily. The on-line IC has come of age. Many technical challenges were overcome to achieve today's IC

  14. Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization

    Directory of Open Access Journals (Sweden)

    Wai Kuan Yip

    2007-01-01

    Full Text Available We introduce a novel method for secure computation of biometric hash on dynamic hand signatures using BioPhasor mixing and discretization. The use of BioPhasor as the mixing process provides a one-way transformation that precludes exact recovery of the biometric vector from compromised hashes and stolen tokens. In addition, our user-specific discretization acts both as an error correction step as well as a real-to-binary space converter. We also propose a new method of extracting compressed representation of dynamic hand signatures using discrete wavelet transform (DWT and discrete fourier transform (DFT. Without the conventional use of dynamic time warping, the proposed method avoids storage of user's hand signature template. This is an important consideration for protecting the privacy of the biometric owner. Our results show that the proposed method could produce stable and distinguishable bit strings with equal error rates (EERs of and for random and skilled forgeries for stolen token (worst case scenario, and for both forgeries in the genuine token (optimal scenario.

  15. A Holistic and Immune System inspired Security Framework

    OpenAIRE

    Mwakalinga, G. Jeffy; Yngström, Louise; Kowalski, Stewart

    2009-01-01

    This paper presents a Framework for adaptive information security systems for securing information systems. Information systems today are vulnerable and not adaptive to the dynamic environments because initial development of these systems focused on computer technology and communications protocol only. Most research in information security does not consider culture of users, system environments and does not pay enough attention to the enemies of information systems. As a result, users serve t...

  16. Improving organisational resilience through enterprise security risk management.

    Science.gov (United States)

    Petruzzi, John; Loyear, Rachelle

    Enterprise Security Risk Management (ESRM) is a new philosophy and method of managing security programmes through the use of traditional risk principles. As a philosophy and life cycle, ESRM is focused on creating a business partnership between security practitioners and business leaders to more effectively provide protection against security risks in line with acceptable risk tolerances as defined by business asset owners and stakeholders. This paper explores the basics of the ESRM philosophy and life cycle and also shows how embracing the ESRM philosophy and implementing a risk-based security management model in the business organisation can lead to higher levels of organisational resilience as desired by organisation leaders, executives and the board of directors.

  17. Network security with openSSL cryptography for secure communications

    CERN Document Server

    Viega, John; Chandra, Pravir

    2002-01-01

    Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols.Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library?s advanced features. And, inst...

  18. Adaptive control based on an on-line parameter estimation of an upper limb exoskeleton.

    Science.gov (United States)

    Riani, Akram; Madani, Tarek; Hadri, Abdelhafid El; Benallegue, Abdelaziz

    2017-07-01

    This paper presents an adaptive control strategy for an upper-limb exoskeleton based on an on-line dynamic parameter estimator. The objective is to improve the control performance of this system that plays a critical role in assisting patients for shoulder, elbow and wrist joint movements. In general, the dynamic parameters of the human limb are unknown and differ from a person to another, which degrade the performances of the exoskeleton-human control system. For this reason, the proposed control scheme contains a supplementary loop based on a new efficient on-line estimator of the dynamic parameters. Indeed, the latter is acting upon the parameter adaptation of the controller to ensure the performances of the system in the presence of parameter uncertainties and perturbations. The exoskeleton used in this work is presented and a physical model of the exoskeleton interacting with a 7 Degree of Freedom (DoF) upper limb model is generated using the SimMechanics library of MatLab/Simulink. To illustrate the effectiveness of the proposed approach, an example of passive rehabilitation movements is performed using multi-body dynamic simulation. The aims is to maneuver the exoskeleton that drive the upper limb to track desired trajectories in the case of the passive arm movements.

  19. Understanding Application Behaviours for Android Security: A Systematic Characterization

    OpenAIRE

    Cai, Haipeng; Ryder, Barbara

    2016-01-01

    In contrast to most existing research on Android focusing on specific security issues, there is little broad understanding of Android application run-time characteristics and their security implications. To mitigate this gap, we present the first dynamic characterization study of Android applications that targets such a broad understanding for Android security. Through lightweight method-level profiling, we have collected 33GB traces of method calls and inter-component communication (ICC) fro...

  20. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  1. REGIONAL SECURITY IN THE HORN OF AFRICA: CONFLICTS, AGENDAS AND THREATS

    Directory of Open Access Journals (Sweden)

    Nilton César Fernandes Cardoso

    2017-01-01

    Full Text Available This paper aims at analyzing security dynamics in the Horn of Africa in the post-independence period, identifying the actors, agendas and threats. For this purpose, it is subdivided into three parts. The first one analyzes the security dynamics taking place in the Horn of Africa during the Cold War period, focusing on the regional rivalries and on the penetration of extraregional actors. In the second part, there is a discussion regarding the transformations which occurred in region in the immediate post-Cold War period, focusing both on the unities’ (states internal security dynamics and on the regional ones. The third and last section aims at identifying “new” threats and regional and international responses, as well as the emerging strategic importance of the region to traditional superpowers in the post-9/11 period, marked by the process of securitization.

  2. A dynamic programming algorithm for the buffer allocation problem in homogeneous asymptotically reliable serial production lines

    Directory of Open Access Journals (Sweden)

    Diamantidis A. C.

    2004-01-01

    Full Text Available In this study, the buffer allocation problem (BAP in homogeneous, asymptotically reliable serial production lines is considered. A known aggregation method, given by Lim, Meerkov, and Top (1990, for the performance evaluation (i.e., estimation of throughput of this type of production lines when the buffer allocation is known, is used as an evaluative method in conjunction with a newly developed dynamic programming (DP algorithm for the BAP. The proposed algorithm is applied to production lines where the number of machines is varying from four up to a hundred machines. The proposed algorithm is fast because it reduces the volume of computations by rejecting allocations that do not lead to maximization of the line's throughput. Numerical results are also given for large production lines.

  3. On Secure Workflow Decentralisation on the Internet

    Directory of Open Access Journals (Sweden)

    Petteri Kaskenpalo

    2010-06-01

    Full Text Available Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach, and consider, from the perspective of available security building blocks, how security can be implemented and what new opportunities are presented when empowering the decentralised environment with modern distributed security protocols. Our research is motivated by a more general question of how to combine the positive enablers that email exchange enjoys, with the general benefits of workflow systems, and more specifically with the benefits that can be introduced in a decentralised environment. This aims to equip email users with a set of tools to manage the semantics of a message exchange, contents, participants and their roles in the exchange in an environment that provides inherent assurances of security and privacy. This work is based on a survey of contemporary distributed security protocols, and considers how these protocols could be used in implementing a distributed workflow management system with decentralised control . We review a set of these protocols, focusing on the required message sequences in reviewing the protocols, and discuss how these security protocols provide the foundations for implementing core control-flow, data, and resource patterns in a distributed workflow environment.

  4. The Bochum on-line data acquisition system

    International Nuclear Information System (INIS)

    Paul, H.J.; Freiesleben, H.

    1986-01-01

    We describe an on-line data acquisition system based on a PDP 11 computer with CAMAC hardware. The software fully exploits the real-time features of the RSX-11M operating system. The basic characteristics of the program package, mainly written in FORTRAN 77, are: multitasking, shared common blocks, dynamical access to CAMAC hardware and data, and command orientated user interface. The system is particularly tailored for data acquisition in list mode of up to 64 parameters. (orig.)

  5. Grounding line processes on the Totten Glacier

    Science.gov (United States)

    Cook, S.; Watson, C. S.; Galton-Fenzi, B.; Peters, L. E.; Coleman, R.

    2017-12-01

    The Totten Glacier has been an area of recent interest due to its large drainage basin, much of which is grounded below sea level and has a history of large scale grounding line movement. Reports that warm water reaches the sub-ice shelf cavity have led to speculation that it could be vulnerable to future grounding line retreat. Over the Antarctic summer 2016/17 an array of 6 GPS and autonomous phase-sensitive radar (ApRES) units were deployed in the grounding zone of the Totten Glacier. These instruments measure changes in ice velocity and thickness which can be used to investigate both ice dynamics across the grounding line, and the interaction between ice and ocean in the subglacial cavity. Basal melt rates calculated from the ApRES units on floating ice range from 1 to 17 m/a. These values are significantly lower than previous estimates of basal melt rate produced by ocean modelling of the subglacial cavity. Meanwhile, GPS-derived velocity and elevation on the surface of the ice show a strong tidal signal, as does the vertical strain rate within the ice derived from internal layering from the ApRES instruments. These results demonstrate the significance of the complex grounding pattern of the Totten Glacier. The presence of re-grounding points has significant implications for the dynamics of the glacier and the ocean circulation within the subglacial cavity. We discuss what can be learned from our in situ measurements, and how they can be used to improve models of the glacier's future behaviour.

  6. Reactors Dynamic analysis Due to Reactivity of The RSG-Gas at One Line Cooling Mode

    International Nuclear Information System (INIS)

    Hastuti, Endiah Puji

    2003-01-01

    In the frame of minimizing the operation-cost, operation mode using one line cooling system is being evaluated. Maximum reactor power has been determined and steady state and LOFA transient analysis have also been done. To complete those analyses, the reactivity analysis was done by means of a core dynamic and thermal hydraulic code, PARET-ANL. Accident simulation was done. by a ramp reactivity accident due to control rod withdrawal. Reactivity analysis was carried out at two power range i.e. low and high power level, by imposing one line mode reactor protection limits. The results show that technically, the RSG-Gas can be operated safely using one line mode

  7. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Science.gov (United States)

    2010-10-01

    ... varying screen density in the pantograph. The wording will appear when attempts are made to photocopy on... visible to the naked eye. (a) Erasure Sensitive Background Inks—a process whereby the text is printed in a dark color ink over a fine line erasure-sensitive prismatic ink tint. (b) Security Lamination—retro...

  8. Evaporation dynamics of completely wetting drops on geometrically textured surfaces

    Science.gov (United States)

    Mekhitarian, Loucine; Sobac, Benjamin; Dehaeck, Sam; Haut, Benoît; Colinet, Pierre

    2017-10-01

    This study deals with the evaporation dynamics of completely wetting and highly volatile drops deposited on geometrically textured but chemically homogeneous surfaces. The texturation consists in a cylindrical pillars array with a square pitch. The triple line dynamics and the drop shape are characterized by an interferometric method. A parametric study is realized by varying the radius and the height of the pillars (at fixed interpillar distance), allowing to distinguish three types of dynamics: i) an evaporation-dominated regime with a receding triple line; ii) a spreading-dominated regime with an initially advancing triple line; iii) a cross-over region with strong pinning effects. The overall picture is in qualitative agreement with a mathematical model showing that the selected regime mostly depends on the value of a dimensionless parameter comparing the time scales for evaporation and spreading into the substrate texture.

  9. Assessing the Need for an On-Line Educational Module for Volunteer Leaders on Bio-Security in Washington State 4-H Livestock Projects

    Science.gov (United States)

    Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat

    2011-01-01

    4-H livestock projects present disease transmission risks that can be reduced by the use of bio-security practices. The responsibility of teaching bio-security to youth belongs primarily to volunteer leaders, who may not be aware of the importance of these practices. A needs assessment for an online educational module about bio-security revealed…

  10. Research on early warning of food security using a system dynamics model: evidence from Jiangsu province in China.

    Science.gov (United States)

    Xu, Jianling; Ding, Yi

    2015-01-01

    Analyzing the early warning of food security, this paper sets the self-sufficiency rate as the principal indicator in a standpoint of supplement. It is common to use the quantitative methods to forecast and warning the insecurity. However, this paper considers more about the probable outcome when the government intervenes. By constructing the causal feedbacks among grain supplement, demand, productive input, and the policy factors to simulate the future food security in Jiangsu province, conclusions can be drawn as the following: (1) The situation of food security is insecure if the self-sufficiency rate is under 68.3% according to the development of system inertia. (2) it is difficult to guarantee the food security in Jiangsu just depending on the increase of grain sown area. (3) The valid solution to ensure the food security in Jiangsu is to improve the productivity. © 2015 Institute of Food Technologists®

  11. Security in the nuclear medicine department

    International Nuclear Information System (INIS)

    Bassingham, S.; Gane, J.; Chan, P.S.; Heenan, S.; Gulliver, N.; McVey, J.

    2005-01-01

    The current threat from terrorism highlights the need for awareness of adequate security of radioactive sources by health bodies to prevent the opportunistic access to, theft of. or accidental loss of sources, together with stringent security measures in place to prevent the international misuse of radioactive sources as a weapon by unauthorised access. This presentation discusses the processes undertaken to ensure the safety and security of radioactive materials within the nuclear medicine department in line with current regulations and guidelines. These include risk assessments, security systems, audit trails, restricted access and personnel background checks

  12. Optimal reconfiguration-based dynamic tariff for congestion management and line loss reduction in distribution networks

    DEFF Research Database (Denmark)

    Huang, Shaojun; Wu, Qiuwei; Cheng, Lin

    2016-01-01

    This paper presents an optimal reconfiguration-based dynamic tariff (DT) method for congestion management and line loss reduction in distribution networks with high penetration of electric vehicles. In the proposed DT concept, feeder reconfiguration (FR) is employed through mixed integer programm...

  13. Idealized Simulations of a Squall Line from the MC3E Field Campaign Applying Three Bin Microphysics Schemes: Dynamic and Thermodynamic Structure

    Energy Technology Data Exchange (ETDEWEB)

    Xue, Lulin [National Center for Atmospheric Research, Boulder, Colorado; Fan, Jiwen [Pacific Northwest National Laboratory, Richland, Washington; Lebo, Zachary J. [University of Wyoming, Laramie, Wyoming; Wu, Wei [National Center for Atmospheric Research, Boulder, Colorado; University of Illinois at Urbana–Champaign, Urbana, Illinois; Morrison, Hugh [National Center for Atmospheric Research, Boulder, Colorado; Grabowski, Wojciech W. [National Center for Atmospheric Research, Boulder, Colorado; Chu, Xia [University of Wyoming, Laramie, Wyoming; Geresdi, István [University of Pécs, Pécs, Hungary; North, Kirk [McGill University, Montréal, Québec, Canada; Stenz, Ronald [University of North Dakota, Grand Forks, North Dakota; Gao, Yang [Pacific Northwest National Laboratory, Richland, Washington; Lou, Xiaofeng [Chinese Academy of Meteorological Sciences, Beijing, China; Bansemer, Aaron [National Center for Atmospheric Research, Boulder, Colorado; Heymsfield, Andrew J. [National Center for Atmospheric Research, Boulder, Colorado; McFarquhar, Greg M. [National Center for Atmospheric Research, Boulder, Colorado; University of Illinois at Urbana–Champaign, Urbana, Illinois; Rasmussen, Roy M. [National Center for Atmospheric Research, Boulder, Colorado

    2017-12-01

    The squall line event on May 20, 2011, during the Midlatitude Continental Convective Clouds (MC3E) field campaign has been simulated by three bin (spectral) microphysics schemes coupled into the Weather Research and Forecasting (WRF) model. Semi-idealized three-dimensional simulations driven by temperature and moisture profiles acquired by a radiosonde released in the pre-convection environment at 1200 UTC in Morris, Oklahoma show that each scheme produced a squall line with features broadly consistent with the observed storm characteristics. However, substantial differences in the details of the simulated dynamic and thermodynamic structure are evident. These differences are attributed to different algorithms and numerical representations of microphysical processes, assumptions of the hydrometeor processes and properties, especially ice particle mass, density, and terminal velocity relationships with size, and the resulting interactions between the microphysics, cold pool, and dynamics. This study shows that different bin microphysics schemes, designed to be conceptually more realistic and thus arguably more accurate than bulk microphysics schemes, still simulate a wide spread of microphysical, thermodynamic, and dynamic characteristics of a squall line, qualitatively similar to the spread of squall line characteristics using various bulk schemes. Future work may focus on improving the representation of ice particle properties in bin schemes to reduce this uncertainty and using the similar assumptions for all schemes to isolate the impact of physics from numerics.

  14. DIVERGENCE OF FOOD AND NUTRITIONAL SECURITY- A STUDY ON WESTERN ODISHA

    Directory of Open Access Journals (Sweden)

    Digambar Chand

    2016-01-01

    Full Text Available Food security and nutritional security are the subsets of livelihood security. Poor nutritional outcomes of infants and children arise from the poor health status of women, overall poverty, lack of hygiene and inadequate health facilities. The study discusses the divergence between food security and nutritional security in the state as a whole and the region in particular.A multi stage random sampling technique has been adopted for the collection of data.Statistical analysis used for drawing valid inferences are testing of hypothesis, chi square test, regression analysis and fitting of trend lines. In the present study an attempt has been made to address the issues namely: i incidence of malnutrition and food insecurity through three critical links viz. children, adolescent girls and women, ii surplus/deficit of production of cereals, pulses, food grains and oilseeds as per requirement iii trends of production and availability of secondary diets such as egg, meat, fish and milk iv indicators of malnutrition. Production must be diversified from cereal crop production like paddy to other crops.A life-cycle approach to management was adopted that integrates strategy, people resources, processes and measurements to improve.

  15. Private Security Contractors in Darfur

    DEFF Research Database (Denmark)

    Leander, Anna

    2006-01-01

    This article argues that the role of Private Security Contractors in Darfur reflects and reinforces neo-liberal governmentality in contemporary security governance. It is an argument (in line with other articles in this special issue) which is more interested in discussing how the privatization....... It underlines that governance is increasingly taking place through a set of (quasi-) markets, it is marked by entrepreneurial values, and a hands off approach to governance. We then discuss the way this overall change is reflected in and reinforced by the role of private security contractors in Darfur. Drawing...... at these processes is necessary to understand the role of private security contractors in Darfur. But more than this, practices in Darfur entrench neo-liberal governmentality in security more generally. The managerial and `de-politicizing' approach to security in Darfur displaces alternative views not only...

  16. Off-Line and Dynamic Production Scheduling – A Comparative Case Study

    Directory of Open Access Journals (Sweden)

    Bożek Andrzej

    2016-03-01

    Full Text Available A comprehensive case study of manufacturing scheduling solutions development is given. It includes highly generalized scheduling problem as well as a few scheduling modes, methods and problem models. The considered problem combines flexible job shop structure, lot streaming with variable sublots, transport times, setup times, and machine calendars. Tabu search metaheuristic and constraint programming methods have been used for the off-line scheduling. Two dynamic scheduling methods have also been implemented, i.e., dispatching rules for the completely reactive scheduling and a multi-agent system for the predictivereactive scheduling. In these implementations three distinct models of the problem have been used, based on: graph representation, optimal constraint satisfaction, and Petri net formalism. Each of these solutions has been verified in computational experiments. The results are compared and some findings about advantages, disadvantages, and suggestions on using the solutions are formulated.

  17. Electric Power Transmission Lines

    Data.gov (United States)

    Department of Homeland Security — Transmission Lines are the system of structures, wires, insulators and associated hardware that carry electric energy from one point to another in an electric power...

  18. On-Line Junction Temperature Monitoring of Switching Devices with Dynamic Compact Thermal Models Extracted with Model Order Reduction

    Directory of Open Access Journals (Sweden)

    Fabio Di Napoli

    2017-02-01

    Full Text Available Residual lifetime estimation has gained a key point among the techniques that improve the reliability and the efficiency of power converters. The main cause of failures are the junction temperature cycles exhibited by switching devices during their normal operation; therefore, reliable power converter lifetime estimation requires the knowledge of the junction temperature time profile. Since on-line dynamic temperature measurements are extremely difficult, in this work an innovative real-time monitoring strategy is proposed, which is capable of estimating the junction temperature profile from the measurement of the dissipated powers through an accurate and compact thermal model of the whole power module. The equations of this model can be easily implemented inside a FPGA, exploiting the control architecture already present in modern power converters. Experimental results on an IGBT power module demonstrate the reliability of the proposed method.

  19. The effect of privatisation on front line employees in a service organisation

    Directory of Open Access Journals (Sweden)

    FW Struwig

    2004-07-01

    Full Text Available A government organisation in the water supply business was faced with the challenge of changing their traditional way of doing business to operate as a profit driven entity. This research focuses on how privatisation has affected front-line service employees. Both the front-line service employees and management were interviewed and included as cases to investigate changes that have occurred as a result of privatisation. These cases revealed that after privatisation front line service employees have received better training, appreciated a better system of communication, experienced a higher degree of empowerment and enjoyed an organisational culture that is more customer focused. The research, however, indicated lower levels of motivation, that employees do not appreciate an improvement in their reward system neither do they get feedback regarding their achievements and that they experience little job security.

  20. A Panel of Embryonic Stem Cell Lines Reveals the Variety and Dynamic of Pluripotent States in Rabbits

    Directory of Open Access Journals (Sweden)

    Pierre Osteil

    2016-09-01

    Full Text Available Conventional rabbit embryonic stem cell (ESC lines are derived from the inner cell mass (ICM of pre-implantation embryos using methods and culture conditions that are established for primate ESCs. In this study, we explored the capacity of the rabbit ICM to give rise to ESC lines using conditions similar to those utilized to generate naive ESCs in mice. On single-cell dissociation and culture in fibroblast growth factor 2 (FGF2-free, serum-supplemented medium, rabbit ICMs gave rise to ESC lines lacking the DNA-damage checkpoint in the G1 phase like mouse ESCs, and with a pluripotency gene expression profile closer to the rabbit ICM/epiblast profiles. These cell lines can be converted to FGF2-dependent ESCs after culture in conventional conditions. They can also colonize the rabbit pre-implantation embryo. These results indicate that rabbit epiblast cells can be coaxed toward different types of pluripotent stem cells and reveal the dynamics of pluripotent states in rabbit ESCs.

  1. CONFIRMATION OF SMALL DYNAMICAL AND STELLAR MASSES FOR EXTREME EMISSION LINE GALAXIES AT z ∼ 2

    Energy Technology Data Exchange (ETDEWEB)

    Maseda, Michael V.; Van der Wel, Arjen; Da Cunha, Elisabete; Rix, Hans-Walter [Max-Planck-Institut für Astronomie, Königstuhl 17, D-69117 Heidelberg (Germany); Pacifici, Camilla [Yonsei University Observatory, Yonsei University, Seoul 120-749 (Korea, Republic of); Momcheva, Ivelina; Van Dokkum, Pieter; Nelson, Erica J. [Department of Astronomy, Yale University, New Haven, CT 06520 (United States); Brammer, Gabriel B.; Grogin, Norman A.; Koekemoer, Anton M. [Space Telescope Science Institute, 3700 San Martin Drive, Baltimore, MD 21218 (United States); Franx, Marijn; Fumagalli, Mattia; Patel, Shannon G. [Leiden Observatory, Leiden University, Leiden (Netherlands); Bell, Eric F. [Department of Astronomy, University of Michigan, 500 Church Street, Ann Arbor, MI 48109 (United States); Kocevski, Dale D. [Department of Physics and Astronomy, University of Kentucky, Lexington, KY 40506 (United States); Lundgren, Britt F. [Department of Astronomy, University of Wisconsin, 475 N Charter Street, Madison, WI 53706 (United States); Marchesini, Danilo [Physics and Astronomy Department, Tufts University, Robinson Hall, Room 257, Medford, MA 02155 (United States); Skelton, Rosalind E. [South African Astronomical Observatory, P.O. Box 9, Observatory 7935 (South Africa); Straughn, Amber N., E-mail: maseda@mpia.de [Astrophysics Science Division, Goddard Space Flight Center, Code 665, Greenbelt, MD 20771 (United States); and others

    2013-11-20

    Spectroscopic observations from the Large Binocular Telescope and the Very Large Telescope reveal kinematically narrow lines (∼50 km s{sup –1}) for a sample of 14 extreme emission line galaxies at redshifts 1.4 < z < 2.3. These measurements imply that the total dynamical masses of these systems are low (≲ 3 × 10{sup 9} M {sub ☉}). Their large [O III] λ5007 equivalent widths (500-1100 Å) and faint blue continuum emission imply young ages of 10-100 Myr and stellar masses of 10{sup 8}-10{sup 9} M {sub ☉}, confirming the presence of a violent starburst. The dynamical masses represent the first such determinations for low-mass galaxies at z > 1. The stellar mass formed in this vigorous starburst phase represents a large fraction of the total (dynamical) mass, without a significantly massive underlying population of older stars. The occurrence of such intense events in shallow potentials strongly suggests that supernova-driven winds must be of critical importance in the subsequent evolution of these systems.

  2. Distributed security framework for modern workforce

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, G.; Scherer, C. P., E-mail: gbalatsky@lanl.gov, E-mail: scherer@lanl.gov [Los Alamos National Laboratory, Los Alamos, NM (United States)

    2014-07-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  3. Distributed security framework for modern workforce

    International Nuclear Information System (INIS)

    Balatsky, G.; Scherer, C. P.

    2014-01-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  4. Integrated Safeguards and Security Management Self-Assessment 2004

    Energy Technology Data Exchange (ETDEWEB)

    Lunford, Dan; Ramsey, Dwayne

    2005-04-01

    In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of

  5. The EU Security Continuum: the interaction between internal and external spheres in

    Directory of Open Access Journals (Sweden)

    Ana Postolache

    2012-08-01

    Full Text Available Exceeding the traditional dividing line between internal and external security, the article aims to analyze the coordination link between EU internal and external spheres in combating the "new security threats" and in achieving its security goals. First, I will analyze the rapprochement steps towards the EU security continuum, the instruments and the logic behind the process. Second, I will step beyond the discursive claims and I will analyze the EU operational aspects directed under this umbrella, with a particular focus on organised crime. Last but not least, I will discuss the reflection of EU security continuum on the wider global security arena.

  6. Social security, dynamic efficiency and self-control problems

    NARCIS (Netherlands)

    Bucciol, A.

    2008-01-01

    We develop an OLG model with uncertainty on labor income and death age to study the welfare implications of unfunded Social Security programs in an economy where agents are affected by temptation à la Gul and Pesendorfer (2001, Econometrica 69, 1403). Tempted agents give additional value to the

  7. A new algorithm for combined dynamic economic emission dispatch with security constraints

    International Nuclear Information System (INIS)

    Arul, R.; Velusami, S.; Ravi, G.

    2015-01-01

    The primary objective of CDEED (combined dynamic economic emission dispatch) problem is to determine the optimal power generation schedule for the online generating units over a time horizon considered and simultaneously minimizing the emission level and satisfying the generators and system constraints. The CDEED problem is bi-objective optimization problem, where generation cost and emission are considered as two competing objective functions. This bi-objective CDEED problem is represented as a single objective optimization problem by assigning different weights for each objective functions. The weights are varied in steps and for each variation one compromise solution are generated and finally fuzzy based selection method is used to select the best compromise solution from the set of compromise solutions obtained. In order to reflect the test systems considered as real power system model, the security constraints are also taken into account. Three new versions of DHS (differential harmony search) algorithms have been proposed to solve the CDEED problems. The feasibility of the proposed algorithms is demonstrated on IEEE-26 and IEEE-39 bus systems. The result obtained by the proposed CSADHS (chaotic self-adaptive differential harmony search) algorithm is found to be better than EP (evolutionary programming), DHS, and the other proposed algorithms in terms of solution quality, convergence speed and computation time. - Highlights: • In this paper, three new algorithms CDHS, SADHS and CSADHS are proposed. • To solve DED with emission, poz's, spinning reserve and security constraints. • Results obtained by the proposed CSADHS algorithm are better than others. • The proposed CSADHS algorithm has fast convergence characteristic than others

  8. Optimal Allocation of Water Resources Based on Water Supply Security

    Directory of Open Access Journals (Sweden)

    Jianhua Wang

    2016-06-01

    Full Text Available Under the combined impacts of climate change and human activities, a series of water issues, such as water shortages, have arisen all over the world. According to current studies in Science and Nature, water security has become a frontier critical topic. Water supply security (WSS, which is the state of water resources and their capacity and their capacity to meet the demand of water users by water supply systems, is an important part of water security. Currently, WSS is affected by the amount of water resources, water supply projects, water quality and water management. Water shortages have also led to water supply insecurity. WSS is now evaluated based on the balance of the supply and demand under a single water resources condition without considering the dynamics of the varying conditions of water resources each year. This paper developed an optimal allocation model for water resources that can realize the optimal allocation of regional water resources and comprehensively evaluate WSS. The objective of this model is to minimize the duration of water shortages in the long term, as characterized by the Water Supply Security Index (WSSI, which is the assessment value of WSS, a larger WSSI value indicates better results. In addition, the simulation results of the model can determine the change process and dynamic evolution of the WSS. Quanzhou, a city in China with serious water shortage problems, was selected as a case study. The allocation results of the current year and target year of planning demonstrated that the level of regional comprehensive WSS was significantly influenced by the capacity of water supply projects and the conditions of the natural water resources. The varying conditions of the water resources allocation results in the same year demonstrated that the allocation results and WSSI were significantly affected by reductions in precipitation, decreases in the water yield coefficient, and changes in the underlying surface.

  9. Data-Driven Security-Constrained OPF

    DEFF Research Database (Denmark)

    Thams, Florian; Halilbasic, Lejla; Pinson, Pierre

    2017-01-01

    considerations, while being less conservative than current approaches. Our approach can be scalable for large systems, accounts explicitly for power system security, and enables the electricity market to identify a cost-efficient dispatch avoiding redispatching actions. We demonstrate the performance of our......In this paper we unify electricity market operations with power system security considerations. Using data-driven techniques, we address both small signal stability and steady-state security, derive tractable decision rules in the form of line flow limits, and incorporate the resulting constraints...... in market clearing algorithms. Our goal is to minimize redispatching actions, and instead allow the market to determine the most cost-efficient dispatch while considering all security constraints. To maintain tractability of our approach we perform our security assessment offline, examining large datasets...

  10. A REGIONAL PARTNERSHIP ON RADIOLOGICAL SECURITY

    International Nuclear Information System (INIS)

    Morris, Fred A.; Murray, A.; Dickerson, S.; Tynan, Douglas M.; Rawl, Richard R.; Hoo, Mark S.

    2007-01-01

    In 2004, Australia, through the Australian Nuclear Science and Technology Organisation (ANSTO) created the Regional Security of Radioactive Sources (RSRS) project and partnered with the U.S. Department of Energy's National Nuclear Security Administration (NNSA) and the International Atomic Energy Agency (IAEA) to form the Southeast Asian Regional Radiological Security Partnership (RRSP). The intent of the RRSP/RSRS partnership is to cooperate with regional neighbors in Southeast Asia to improve the security of their radioactive sources. This Southeast Asian Partnership supports NNSA and IAEA objectives to improve the security of high risk radioactive sources by raising awareness of the need, and developing national programs, to: protect and control such materials; improve the security of such materials and recover and condition the materials no longer in use. To date, agreed upon joint activities have included assistance with the improvement of regulatory infrastructure for the control of radioactive sources, training on the physical protection of radioactive sources, training and assistance with the search, location, identification and securing of orphan radioactive sources and overall assistance with implementing the IAEA Code of Conduct on the Safety and Security of Radioactive Sources. Since the inception of the partnership, ten Southeast Asian nations have participated in a range of activities from receiving general training on the security of radioactive sources to receiving specialized equipment and training to locate orphan or abandoned radioactive sources. By having a shared vision and objectives for radioactive source security in the Southeast Asian region, ANSTO and NNSA have been able to develop a successful partnership which has effectively utilized the technical, financial and political resources of each contributing partner. An example of how this partnership works is the cooperation with the Nuclear Energy Regulatory Agency, Indonesia (BAPETEN) to

  11. Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model

    Science.gov (United States)

    Moghaddasi, Hamid; Kamkarhaghighi, Mehran

    2016-01-01

    Introduction: Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. Background: The “data security models” presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the “needs and improvement” cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Findings: Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Conclusion: Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced. PMID:27857823

  12. Reasons in Support of Data Security and Data Security Management as Two Independent Concepts: A New Model.

    Science.gov (United States)

    Moghaddasi, Hamid; Sajjadi, Samad; Kamkarhaghighi, Mehran

    2016-01-01

    Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. The "data security models" presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the "needs and improvement" cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.

  13. Secure Storage Architectures

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to

  14. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  15. Distributed power-line outage detection based on wide area measurement system.

    Science.gov (United States)

    Zhao, Liang; Song, Wen-Zhan

    2014-07-21

    In modern power grids, the fast and reliable detection of power-line outages is an important functionality, which prevents cascading failures and facilitates an accurate state estimation to monitor the real-time conditions of the grids. However, most of the existing approaches for outage detection suffer from two drawbacks, namely: (i) high computational complexity; and (ii) relying on a centralized means of implementation. The high computational complexity limits the practical usage of outage detection only for the case of single-line or double-line outages. Meanwhile, the centralized means of implementation raises security and privacy issues. Considering these drawbacks, the present paper proposes a distributed framework, which carries out in-network information processing and only shares estimates on boundaries with the neighboring control areas. This novel framework relies on a convex-relaxed formulation of the line outage detection problem and leverages the alternating direction method of multipliers (ADMM) for its distributed solution. The proposed framework invokes a low computational complexity, requiring only linear and simple matrix-vector operations. We also extend this framework to incorporate the sparse property of the measurement matrix and employ the LSQRalgorithm to enable a warm start, which further accelerates the algorithm. Analysis and simulation tests validate the correctness and effectiveness of the proposed approaches.

  16. Social security in developing countries : operation and dynamics of social security mechanisms in rural Swaziland

    NARCIS (Netherlands)

    Leliveld, A.H.M.

    1994-01-01

    This study, which is based on field research carried out in Swaziland from October 1989 to December 1990, starts with an introductory chapter followed by three theoretical chapters on social security in developing countries. The content of these chapters is illustrated with an extensive case study

  17. 20 CFR 423.1 - Suits against the Social Security Administration and its employees in their official capacities.

    Science.gov (United States)

    2010-04-01

    ... Federal Register, and are available on-line at the Social Security Administration's Internet site, http... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Suits against the Social Security... SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its...

  18. Model-based dynamic control and optimization of gas networks

    Energy Technology Data Exchange (ETDEWEB)

    Hofsten, Kai

    2001-07-01

    by a structured sequential quadratic programming algorithm of Newton type. Each open loop problem is specified using a nonlinear prediction model. For each iteration of the quadratic programming procedure, a linear time variant prediction model is formulated. The suggested controller also handles time varying source capacity. Potential problems such as infeasibility and the security of the supply when facing a change in the status of the infrastructure of the transmission system under a transient customer load are treated. Comments on the infeasibility due to errors such as load forecast error, model error and state estimation error are also discussed. A simplified nonlinear model called the creep flow model is used to describe the fluid dynamics inside a natural gas transmission line. Different assumptions and reformulations of this model yield the different control, simulation and optimization models used in this thesis. The control of a single gas transmission line is investigated using linear model predictive control based on instant linearization of the nonlinear model. Model predictive control using a bi quadratic optimization model formulated from the creep flow model is also investigated. A distributed parameter control model of the gas dynamics for a transmission line is formulated. An analytic solution of this model is given with both Neuman boundary conditions and distributed supplies and loads. A transfer function model is developed expressing the dynamics between the defined output and the control and disturbance inputs of the transmission line. Based on the qualitative behaviour observed from the step responses of the solutions of the distributed parameter model formulated in this thesis, simplified transfer function models were developed. These control models expresses the dynamics of a natural gas transmission line with Neuman boundary control and load. Further, these models were used to design a control law, which is a combination of a Smith

  19. Prospective in-patient cohort study of moves between levels of therapeutic security: the DUNDRUM-1 triage security, DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales and the HCR-20

    Directory of Open Access Journals (Sweden)

    Davoren Mary

    2012-07-01

    Clinicians appear to decide moves based on combinations of current and imminent (dynamic risk measured by HCR-20 dynamic score and historical seriousness of risk as measured by need for therapeutic security (DUNDRUM-1 in keeping with Scott's formulation of risk and seriousness. The DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales have utility as dynamic measures that can off-set perceived 'dangerousness'.

  20. Prospective in-patient cohort study of moves between levels of therapeutic security: the DUNDRUM-1 triage security, DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales and the HCR-20.

    Science.gov (United States)

    Davoren, Mary; O'Dwyer, Sarah; Abidin, Zareena; Naughton, Leena; Gibbons, Olivia; Doyle, Elaine; McDonnell, Kim; Monks, Stephen; Kennedy, Harry G

    2012-07-13

    We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk. This was a prospective naturalistic twelve month observational study of a cohort of patients in a forensic hospital placed according to their need for therapeutic security along a pathway of moves from high to progressively less secure units in preparation for discharge. Patients were assessed using the DUNDRUM-1 triage security scale, the DUNDRUM-3 programme completion scale and the DUNDRUM-4 recovery scale and assessments of risk of violence, self harm and suicide, symptom severity and global function. Patients were subsequently observed for positive moves to less secure units and negative moves to more secure units. There were 86 male patients at baseline with mean follow-up 0.9 years, 11 positive and 9 negative moves. For positive moves, logistic regression indicated that along with location at baseline, the DUNDRUM-1, HCR-20 dynamic and PANSS general symptom scores were associated with subsequent positive moves. The receiver operating characteristic was significant for the DUNDRUM-1 while ANOVA co-varying for both location at baseline and HCR-20 dynamic score was significant for DUNDRUM-1. For negative moves, logistic regression showed DUNDRUM-1 and HCR-20 dynamic scores were associated with subsequent negative moves, along with DUNDRUM-3 and PANSS negative symptoms in some models. The receiver operating characteristic was significant for the DUNDRUM-4 recovery and HCR-20 dynamic scores with DUNDRUM-1, DUNDRUM-3, PANSS general and GAF marginal. ANOVA co-varying for both location at baseline and HCR-20 dynamic scores showed only DUNDRUM-1 and PANSS negative symptoms associated with subsequent negative moves. Clinicians appear to decide moves based on combinations of current and

  1. Sensing line effects on PWR-based differential pressure measurements

    International Nuclear Information System (INIS)

    Evans, R.P.; Neff, G.G.

    1982-01-01

    An incorrrect configuration of the fluid-filled pressure sensing lines connecting differential pressure transducers to the pressure taps in a pressurized water reactor system can cause errors in the measurement and, during rapid pressure transients, could cause the transducer to fail. Testing was performed in both static and dynamic modes to experimentally determine the effects of sensing lines of various lengths, diameters, and materials. Testing was performed at ambient temperature with absolute line pressures at about 17 MPa using water as the pressure transmission fluid

  2. Study on the security of discrete-variable quantum key distribution over non-Markovian channels

    International Nuclear Information System (INIS)

    Huang Peng; Zhu Jun; He Guangqiang; Zeng Guihua

    2012-01-01

    The dynamic of the secret key rate of the discrete-variable quantum key distribution (QKD) protocol over the non-Markovian quantum channel is investigated. In particular, we calculate the secret key rate for the six-state protocol over non-Markovian depolarizing channels with coloured noise and Markovian depolarizing channels with Gaussian white noise, respectively. We find that the secure secret key rate for the non-Markovian depolarizing channel will be larger than the Markovian one under the same conditions even when their upper bounds of tolerable quantum bit error rate are equal. This indicates that this coloured noise in the non-Markovian depolarizing channel can enhance the security of communication. Moreover, we show that the secret key rate fluctuates near the secure point when the coupling strength of the system with the environment is high. The results demonstrate that the non-Markovian effects of the transmission channel can have a positive impact on the security of discrete-variable QKD. (paper)

  3. A Security Monitoring Method Based on Autonomic Computing for the Cloud Platform

    Directory of Open Access Journals (Sweden)

    Jingjie Zhang

    2018-01-01

    Full Text Available With the continuous development of cloud computing, cloud security has become one of the most important issues in cloud computing. For example, data stored in the cloud platform may be attacked, and its security is difficult to be guaranteed. Therefore, we must attach weight to the issue of how to protect the data stored in the cloud. To protect data, data monitoring is a necessary process. Based on autonomic computing, we develop a cloud data monitoring system on the cloud platform, monitoring whether the data is abnormal in the cycle and analyzing the security of the data according to the monitored results. In this paper, the feasibility of the scheme can be verified through simulation. The results show that the proposed method can adapt to the dynamic change of cloud platform load, and it can also accurately evaluate the degree of abnormal data. Meanwhile, by adjusting monitoring frequency automatically, it improves the accuracy and timeliness of monitoring. Furthermore, it can reduce the monitoring cost of the system in normal operation process.

  4. Practices on nuclear security and international cooperation

    International Nuclear Information System (INIS)

    Shen Ning

    2009-01-01

    Full text: Nuclear terrorism has been a great threat against the safety and security of the world. It has been reached the consensus by international community to strengthen the nuclear security regime to protect the nuclear and other radiological materials and related facilities. Protection of the security of nuclear and other radiological materials in use, storage and transport and related facilities is always a important issue faced by each country and it depends on the technologies, funds and human resources can be utilized. As nuclear technology has been widely used in different area, China competent authorities have issued a series of regulations, implementation rules and guidelines on security of nuclear and radioactive materials and related facilities. China supports and has taken an active part in the international efforts to strengthen the international nuclear security regime to combat nuclear terrorism. China has paid great importance on international cooperations on nuclear security with IAEA and other countries. More than 10 various national workshops and training courses on nuclear security and physical protection were delivered per year, which provided a communication platform for Chinese facility operators and managers to know the international technology-development and share the research achievements. In cooperation with the IAEA, China has held a great number of regional and national training courses on physical protection and nuclear security since 1998. Different types of training, such as training on awareness, Design Basis Threat (DBT), physical security system design, equipments operation and vulnerability analysis, benefited the administrators, facility operators, engineers and technical staff in charge of physical security system design, operation and maintenance from China and regional countries. Under the framework of the bilateral agreement on Peaceful Use of Nuclear Technology (PUNT), China and U.S. jointly conducted a Technical Demo

  5. Effect of layout on surge line thermal stratification

    International Nuclear Information System (INIS)

    Lai Jianyong; Huang Wei

    2011-01-01

    In order to analyze and evaluate the effect of layout on the thermal stratification for PWR Pressurizer surge line, numerical simulation by Computational Fluid Dynamics (CFD) method is taken on 6 kinds of layout improvement with 2 improvement schemes, i.e., increasing the obliquity of quasi horizontal section and adding a vertical pipe between the quasi horizontal section and next elbow, and the maximum temperature differences of quasi horizontal section of surge line of various layouts under different flowrate are obtained. The comparison shows that, the increasing of the obliquity of quasi horizontal section can mitigate the thermal stratification phenomena but can not eliminate this phenomena, while the adding of a vertical pipe between the quasi horizontal section and next elbow can effectively mitigate and eliminate the thermal stratification phenomena. (authors)

  6. On-line stable isotope measurements during plant and soil gas exchange

    International Nuclear Information System (INIS)

    Yakir, D.

    2001-01-01

    Recent techniques for on-line stable isotope measurements during plant and soil exchange of CO 2 and/or water vapor are briefly reviewed. For CO 2 , these techniques provide means for on-line measurements of isotopic discrimination during CO 2 exchange by leaves in the laboratory and in the field, of isotopic discrimination during soil respiration and during soil-atmosphere CO 2 exchange, and of isotopic discrimination in O 2 during plant respiration. For water vapor, these techniques provide means to measure oxygen isotopic composition of water vapor during leaf transpiration and for the analysis of sub microliter condensed water vapor samples. Most of these techniques involve on-line sampling of CO 2 and water vapor from a dynamic, intact soil or plant system. In the laboratory, these systems also allow on-line isotopic analysis by continuous-flow isotope ratio mass spectrometry. The information obtained with these on-line techniques is becoming increasingly valuable, and often critical, for ecophysiologial research and in the study of biosphere-atmosphere interactions. (author)

  7. Cusps enable line attractors for neural computation

    International Nuclear Information System (INIS)

    Xiao, Zhuocheng; Zhang, Jiwei; Sornborger, Andrew T.; Tao, Louis

    2017-01-01

    Here, line attractors in neuronal networks have been suggested to be the basis of many brain functions, such as working memory, oculomotor control, head movement, locomotion, and sensory processing. In this paper, we make the connection between line attractors and pulse gating in feed-forward neuronal networks. In this context, because of their neutral stability along a one-dimensional manifold, line attractors are associated with a time-translational invariance that allows graded information to be propagated from one neuronal population to the next. To understand how pulse-gating manifests itself in a high-dimensional, nonlinear, feedforward integrate-and-fire network, we use a Fokker-Planck approach to analyze system dynamics. We make a connection between pulse-gated propagation in the Fokker-Planck and population-averaged mean-field (firing rate) models, and then identify an approximate line attractor in state space as the essential structure underlying graded information propagation. An analysis of the line attractor shows that it consists of three fixed points: a central saddle with an unstable manifold along the line and stable manifolds orthogonal to the line, which is surrounded on either side by stable fixed points. Along the manifold defined by the fixed points, slow dynamics give rise to a ghost. We show that this line attractor arises at a cusp catastrophe, where a fold bifurcation develops as a function of synaptic noise; and that the ghost dynamics near the fold of the cusp underly the robustness of the line attractor. Understanding the dynamical aspects of this cusp catastrophe allows us to show how line attractors can persist in biologically realistic neuronal networks and how the interplay of pulse gating, synaptic coupling, and neuronal stochasticity can be used to enable attracting one-dimensional manifolds and, thus, dynamically control the processing of graded information.

  8. Cusps enable line attractors for neural computation

    Science.gov (United States)

    Xiao, Zhuocheng; Zhang, Jiwei; Sornborger, Andrew T.; Tao, Louis

    2017-11-01

    Line attractors in neuronal networks have been suggested to be the basis of many brain functions, such as working memory, oculomotor control, head movement, locomotion, and sensory processing. In this paper, we make the connection between line attractors and pulse gating in feed-forward neuronal networks. In this context, because of their neutral stability along a one-dimensional manifold, line attractors are associated with a time-translational invariance that allows graded information to be propagated from one neuronal population to the next. To understand how pulse-gating manifests itself in a high-dimensional, nonlinear, feedforward integrate-and-fire network, we use a Fokker-Planck approach to analyze system dynamics. We make a connection between pulse-gated propagation in the Fokker-Planck and population-averaged mean-field (firing rate) models, and then identify an approximate line attractor in state space as the essential structure underlying graded information propagation. An analysis of the line attractor shows that it consists of three fixed points: a central saddle with an unstable manifold along the line and stable manifolds orthogonal to the line, which is surrounded on either side by stable fixed points. Along the manifold defined by the fixed points, slow dynamics give rise to a ghost. We show that this line attractor arises at a cusp catastrophe, where a fold bifurcation develops as a function of synaptic noise; and that the ghost dynamics near the fold of the cusp underly the robustness of the line attractor. Understanding the dynamical aspects of this cusp catastrophe allows us to show how line attractors can persist in biologically realistic neuronal networks and how the interplay of pulse gating, synaptic coupling, and neuronal stochasticity can be used to enable attracting one-dimensional manifolds and, thus, dynamically control the processing of graded information.

  9. A Study on the Motif Pattern of Dark-Cloud Cover in the Securities

    Directory of Open Access Journals (Sweden)

    Long Jing

    2017-01-01

    Full Text Available Morphological analysis is the analysis and mining of the graphics formed of the securities price changes. Investors need to forecast the trend of future before buying and selling points, which can avoid great loss. Therefore, the analysis of motif pattern of K-line in the form of futures investment technology analysis is very significant. Based on the thoughts of short-term trend clustering, this paper proposes a method of detecting the motif pattern of Dark-Cloud Cover in stock time series by analysing stock historic data and K-line shape, in order to predict the stock market trends. And we prove the effectiveness and practicality of the method by a series of experimental analysis.

  10. PLANNING INTELLIGENCE ACTIVITIES IN A DYNAMIC SECURITY ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Anca Pavel

    2016-10-01

    Full Text Available The hypothesis introduced by this article is that, in order to perform intelligence missions and to obtain valuable intelligence for the consumers it is necessary to implement processes and tools to support planning activities. Today's challenges consist rather in the ability of intelligence organizations to identify and initiate new connections, processes and communication flows with other partners operating in the security environment than to plan in their own name secret operations. From this point of view, planning activities should focus on new procedures, at a much more extensive level in order to align institutional efforts beyond the boundaries of their own organization and the national community of information. Also, in order to coordinate intelligence activities, strategic planning must be anchored into a complex analysis of the potential impact of existing and possible future global phenomena that shape the security environment and thus identify better ways of improving results.

  11. Vortex dynamics of in-line twin synthetic jets in a laminar boundary layer

    Science.gov (United States)

    Wen, Xin; Tang, Hui; Duan, Fei

    2015-08-01

    An experimental investigation is conducted on the vortices induced by twin synthetic jets (SJs) in line with a laminar boundary layer flow over a flat plate. The twin SJs operating at four different phase differences, i.e., Δϕ = 0°, 90°, 180°, and 270°, are visualized using a stereoscopic color dye visualization system and measured using a two-dimensional particle image velocimetry (PIV) system. It is found that depending on the phase difference of twin SJs, three types of vortex structures are produced. At Δϕ = 90°, the two hairpin vortices interact in a very constructive way in terms of the vortex size, strength, and celerity, forming one combined vortex. At Δϕ = 270°, the two individual hairpin vortices do not have much interaction, forming two completely separated hairpin vortices that behave like doubling the frequency of the single SJ case. At Δϕ = 0° and 180°, the two hairpin vortices produced by the twin SJ actuators are close enough, with the head of one hairpin vortex coupled with the legs of the other, forming partially interacting vortex structures. Quantitative analysis of the twin SJs is conducted, including the time histories of vortex circulation in the mid-span plane as well as a selected spanwise-wall-normal plane, and the influence of the twin SJs on the boundary layer flow filed. In addition, dynamic mode decomposition analysis of the PIV data is conducted to extract representative coherent structures. Through this study, a better understanding in the vortex dynamics associated with the interaction of in-line twin SJs in laminar boundary layers is achieved, which provides useful information for future SJ-array applications.

  12. Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources

    Directory of Open Access Journals (Sweden)

    Christian Schmitt

    2015-07-01

    Full Text Available This paper presents a model for structuring and reusing security requirements sources. The model serves as blueprint for the development of an organization-specific repository, which provides relevant security requirements sources, such as security information and knowledge sources and relevant compliance obligations, in a structured and reusable form. The resulting repository is intended to be used by development teams during the elicitation and analysis of security requirements with the goal to understand the security problem space, incorporate all relevant requirements sources, and to avoid unnecessary effort for identifying, understanding, and correlating applicable security requirements sources on a project-wise basis. We start with an overview and categorization of important security requirements sources, followed by the description of the generic model. To demonstrate the applicability and benefits of the model, the instantiation approach and details of the resulting repository of security requirements sources are presented.

  13. Wireless overhead line temperature sensor based on RF cavity resonance

    International Nuclear Information System (INIS)

    Ghafourian, Maryam; Nezhad, Abolghasem Zeidaabadi; Bridges, Greg E; Thomson, Douglas J

    2013-01-01

    The importance of maximizing power transfer through overhead transmission lines necessitates the use of dynamic power control to keep transmission line temperatures within acceptable limits. Excessive conductor operating temperatures lead to an increased sag of the transmission line conductor and may reduce their expected life. In this paper, a passive wireless sensor based on a resonant radio frequency (RF) cavity is presented which can be used to measure overhead transmission line temperature. The temperature sensor does not require a power supply and can be easily clamped to the power line with an antenna attached. Changing temperature causes a change of cavity dimensions and a shift in resonant frequency. The resonant frequency of the cavity can be interrogated wirelessly. This temperature sensor has a resolution of 0.07 °C and can be interrogated from distances greater than 4.5 m. The sensor has a deviation from linearity of less than 2 °C. (paper)

  14. Dynamics of the line-start reluctance motor with rotor made of SMC material

    Directory of Open Access Journals (Sweden)

    Smółka Krzysztof

    2017-12-01

    Full Text Available Design and control of electric motors in such a way as to ensure the expected motor dynamics, are the problems studied for many years. Many researchers tried to solve this problem, for example by the design optimization or by the use of special control algorithms in electronic systems. In the case of low-power and fractional power motors, the manufacture cost of the final product is many times less than cost of electronic system powering them. The authors of this paper attempt to improve the dynamic of 120 W line-start synchronous reluctance motor, energized by 50 Hz mains (without any electronic systems. The authors seek a road enabling improvement of dynamics of the analyzed motor, by changing the shape and material of the rotor, in such a way to minimize the modification cost of the tools necessary for the motor production. After the initial selection, the analysis of four rotors having different tooth shapes, was conducted.

  15. Physical and data-link security techniques for future communication systems

    CERN Document Server

    Tomasin, Stefano

    2016-01-01

     This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are discussed, with presentation of cutting-edge research and innovative results from leading researchers. The characteristic feature of all the contributions is their relevance for practical embodiments: detailed consideration is given to applications of security principles to a variety of widely used communication techniques such as multiantenna systems, ultra-wide band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, providing a bridge between two usually distinct worlds. The book comprises extended versions of contributions delivered at the Workshop on Communication Security, held in Ancona, I...

  16. Can low-carbon societies deliver on energy security?

    International Nuclear Information System (INIS)

    Jewell, Jessica

    2015-01-01

    The impact of low-carbon policies on energy security depends on both the timing and intensity of these policies, and the definition of energy security: security of what?; security for whom?; and security from which threats? The priorities of the EU’s 2030 climate/energy package and energy security show little if any alignment. Global climate stabilization policies benefit the energy security of India, China, and the EU, but may have negative impacts on export revenues of the U.S. and other energy exporters.

  17. On-line monitoring of methane in sewer air.

    Science.gov (United States)

    Liu, Yiwen; Sharma, Keshab R; Murthy, Sudhir; Johnson, Ian; Evans, Ted; Yuan, Zhiguo

    2014-10-16

    Methane is a highly potent greenhouse gas and contributes significantly to climate change. Recent studies have shown significant methane production in sewers. The studies conducted so far have relied on manual sampling followed by off-line laboratory-based chromatography analysis. These methods are labor-intensive when measuring methane emissions from a large number of sewers, and do not capture the dynamic variations in methane production. In this study, we investigated the suitability of infrared spectroscopy-based on-line methane sensors for measuring methane in humid and condensing sewer air. Two such sensors were comprehensively tested in the laboratory. Both sensors displayed high linearity (R(2) > 0.999), with a detection limit of 0.023% and 0.110% by volume, respectively. Both sensors were robust against ambient temperature variations in the range of 5 to 35°C. While one sensor was robust against humidity variations, the other was found to be significantly affected by humidity. However, the problem was solved by equipping the sensor with a heating unit to increase the sensor surface temperature to 35°C. Field studies at three sites confirmed the performance and accuracy of the sensors when applied to actual sewer conditions, and revealed substantial and highly dynamic methane concentrations in sewer air.

  18. Utilization of graph theory in security analysis of power grid

    Directory of Open Access Journals (Sweden)

    Dalibor Válek

    2014-12-01

    Full Text Available This paper describes way how to use graph theory in security analysis. As an environment is used network of power lines and devices which are included here. Power grid is considered as a system of nodes which make together graph (network. On the simple example is applied Fiedler´s theory which is able to select the most important power lines of whole network. Components related to these lines are logicly ordered and considered by author´s modified analysis. This method has been improved and optimalized for risks related with illegal acts. Each power grid component has been connected with possible kind of attack and every of this device was gradually evaluated by five coefficients which takes values from 1 to 10. On the coefficient basis was assessed the level of risk. In the last phase the most risky power grid components have been selected. On the selected devices have been proposed security measures.

  19. Time variations of oxygen emission lines and solar wind dynamic parameters in low latitude region

    Science.gov (United States)

    Jamlongkul, P.; Wannawichian, S.; Mkrtichian, D.; Sawangwit, U.; A-thano, N.

    2017-09-01

    Aurora phenomenon is an effect of collision between precipitating particles with gyromotion along Earth’s magnetic field and Earth’s ionospheric atoms or molecules. The particles’ precipitation occurs normally around polar regions. However, some auroral particles can reach lower latitude regions when they are highly energetic. A clear emission from Earth’s aurora is mostly from atomic oxygen. Moreover, the sun’s activities can influence the occurrence of the aurora as well. This work studies time variations of oxygen emission lines and solar wind parameters, simultaneously. The emission’s spectral lines were observed by Medium Resolution Echelle Spectrograph (MRES) along with 2.4 meters diameter telescope at Thai National Observatory, Intanon Mountain, Chiang Mai, Thailand. Oxygen (OI) emission lines were calibrated by Dech-Fits spectra processing program and Dech95 2D image processing program. The correlations between oxygen emission lines and solar wind dynamics will be analyzed. This result could be an evidence of the aurora in low latitude region.

  20. Prediction of the dynamic response of complex transmission line systems for unsteady pressure measurements

    International Nuclear Information System (INIS)

    Antonini, C; Persico, G; Rowe, A L

    2008-01-01

    Among the measurement and control systems of gas turbine engines, a recent new issue is the possibility of performing unsteady pressure measurements to detect flow anomalies in an engine or to evaluate loads on aerodynamic surfaces. A possible answer to this demand could be extending the use of well known and widely used transmission line systems, which have been applied so far to steady monitoring, to unsteady measurements thanks to proper dynamic modeling and compensation. Despite the huge number of models existing in the literature, a novel method has been developed, which is at the same time easy-to-handle, flexible and capable of reproducing the actual physics of the problem. Furthermore, the new model is able to deal with arbitrary complex networks of lines and cavities, and thus its applicability is not limited to series-connected systems. The main objectives of this paper are to show the derivation of the model, its validation against experimental tests and example of its applicability

  1. Dynamic Symmetric Key Mobile Commerce Scheme Based on Self-Verified Mechanism

    Directory of Open Access Journals (Sweden)

    Jiachen Yang

    2014-01-01

    Full Text Available In terms of the security and efficiency of mobile e-commerce, the authors summarized the advantages and disadvantages of several related schemes, especially the self-verified mobile payment scheme based on the elliptic curve cryptosystem (ECC and then proposed a new type of dynamic symmetric key mobile commerce scheme based on self-verified mechanism. The authors analyzed the basic algorithm based on self-verified mechanisms and detailed the complete transaction process of the proposed scheme. The authors analyzed the payment scheme based on the security and high efficiency index. The analysis shows that the proposed scheme not only meets the high efficiency of mobile electronic payment premise, but also takes the security into account. The user confirmation mechanism at the end of the proposed scheme further strengthens the security of the proposed scheme. In brief, the proposed scheme is more efficient and practical than most of the existing schemes.

  2. Object-Oriented Control System Design Using On-Line Training of Artificial Neural Networks

    Science.gov (United States)

    Rubaai, Ahmed

    1997-01-01

    This report deals with the object-oriented model development of a neuro-controller design for permanent magnet (PM) dc motor drives. The system under study is described as a collection of interacting objects. Each object module describes the object behaviors, called methods. The characteristics of the object are included in its variables. The knowledge of the object exists within its variables, and the performance is determined by its methods. This structure maps well to the real world objects that comprise the system being modeled. A dynamic learning architecture that possesses the capabilities of simultaneous on-line identification and control is incorporated to enforce constraints on connections and control the dynamics of the motor. The control action is implemented "on-line", in "real time" in such a way that the predicted trajectory follows a specified reference model. A design example of controlling a PM dc motor drive on-line shows the effectiveness of the design tool. This will therefore be very useful in aerospace applications. It is expected to provide an innovative and noval software model for the rocket engine numerical simulator executive.

  3. The Dynamic VPN Controller. Secure Information Sharing in a Coalition Environment

    Science.gov (United States)

    2005-03-01

    coalitionName=" COALA "> <Security>Class A</Security> <Site siteName="SITE1"> <Remote> <Hostname>dvc.site1.com</Hostname> <IPAddress...34 COALA "> <Security>Class A</Security> <Site siteName="SITE1"> <Remote> <Hostname>dvc.site1.com</Hostname> <IPAddress>10.1.1.1

  4. Meeting Complex Challenges Through National Security Reform

    National Research Council Canada - National Science Library

    Gockel, Kathy

    2008-01-01

    .... The Obama administration will have no shortage of advice pouring in from myriad sources on how to address the dynamic nature of security given the wars in Iraq and Afghanistan and the global financial turmoil...

  5. Attachment Security Balances Perspectives: Effects of Security Priming on Highly Optimistic and Pessimistic Explanatory Styles.

    Science.gov (United States)

    Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue

    2016-01-01

    Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.

  6. A secure communication scheme using projective chaos synchronization

    International Nuclear Information System (INIS)

    Li Zhigang; Xu Daolin

    2004-01-01

    Most secure communication schemes using chaotic dynamics are based on identical synchronization. In this paper, we show the possibility of secure communication using projective synchronization (PS). The unpredictability of the scaling factor in projective synchronization can additionally enhance the security of communication. It is also showed that the scaling factor can be employed to improve the robustness against noise contamination. The feasibility of the communication scheme in high-dimensional chaotic systems, such as the hyperchaotic Roessler system, is demonstrated. Numerical results show the success in transmitting a sound signal through chaotic systems

  7. Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices

    Science.gov (United States)

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797

  8. Security mechanism based on Hospital Authentication Server for secure application of implantable medical devices.

    Science.gov (United States)

    Park, Chang-Seop

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.

  9. Survey of potential use of dynamic line phantom for quality control of Gamma camera

    International Nuclear Information System (INIS)

    Trindev, P.; Ozturk, N.

    2004-01-01

    Different phantoms, used to evaluate the essential for image quality parameters of gamma cameras in order to avoid artefacts, are presented. The prices are significant and it is a sensible approach to optimise the type and number of phantoms necessary for quality control. Among all phantoms the price of 'Dynamic Line Phantom' (DLP) is impressive, but it is announced to substitute several 'passive' and 'active' phantoms. The goal of this paper is to justify this statement. The programs, based on image profile are discussed in the paper and the practical uses of the different programs are given

  10. Security analysis of interconnected AC/DC systems

    DEFF Research Database (Denmark)

    Eriksson, Robert

    2015-01-01

    This paper analyses N-1 security in an interconnected ac/dc transmission system using power transfer distribution factors (PTDFs). In the case of a dc converter outage the power needs to be redistributed among the remaining converter to maintain power balance and operation of the dc grid...... any line or transformer limits. Simulations were performed in a model of the Nordic power system where a dc grid is placed on top. The simulation supports the method as a tool to consider transfer limits in the grid to avoid violate the same and increase the security after a converter outage........ The redistribution of power has a sudden effect on the power-flow in the interconnected ac system. This may cause overloading of lines and transformers resulting in disconnection of equipment, and as a consequence cascading failure. The PTDF is used as a method to analyze and avoid violating limits by in the dc...

  11. On non-stationarity of dynamic systems

    DEFF Research Database (Denmark)

    Høskuldsson, Agnar

    2004-01-01

    . Covariance structure of dynamic systems tends to vary over time. Here some procedures to find stable solutions to linear dynamic systems with low rank are presented. Subsets of variables and samples to be included in a model are considered. The procedures are based on the H-principle of mathematical...... that are based on exact solutions. With in few seconds the algorithms can provide with solutions of models having hundreds or thousands of variables. The procedure is described mathematically and demonstrated for a dynamic industrial case. It is shown how the algorithms can provide solutions involving NIR data...... for process control. The method is simple to apply and the motivation of the procedure is obvious for industrial applications. It can be used, e.g., when modelling on-line systems....

  12. Lecture 13: Control System Cyber Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Today, the industralized world lives in symbiosis with control systems: it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and outline why the presenter is still waiting for a change in paradigm. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and...

  13. Performance Evaluation on Transmission Tower-Line System with Passive Friction Dampers Subjected to Wind Excitations

    Directory of Open Access Journals (Sweden)

    Bo Chen

    2015-01-01

    Full Text Available The vibration control and performance evaluation on a transmission-tower line system by using friction dampers subjected to wind excitations are carried out in this study. The three-dimensional finite element (FE model of a transmission tower is firstly constructed. A two-dimensional lumped mass model of a transmission tower is developed for dynamic analysis. The analytical model of transmission tower-line system is proposed by taking the dynamic interaction between the tower and the transmission lines into consideration. The mechanical model of passive friction damper is presented by involving the effects of damper axial stiffness. The equation of motion of the transmission tower-line system incorporated with the friction dampers disturbed by wind excitations is established. A real transmission tower-line system is taken as an example to examine the feasibility and reliability of the proposed control approach. An extensive parameter study is carried out to find the optimal parameters of friction damper and to assess the effects of slipping force axial stiffness and hysteresis loop on control performance. The work on an example structure indicates that the application of friction dampers with optimal parameters could significantly reduce wind-induced responses of the transmission tower-line system.

  14. Unconditionally Secure and Universally Composable Commitments from Physical Assumptions

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Scafuro, Alessandra

    2013-01-01

    We present a constant-round unconditional black-box compiler that transforms any ideal (i.e., statistically-hiding and statistically-binding) straight-line extractable commitment scheme, into an extractable and equivocal commitment scheme, therefore yielding to UC-security [9]. We exemplify the u...... of unconditional UC-security with (malicious) PUFs and stateless tokens, our compiler can be instantiated with any ideal straight-line extractable commitment scheme, thus allowing the use of various setup assumptions which may better fit the application or the technology available....

  15. Impact of Inter‐Basin Water Transfer Projects on Regional Ecological Security from a Telecoupling Perspective

    Directory of Open Access Journals (Sweden)

    Yuan Quan

    2016-02-01

    Full Text Available Inter‐basin water transfer projects (IBWTPs offer one of the most important means to solve the mismatch between supply and demand of regional water resources. IBWTPs have impacts on the complex ecosystems of the areas from which water is diverted and to which water is received. These impacts increase damage or risk to regional ecological security and human wellbeing. However, current methods make it difficult to achieve comprehensive analysis of the impacts of whole ecosystems, because of the long distance between ecosystems and the inconsistency of impact events. In this study, a model was proposed for the analysis of the impacts of IBWTPs on regional ecological security. It is based on the telecoupling framework, and the Driver‐Pressure‐State‐ Impact‐Response (DPSIR model was used to improve the analysis procedure within the telecoupling framework. The Middle Line of the South‐to‐North Water Diversion Project was selected as a case study to illustrate the specific analysis procedure. We realized that information sharing is a key issue in the management of regional security, and that the ecological water requirement, in the form of a single index, could be used to quantitatively assess the impacts on ecological security from IBWTPs.

  16. An Overview of DRAM-Based Security Primitives

    Directory of Open Access Journals (Sweden)

    Nikolaos Athanasios Anagnostopoulos

    2018-03-01

    Full Text Available Recent developments have increased the demand for adequate security solutions, based on primitives that cannot be easily manipulated or altered, such as hardware-based primitives. Security primitives based on Dynamic Random Access Memory (DRAM can provide cost-efficient and practical security solutions, especially for resource-constrained devices, such as hardware used in the Internet of Things (IoT, as DRAMs are an intrinsic part of most contemporary computer systems. In this work, we present a comprehensive overview of the literature regarding DRAM-based security primitives and an extended classification of it, based on a number of different criteria. In particular, first, we demonstrate the way in which DRAMs work and present the characteristics being exploited for the implementation of security primitives. Then, we introduce the primitives that can be implemented using DRAM, namely Physical Unclonable Functions (PUFs and True Random Number Generators (TRNGs, and present the applications of each of the two types of DRAM-based security primitives. We additionally proceed to assess the security such primitives can provide, by discussing potential attacks and defences, as well as the proposed security metrics. Subsequently, we also compare these primitives to other hardware-based security primitives, noting their advantages and shortcomings, and proceed to demonstrate their potential for commercial adoption. Finally, we analyse our classification methodology, by reviewing the criteria employed in our classification and examining their significance.

  17. On-line Social Interactions and Executive Functions

    Directory of Open Access Journals (Sweden)

    Oscar eYbarra

    2012-04-01

    Full Text Available A successful social interaction requires fast, on-line, and active construction of an ever-changing mental-model of another’s person beliefs, expectations, emotions, and desires. It also requires the ability to inhibit inappropriate behaviors, problem-solve, take-turns, and pursue goals in a distraction-rich environment. All these tasks rely on executive functions (EF—working memory, attention/cognitive control, and inhibition. Executive functioning has long been viewed as relatively static. However, starting with recent reports of successful cognitive interventions, this view is changing and now EFs are seen as much more open to both short and long term training, warm-up, and exhaustion effects. Some of the most intriguing evidence comes from research showing how social interaction enhances performance on standard EF tests. Interestingly, the latest research indicates these EF benefits are selectively conferred by certain on-line, dynamic social interactions, which require participants to engage with another person and actively construct the model of their mind. We review this literature and highlight its connection with evolutionary and cultural theories emphasizing links between intelligence and social life.

  18. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shibo Luo

    2015-12-01

    Full Text Available Software-Defined Networking-based Mobile Networks (SDN-MNs are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  19. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.

    Science.gov (United States)

    Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua

    2015-12-17

    Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  20. Dynamics of user networks in on-line electronic auctions

    Czech Academy of Sciences Publication Activity Database

    Slanina, František

    2014-01-01

    Roč. 17, č. 1 (2014), "1450002-1"-"1450002-14" ISSN 0219-5259 R&D Projects: GA MŠk OC09078 Institutional support: RVO:68378271 Keywords : networks * random graphs * dynamics Subject RIV: BE - Theoretical Physics Impact factor: 0.968, year: 2014

  1. Refelctions on the security

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  2. Gene expression programming for power system static security ...

    African Journals Online (AJOL)

    user

    fuzzy logic, artificial neural networks and expert systems have been explored for static security assessment problems (Bansal et ..... MATLAB version 7.6 neural network toolbox was ..... Vision 2020 Dynamic Security Assessment in Real time.

  3. 46 CFR 7.1 - General purpose of boundary lines.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false General purpose of boundary lines. 7.1 Section 7.1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES APPLICABLE TO THE PUBLIC BOUNDARY LINES General § 7.1 General purpose of boundary lines. The lines in this part delineate the application of the...

  4. A STUDY ON BIOMETRIC TEMPLATE SECURITY

    Directory of Open Access Journals (Sweden)

    N. Radha

    2010-07-01

    Full Text Available The increasing popularity of biometrics and cryptography is driven by the widespread stipulation on information security. Abundant efforts have been made in developing successful methods in these areas in order to accomplish an enhanced level of information security. There are two dominant issues in information security enhancement. One is to defend the user ownership and control the access to information by authenticating an individual’s identity. The other is to make sure the privacy and integrity of information and to secure communication. Cryptography is the science of writing in secret code. Secret-key cryptography and public-key cryptography are the two most important cryptographic architectures. The security of a cryptographic system is reliant on the secrecy of the cryptographic key. Biometric authentication or simply biometrics refers to establishing automatic personal recognition based on the physical and behavioral characteristics of an individual (e.g. face, voice, fingerprint, gait, hand geometry, iris, gene, etc.. Biometrics offers superior security and easier than traditional identity authentication systems (based on passwords and cryptographic keys.Since biometrics characteristics are naturally related with a particular individual, making them insusceptible to being stolen, forgotten, lost or attached. This paper presents a survey on various techniques proposed earlier in developing an authentication system for ensuring individual’s information security by combining biometric characteristics of that particular individual and the cryptographic techniques. In addition, it provides some fundamental idea for future research that may help in eliminating the problems associated with the present authentication systems.

  5. Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2014-01-01

    Full Text Available After two recent security attacks against implantable medical devices (IMDs have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient’s life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician’s treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.

  6. PMU-Aided Voltage Security Assessment for a Wind Power Plant: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Jiang, H.; Zhang, Y. C.; Zhang, J. J.; Muljadi, E.

    2015-04-08

    Because wind power penetration levels in electric power systems are continuously increasing, voltage stability is a critical issue for maintaining power system security and operation. The traditional methods to analyze voltage stability can be classified into two categories: dynamic and steady-state. Dynamic analysis relies on time-domain simulations of faults at different locations; however, this method needs to exhaust faults at all locations to find the security region for voltage at a single bus. With the widely located phasor measurement units (PMUs), the Thevenin equivalent matrix can be calculated by the voltage and current information collected by the PMUs. This paper proposes a method based on a Thevenin equivalent matrix to identify system locations that will have the greatest impact on the voltage at the wind power plant’s point of interconnection. The number of dynamic voltage stability analysis runs is greatly reduced by using the proposed method. The numerical results demonstrate the feasibility, effectiveness, and robustness of the proposed approach for voltage security assessment for a wind power plant.

  7. Operations research, engineering, and cyber security trends in applied mathematics and technology

    CERN Document Server

    Rassias, Themistocles

    2017-01-01

    Mathematical methods and theories with interdisciplinary applications are presented in this book. The eighteen contributions presented in this Work have been written by eminent scientists; a few papers are based on talks which took place at the International Conference at the Hellenic Artillery School in May 2015. Each paper evaluates possible solutions to long-standing problems such as the solvability of the direct electromagnetic scattering problem, geometric approaches to cyber security, ellipsoid targeting with overlap, non-equilibrium solutions of dynamic networks, measuring ballistic dispersion, elliptic regularity theory for the numerical solution of variational problems, approximation theory for polynomials on the real line and the unit circle, complementarity and variational inequalities in electronics, new two-slope parameterized achievement scalarizing functions for nonlinear multiobjective optimization, and strong and weak convexity of closed sets in a Hilbert space. Graduate students, scientists,...

  8. A network security situation prediction model based on wavelet neural network with optimized parameters

    Directory of Open Access Journals (Sweden)

    Haibo Zhang

    2016-08-01

    Full Text Available The security incidents ion networks are sudden and uncertain, it is very hard to precisely predict the network security situation by traditional methods. In order to improve the prediction accuracy of the network security situation, we build a network security situation prediction model based on Wavelet Neural Network (WNN with optimized parameters by the Improved Niche Genetic Algorithm (INGA. The proposed model adopts WNN which has strong nonlinear ability and fault-tolerance performance. Also, the parameters for WNN are optimized through the adaptive genetic algorithm (GA so that WNN searches more effectively. Considering the problem that the adaptive GA converges slowly and easily turns to the premature problem, we introduce a novel niche technology with a dynamic fuzzy clustering and elimination mechanism to solve the premature convergence of the GA. Our final simulation results show that the proposed INGA-WNN prediction model is more reliable and effective, and it achieves faster convergence-speed and higher prediction accuracy than the Genetic Algorithm-Wavelet Neural Network (GA-WNN, Genetic Algorithm-Back Propagation Neural Network (GA-BPNN and WNN.

  9. Estonian Perceptions of Security: Not Only About Russia and the Refugees

    OpenAIRE

    Veebel Viljar; Ploom Illimar

    2016-01-01

    The current study focuses on the Estonian perceptions of security and on the defence situation both globally and locally. The dynamic results of the public opinion surveys on security risks conducted in Estonia over the last 10 years (2006-2016) will be presented. In addition, to understand whether some of the security risks could be over- or underestimated in Estonia, these results will be compared with the views expressed recently by the World Economic Forum, particularly the Global Risks R...

  10. Multilevel classification of security concerns in cloud computing

    Directory of Open Access Journals (Sweden)

    Syed Asad Hussain

    2017-01-01

    Full Text Available Threats jeopardize some basic security requirements in a cloud. These threats generally constitute privacy breach, data leakage and unauthorized data access at different cloud layers. This paper presents a novel multilevel classification model of different security attacks across different cloud services at each layer. It also identifies attack types and risk levels associated with different cloud services at these layers. The risks are ranked as low, medium and high. The intensity of these risk levels depends upon the position of cloud layers. The attacks get more severe for lower layers where infrastructure and platform are involved. The intensity of these risk levels is also associated with security requirements of data encryption, multi-tenancy, data privacy, authentication and authorization for different cloud services. The multilevel classification model leads to the provision of dynamic security contract for each cloud layer that dynamically decides about security requirements for cloud consumer and provider.

  11. On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Teymoori, Vahid; Nikooghadam, Morteza; Abbassi, Hassan

    2015-08-01

    Telecare medicine information systems (TMISs) aim to deliver appropriate healthcare services in an efficient and secure manner to patients. A secure mechanism for authentication and key agreement is required to provide proper security in these systems. Recently, Bin Muhaya demonstrated some security weaknesses of Zhu's authentication and key agreement scheme and proposed a security enhanced authentication and key agreement scheme for TMISs. However, we show that Bin Muhaya's scheme is vulnerable to off-line password guessing attacks and does not provide perfect forward secrecy. Furthermore, in order to overcome the mentioned weaknesses, we propose a new two-factor anonymous authentication and key agreement scheme using the elliptic curve cryptosystem. Security and performance analyses demonstrate that the proposed scheme not only overcomes the weaknesses of Bin Muhaya's scheme, but also is about 2.73 times faster than Bin Muhaya's scheme.

  12. ASLan++ — A Formal Security Specification Language for Distributed Systems

    DEFF Research Database (Denmark)

    Von Oheimb, David; Mödersheim, Sebastian Alexander

    2010-01-01

    This paper introduces ASLan++, the AVANTSSAR Specification Language. ASLan++ has been designed for formally specifying dynamically composed security-sensitive web services and service-oriented architectures, their associated security policies, as well as their security properties, at both communi...

  13. Latest developments in on- and off-line inspection of bank notes during production

    Science.gov (United States)

    Brown, Stephen C.

    2004-06-01

    The inspection of bank notes is a highly labour intensive process where traditionally every note on every sheet is inspected manually. However with the advent of more and more sophisticated security features, both visible and invisible, and the requirement of cost reduction in the printing process, it is clear that automation is required. Machines for the automatic inspection of bank notes have been on the market for the past 10 to 12 years, but recent developments in technology have enabled a new generation of detectors and machines to be developed. This paper focuses on the latest developments in both the off-line and on-line inspection of bank notes covering not only the visible spectrum but also a new range of detectors for inspection some of the more common invisible features used as covert features in today's bank notes.

  14. Collisionless reconnection: magnetic field line interaction

    Directory of Open Access Journals (Sweden)

    R. A. Treumann

    2012-10-01

    Full Text Available Magnetic field lines are quantum objects carrying one quantum Φ0 = 2πh/e of magnetic flux and have finite radius λm. Here we argue that they possess a very specific dynamical interaction. Parallel field lines reject each other. When confined to a certain area they form two-dimensional lattices of hexagonal structure. We estimate the filling factor of such an area. Anti-parallel field lines, on the other hand, attract each other. We identify the physical mechanism as being due to the action of the gauge potential field, which we determine quantum mechanically for two parallel and two anti-parallel field lines. The distortion of the quantum electrodynamic vacuum causes a cloud of virtual pairs. We calculate the virtual pair production rate from quantum electrodynamics and estimate the virtual pair cloud density, pair current and Lorentz force density acting on the field lines via the pair cloud. These properties of field line dynamics become important in collisionless reconnection, consistently explaining why and how reconnection can spontaneously set on in the field-free centre of a current sheet below the electron-inertial scale.

  15. New Security Development and Trends to Secure the SCADA Sensors Automated Transmission during Critical Sessions

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2015-10-01

    Full Text Available Modern technology enhancements have been used worldwide to fulfill the requirements of the industrial sector, especially in supervisory control and data acquisition (SCADA systems as a part of industrial control systems (ICS. SCADA systems have gained popularity in industrial automations due to technology enhancements and connectivity with modern computer networks and/or protocols. The procurement of new technologies has made SCADA systems important and helpful to processing in oil lines, water treatment plants, and electricity generation and control stations. On the other hand, these systems have vulnerabilities like other traditional computer networks (or systems, especially when interconnected with open platforms. Many international organizations and researchers have proposed and deployed solutions for SCADA security enhancement, but most of these have been based on node-to-node security, without emphasizing critical sessions that are linked directly with industrial processing and automation. This study concerns SCADA security measures related to critical processing with specified sessions of automated polling, analyzing cryptography mechanisms and deploying the appropriate explicit inclusive security solution in a distributed network protocol version 3 (DNP3 stack, as part of a SCADA system. The bytes flow through the DNP3 stack with security computational bytes within specified critical intervals defined for polling. We took critical processing knowledge into account when designing a SCADA/DNP3 testbed and deploying a cryptography solution that did not affect communications.

  16. Dynamic metamaterial aperture for microwave imaging

    International Nuclear Information System (INIS)

    Sleasman, Timothy; Imani, Mohammadreza F.; Gollub, Jonah N.; Smith, David R.

    2015-01-01

    We present a dynamic metamaterial aperture for use in computational imaging schemes at microwave frequencies. The aperture consists of an array of complementary, resonant metamaterial elements patterned into the upper conductor of a microstrip line. Each metamaterial element contains two diodes connected to an external control circuit such that the resonance of the metamaterial element can be damped by application of a bias voltage. Through applying different voltages to the control circuit, select subsets of the elements can be switched on to create unique radiation patterns that illuminate the scene. Spatial information of an imaging domain can thus be encoded onto this set of radiation patterns, or measurements, which can be processed to reconstruct the targets in the scene using compressive sensing algorithms. We discuss the design and operation of a metamaterial imaging system and demonstrate reconstructed images with a 10:1 compression ratio. Dynamic metamaterial apertures can potentially be of benefit in microwave or millimeter wave systems such as those used in security screening and through-wall imaging. In addition, feature-specific or adaptive imaging can be facilitated through the use of the dynamic aperture

  17. Dynamic metamaterial aperture for microwave imaging

    Energy Technology Data Exchange (ETDEWEB)

    Sleasman, Timothy; Imani, Mohammadreza F.; Gollub, Jonah N.; Smith, David R. [Center for Metamaterials and Integrated Plasmonics, Department of Electrical and Computer Engineering, Duke University, Durham, North Carolina, 27708 (United States)

    2015-11-16

    We present a dynamic metamaterial aperture for use in computational imaging schemes at microwave frequencies. The aperture consists of an array of complementary, resonant metamaterial elements patterned into the upper conductor of a microstrip line. Each metamaterial element contains two diodes connected to an external control circuit such that the resonance of the metamaterial element can be damped by application of a bias voltage. Through applying different voltages to the control circuit, select subsets of the elements can be switched on to create unique radiation patterns that illuminate the scene. Spatial information of an imaging domain can thus be encoded onto this set of radiation patterns, or measurements, which can be processed to reconstruct the targets in the scene using compressive sensing algorithms. We discuss the design and operation of a metamaterial imaging system and demonstrate reconstructed images with a 10:1 compression ratio. Dynamic metamaterial apertures can potentially be of benefit in microwave or millimeter wave systems such as those used in security screening and through-wall imaging. In addition, feature-specific or adaptive imaging can be facilitated through the use of the dynamic aperture.

  18. Plasma membrane organization and dynamics is probe and cell line dependent.

    Science.gov (United States)

    Huang, Shuangru; Lim, Shi Ying; Gupta, Anjali; Bag, Nirmalya; Wohland, Thorsten

    2017-09-01

    The action and interaction of membrane receptor proteins take place within the plasma membrane. The plasma membrane, however, is not a passive matrix. It rather takes an active role and regulates receptor distribution and function by its composition and the interaction of its lipid components with embedded and surrounding proteins. Furthermore, it is not a homogenous fluid but contains lipid and protein domains of various sizes and characteristic lifetimes which are important in regulating receptor function and signaling. The precise lateral organization of the plasma membrane, the differences between the inner and outer leaflet, and the influence of the cytoskeleton are still debated. Furthermore, there is a lack of comparisons of the organization and dynamics of the plasma membrane of different cell types. Therefore, we used four different specific membrane markers to test the lateral organization, the differences between the inner and outer membrane leaflet, and the influence of the cytoskeleton of up to five different cell lines, including Chinese hamster ovary (CHO-K1), Human cervical carcinoma (HeLa), neuroblastoma (SH-SY5Y), fibroblast (WI-38) and rat basophilic leukemia (RBL-2H3) cells by Imaging Total Internal Reflection (ITIR)-Fluorescence Correlation Spectroscopy (FCS). We measure diffusion in the temperature range of 298-310K to measure the Arrhenius activation energy (E Arr ) of diffusion and apply the FCS diffusion law to obtain information on the spatial organization of the probe molecules on the various cell membranes. Our results show clear differences of the FCS diffusion law and E Arr for the different probes in dependence of their localization. These differences are similar in the outer and inner leaflet of the membrane. However, these values can differ significantly between different cell lines raising the question how molecular plasma membrane events measured in different cell lines can be compared. This article is part of a Special Issue

  19. Security cost allocation under combined bilateral-pool market dispatch

    International Nuclear Information System (INIS)

    Abdullah, M.P.; Hassan, M.Y.; Hussin, F.

    2008-01-01

    Most electricity markets around the world are a combination of bilateral and pool markets, such as NordPool and NYPOOL. In these models, market participants bid into the pool and also make bilateral contracts with each other. This paper addressed the issue of congestion management and security cost allocation in a power pool market model. The basic idea of security cost allocation is to divide the incurred security cost due to congestion relief into pool and bilateral market based on their flow contribution to the congested line. A newly proposed security cost allocation strategy of the combined bilateral-pool market was also presented along with case studies using IEEE-14 bus system that tested the proposed method. Using the proposed method, it was shown that security costs are allocated to market participants at different prices which reflect the load contribution to the security problem. This solves the problem of the uniform security cost allocation in a pure pool market system having uniform pricing, and provides a proper security signal to market participants. 11 refs., 3 tabs., 4 figs

  20. Towards Information Security Metrics Framework for Cloud Computing

    OpenAIRE

    Muhammad Imran Tariq

    2012-01-01

    Cloud computing has recently emerged as new computing paradigm which basically aims to provide customized, reliable, dynamic services over the internet.  Cost and security are influential issues to deploy cloud computing in large enterprise.  Privacy and security are very important issues in terms of user trust and legal compliance. Information Security (IS) metrics are best tool used to measure the efficiency, performance, effectiveness and impact of the security constraints. It is very hard...

  1. Numerical Calculation of Overhead Power Lines Dynamics

    Directory of Open Access Journals (Sweden)

    Gogola Roman

    2016-11-01

    Full Text Available This paper contains results of transient analysis of airflow around the ACSR power line cross-section in unsymmetric multi-span. The forces applied to the power line are obtained from CFD simulations, where the wind induced vibration is studied. Effect of these forces to the maximal displacement of the power line and the maximal mechanical forces in the points of attachment are studied and evaluated.

  2. Risk assessment for sustainable food security in China according to integrated food security--taking Dongting Lake area for example.

    Science.gov (United States)

    Qi, Xiaoxing; Liu, Liming; Liu, Yabin; Yao, Lan

    2013-06-01

    Integrated food security covers three aspects: food quantity security, food quality security, and sustainable food security. Because sustainable food security requires that food security must be compatible with sustainable development, the risk assessment of sustainable food security is becoming one of the most important issues. This paper mainly focuses on the characteristics of sustainable food security problems in the major grain-producing areas in China. We establish an index system based on land resources and eco-environmental conditions and apply a dynamic assessment method based on status assessments and trend analysis models to overcome the shortcomings of the static evaluation method. Using fuzzy mathematics, the risks are categorized into four grades: negligible risk, low risk, medium risk, and high risk. A case study was conducted in one of China's major grain-producing areas: Dongting Lake area. The results predict that the status of the sustainable food security in the Dongting Lake area is unsatisfactory for the foreseeable future. The number of districts at the medium-risk range will increase from six to ten by 2015 due to increasing population pressure, a decrease in the cultivated area, and a decrease in the effective irrigation area. Therefore, appropriate policies and measures should be put forward to improve it. The results could also provide direct support for an early warning system-which could be used to monitor food security trends or nutritional status so to inform policy makers of impending food shortages-to prevent sustainable food security risk based on some classical systematic methods. This is the first research of sustainable food security in terms of risk assessment, from the perspective of resources and the environment, at the regional scale.

  3. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1993-05-01

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  4. Energy shortages in Europe? strategic meetings on energy security

    International Nuclear Information System (INIS)

    Derdevet, M.

    2005-01-01

    On the RTE's initiative, the Economic and Social Council welcome the first 'Strategic Meetings on Energy Security' event on July 11, 2005. With its 'Energy Shortages in Europe?' subtitle, the convention was in line with the topical issue of oil price increases. Opening the convention, Hubert Bouchet, the vice-president of the Research and Technology Productive Activities section of the Economic and Social Council (CES) stated that with its 400 million citizens, Europe uses over 2 500 tWh of electricity a year, and that its demand for primary energy is growing, making it the largest importer of energy in the world and the top second user after the United States. The trend should continue at least until 2030. H Bouchet also stress that though the worlds is using increasing amounts of energy, over 1.5 billion people do not have access to modern energy sources. Therefore, there are huge needs. There were four round-tables introducing rich debates with the room. The first one was about the issue of the 'energy market: the end of overcapacity', and the second one, dedicated so secure supplies, was titled: 'An ill adapted regulatory framework and European context'. In the afternoon, exchanges covered 'Strategies to prepare the energy offer for new stakes' and 'Major strategies for France and Europe'. (author)

  5. Assessing the effect of marine reserves on household food security in Kenyan coral reef fishing communities.

    Directory of Open Access Journals (Sweden)

    Emily S Darling

    Full Text Available Measuring the success or failure of natural resource management is a key challenge to evaluate the impact of conservation for ecological, economic and social outcomes. Marine reserves are a popular tool for managing coastal ecosystems and resources yet surprisingly few studies have quantified the social-economic impacts of marine reserves on food security despite the critical importance of this outcome for fisheries management in developing countries. Here, I conducted semi-structured household surveys with 113 women heads-of-households to investigate the influence of two old, well-enforced, no-take marine reserves on food security in four coastal fishing communities in Kenya, East Africa. Multi-model information-theoretic inference and matching methods found that marine reserves did not influence household food security, as measured by protein consumption, diet diversity and food coping strategies. Instead, food security was strongly influenced by fishing livelihoods and household wealth: fishing families and wealthier households were more food secure than non-fishing and poorer households. These findings highlight the importance of complex social and economic landscapes of livelihoods, urbanization, power and gender dynamics that can drive the outcomes of marine conservation and management.

  6. Agent-Based Modelling for Security Risk Assessment

    NARCIS (Netherlands)

    Janssen, S.A.M.; Sharpans'kykh, Alexei; Bajo, J.; Vale, Z.; Hallenborg, K.; Rocha, A.P.; Mathieu, P.; Pawlewski, P.; Del Val, E.; Novais, P.; Lopes, F.; Duque Méndez, N.D.; Julián, V.; Holmgren, J.

    2017-01-01

    Security Risk Assessment is commonly performed by using traditional methods based on linear probabilistic tools and informal expert judgements. These methods lack the capability to take the inherent dynamic and intelligent nature of attackers into account. To partially address the limitations,

  7. On melting dynamics and the glass transition. II. Glassy dynamics as a melting process.

    Science.gov (United States)

    Krzakala, Florent; Zdeborová, Lenka

    2011-01-21

    There are deep analogies between the melting dynamics in systems with a first-order phase transition and the dynamics from equilibrium in super-cooled liquids. For a class of Ising spin models undergoing a first-order transition--namely p-spin models on the so-called Nishimori line--it can be shown that the melting dynamics can be exactly mapped to the equilibrium dynamics. In this mapping the dynamical--or mode-coupling--glass transition corresponds to the spinodal point, while the Kauzmann transition corresponds to the first-order phase transition itself. Both in mean field and finite dimensional models this mapping provides an exact realization of the random first-order theory scenario for the glass transition. The corresponding glassy phenomenology can then be understood in the framework of a standard first-order phase transition.

  8. Secure computing on reconfigurable systems

    OpenAIRE

    Fernandes Chaves, R.J.

    2007-01-01

    This thesis proposes a Secure Computing Module (SCM) for reconfigurable computing systems. SC provides a protected and reliable computational environment, where data security and protection against malicious attacks to the system is assured. SC is strongly based on encryption algorithms and on the attestation of the executed functions. The use of SC on reconfigurable devices has the advantage of being highly adaptable to the application and the user requirements, while providing high performa...

  9. Design optimization for security-and safety-critical distributed real-time applications

    DEFF Research Database (Denmark)

    Jiang, Wei; Pop, Paul; Jiang, Ke

    2016-01-01

    requirements on confidentiality of messages, task replication is used to enhance system reliability, and dynamic voltage and frequency scaling is used for energy efficiency of tasks. It is challenging to address these factors simultaneously, e.g., better security protections need more computing resources......In this paper, we are interested in the design of real-time applications with security, safety, timing, and energy requirements. The applications are scheduled with cyclic scheduling, and are mapped on distributed heterogeneous architectures. Cryptographic services are deployed to satisfy security...... and consume more energy, while lower voltages and frequencies may impair schedulability and security, and also lead to reliability degradation. We introduce a vulnerability based method to quantify the security performance of communications on distributed systems. We then focus on determining the appropriate...

  10. The nature of international health security.

    Science.gov (United States)

    Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N

    2009-01-01

    Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.

  11. A METHODOLOGICAL APPROACH TO THE STRATEGIC ANALYSIS OF FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Anastasiia Mostova

    2017-12-01

    of food security consists of two blocks: the analyses of the external and internal environment. It is proposed, in order to improve the validity of the strategic analysis, to evaluate strengths and weaknesses, threats, and opportunities at the time of analysis, as well as to explore the trends of their change in dynamics. For this purpose, the author proposed establishing the persistence of the identified strengths, weaknesses, threats, and opportunities. To accomplish it, the persistent strengths of possibilities include, in the author’s opinion, characteristics with a positive dynamic over the examined period while the persistent weaknesses and threats include, accordingly, those with a negative dynamic. Practical implications. Result of the present research is the advanced matrix of a SWOT-analysis of food security, which complements traditional method with the grouping according to the basic strategic groups of food security (production, market, resources, consumption, as well as the level of persistence of strengths and weaknesses, threats and opportunities, depending on the dynamics of the proposed characteristics. The main practical outcome of the developed procedure is the list of strategic recommendations based on the identified strengths and weaknesses, threats and opportunities of food security, depending on the level of their persistence. The value and originality of the scientific results are in that as a result of the proposed procedure, there will be built an effective instrument for carrying out a strategic analysis of the country’s food security. Based on the strategic analysis of the persistent strengths, the author identified the main com-petitive advantages of the country’s food security, which are to be strengthened, while implementing supporting strategic measures and control. It is established that the non-persistent strengths of food security of Ukraine would require a more effective management in comparison with those persistent, as

  12. Assessment of the Technological Changes Impact on the Sustainability of State Security System of Ukraine

    Directory of Open Access Journals (Sweden)

    Olexandr Yemelyanov

    2018-04-01

    Full Text Available Currently, the governments of many countries are facing with a lack of funds for financing programs for social protection of population. Among the causes of this problem, we can indicate the high unemployment rate, which, among other things, is due to implementation of labor-saving technologies. The purpose of this work is to study the impact of technological changes on the sustainability of the state social security system in Ukraine. The general approaches to the assessment of the stability of the state social security system are described. The simulation of the effect of economically efficient technological changes on the company’s income and expenses was carried out. Some patterns of such changes are established. The group of productive technological changes types is presented. The model is developed, and an indicator of the impact estimation of efficiently effective technological changes on the stability of the state social security system is proposed. The analysis of the main indicators of the state social security system functioning of Ukraine is carried out. The dynamics of indicators characterizing the labor market of Ukraine is analyzed. The influence of changes in labor productivity on costs and profits by industries of Ukraine is estimated. The evaluation of the impact of economically efficient technological changes in the industries of Ukraine on the stability of its state social security system is carried out. The different state authorities can use the obtained results for developing measures to manage the sustainability of the state social security system.

  13. On-Line Monitoring of Fermentation Processes by Near Infrared and Fluorescence Spectroscopy

    DEFF Research Database (Denmark)

    Svendsen, Carina

    Monitoring and control of fermentation processes is important to ensure high product yield, product quality and product consistency. More knowledge on on-line analytical techniques such as near infrared and fluorescence spectroscopy is desired in the fermentation industry to increase the efficiency...... of on-line monitoring systems. The primary aim of this thesis is to elucidate and explore the dynamics in fermentation processes by spectroscopy. Though a number of successful on-line lab-scale monitoring systems have been reported, it seems that several challenges are still met, which limits the number...... of full-scale systems implemented in industrial fermentation processes. This thesis seeks to achieve a better understanding of the techniques near infrared and fluorescence spectroscopy and thereby to solve some of the challenges that are encountered. The thesis shows the advantages of applying real...

  14. Design Impedance Mismatch Physical Unclonable Functions for IoT Security

    Directory of Open Access Journals (Sweden)

    Xiaomin Zheng

    2017-01-01

    Full Text Available We propose a new design, Physical Unclonable Function (PUF scheme, for the Internet of Things (IoT, which has been suffering from multiple-level security threats. As more and more objects interconnect on IoT networks, the identity of each thing is very important. To authenticate each object, we design an impedance mismatch PUF, which exploits random physical factors of the transmission line to generate a security unique private key. The characteristic impedance of the transmission line and signal transmission theory of the printed circuit board (PCB are also analyzed in detail. To improve the reliability, current feedback amplifier (CFA method is applied on the PUF. Finally, the proposed scheme is implemented and tested. The measure results show that impedance mismatch PUF provides better unpredictability and randomness.

  15. A Survey on Secure Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Shihong Zou

    2017-01-01

    Full Text Available Combining tiny sensors and wireless communication technology, wireless body area network (WBAN is one of the most promising fields. Wearable and implantable sensors are utilized for collecting the physiological data to achieve continuously monitoring of people’s physical conditions. However, due to the openness of wireless environment and the significance and privacy of people’s physiological data, WBAN is vulnerable to various attacks; thus, strict security mechanisms are required to enable a secure WBAN. In this article, we mainly focus on a survey on the security issues in WBAN, including securing internal communication in WBAN and securing communication between WBAN and external users. For each part, we discuss and identify the security goals to be achieved. Meanwhile, relevant security solutions in existing research on WBAN are presented and their applicability is analyzed.

  16. Hardening CISCO Devices based on Cryptography and Security Protocols - Part One: Background Theory

    Directory of Open Access Journals (Sweden)

    Faisal Waheed

    2018-07-01

    Full Text Available Network Security is a vital part of any corporate and enterprise network. Network attacks greatly compromise not only the sensitive data of the consumers but also cause outages to these networks. Thus inadequately protected networks need to be “hardened”. The hardening of network devices refers to the hardware and software components, device operating system’s features, management controls, access-list restrictions, operational configurations and above all making sure that the data and credentials are not stored or transferred in ‘plaintext’ over the network. This article investigates the use of cryptography and network protocols based on encryption, to meet the need for essential security requirements. Use of non-secure protocols, underrating and misconfigurations of management protection are reasons behind network devices not properly being hardened; hence leaving vulnerabilities for the intruders. The gap identified after conducting intense search and review of past work is used as the foundation to present solutions. When performing cryptography techniques by encrypting packets using tunnelling and security protocols, management level credentials are encrypted. These include password encryption and exceptional analysis of the emulated IOS (Internetwork Operating System. Necessary testing is carried out to evaluate an acceptable level of protection of these devices. In a virtual testing environment, security flaws are found mainly in the emulated IOS. The discoveries does not depend on the hardware or chassis of a networking device. Since routers primarily rely on its Operating System (OS, attackers focus on manipulating the command line configuration before initiating an attack. Substantial work is devoted to implementation and testing of a router based on Cryptography and Security Protocols in the border router. This is deployed at the core layer and acts as the first point of entry of any trusted and untrusted traffic. A step

  17. SAF line analytical chemistry system

    International Nuclear Information System (INIS)

    Gerber, E.W.; Sherrell, D.L.

    1983-10-01

    An analytical chemistry system dedicated to supporting the Secure Automated Fabrication (SAF) line is discussed. Several analyses are required prior to the fuel pellets being loaded into cladding tubes to assure certification requirements will be met. These analyses, which will take less than 15 minutes, are described. The automated sample transport system which will be used to move pellets from the fabriction line to the chemistry area is also described

  18. Comment on "Dynamic quantum secret sharing"

    Science.gov (United States)

    Liao, Ci-Hong; Yang, Chun-Wei; Hwang, Tzonelish

    2013-10-01

    Hsu et al. (Quantum Inf Process 12:331-344,2013) proposed a dynamic quantum secret sharing (DQSS) protocol using the entanglement swapping of Bell states for an agent to easily join (or leave) the system. In 2013, Wang and Li (Quantum Inf Process 12(5):1991-1997, 2013) proposed a collusion attack on Hsu et al.'s DQSS protocol. Nevertheless, this study points out a new security issue on Hsu et al.'s DQSS protocol regarding to the honesty of a revoked agent. Without considering this issue, the DQSS protocol could be failed to provide secret sharing function.

  19. SAF line pellet gaging

    International Nuclear Information System (INIS)

    Jedlovec, D.R.; Bowen, W.W.; Brown, R.L.

    1983-10-01

    Automated and remotely controlled pellet inspection operations will be utilized in the Secure Automated Fabrication (SAF) line. A prototypic pellet gage was designed and tested to verify conformance to the functions and requirements for measurement of diameter, surface flaws and weight-per-unit length

  20. The European Security and Defence Policy

    DEFF Research Database (Denmark)

    Adler-Nissen, Rebecca

    2009-01-01

    The European Security and Defence Policy (ESDP), which is the operational military and civilian dimension of the Common Foreign and Security Policy (CFSP), is today one of the most dynamic areas of the European Union. However, it is only recently that the EU has acquired explicit military decision....... The Union is thus gradually emerging as an important player on the international scene, with a strategic vision, as well as diplomatic, civilian and military crisis-management instruments that complement the existing economic, commercial, humanitarian and development policies on which the EU has hitherto...... built its reputation as a ‘soft power'. Despite its rapid development, many still regard the EU as weak and ineffi cient when it comes to security and defence policy. Moreover, the EU struggles with internal divisions and has a strained relationship with NATO. Nonetheless, there are good reasons...

  1. Estonian Perceptions of Security: Not Only About Russia and the Refugees

    Directory of Open Access Journals (Sweden)

    Veebel Viljar

    2016-12-01

    Full Text Available The current study focuses on the Estonian perceptions of security and on the defence situation both globally and locally. The dynamic results of the public opinion surveys on security risks conducted in Estonia over the last 10 years (2006-2016 will be presented. In addition, to understand whether some of the security risks could be over- or underestimated in Estonia, these results will be compared with the views expressed recently by the World Economic Forum, particularly the Global Risks Report 2016. Also, the arguments why some topics have played or are currently playing key role in the Estonian security perception will be presented and discussed.

  2. Design and Research of a New secure Authentication Protocol in GSM networks

    Directory of Open Access Journals (Sweden)

    Qi Ai-qin

    2016-01-01

    Full Text Available As the first line of defense in the security application system, Authentication is an important security service. Its typical scheme is challenge/response mechanism and this scheme which is simple-structured and easy to realize has been used worldwide. But these protocols have many following problems In the GSM networks such as the leakage of user indentity privacy, no security protection between home registers and foreign registers and the vicious intruders’ information stealing and so on. This paper presents an authentication protocol in GSM networks based on maths operation and modular square root technique . The analysis of the security and performance has also been done. The results show that it is more robust and secure compared to the previous agreements.

  3. A Novel Computer Virus Propagation Model under Security Classification

    Directory of Open Access Journals (Sweden)

    Qingyi Zhu

    2017-01-01

    Full Text Available In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by security classification in full interconnection network. By using the theory of dynamic stability, the existence of equilibria and stability conditions is analysed and proved. And the above optimal threshold value is given analytically. Then, some numerical experiments are made to justify the model. Besides, some discussions and antivirus measures are given.

  4. A GIS-based decision support system for regional eco-security assessment and its application on the Tibetan Plateau.

    Science.gov (United States)

    Xiaodan, Wang; Xianghao, Zhong; Pan, Gao

    2010-10-01

    Regional eco-security assessment is an intricate, challenging task. In previous studies, the integration of eco-environmental models and geographical information systems (GIS) usually takes two approaches: loose coupling and tight coupling. However, the present study used a full coupling approach to develop a GIS-based regional eco-security assessment decision support system (ESDSS). This was achieved by merging the pressure-state-response (PSR) model and the analytic hierarchy process (AHP) into ArcGIS 9 as a dynamic link library (DLL) using ArcObjects in ArcGIS and Visual Basic for Applications. Such an approach makes it easy to capitalize on the GIS visualization and spatial analysis functions, thereby significantly supporting the dynamic estimation of regional eco-security. A case study is presented for the Tibetan Plateau, known as the world's "third pole" after the Arctic and Antarctic. Results verified the usefulness and feasibility of the developed method. As a useful tool, the ESDSS can also help local managers to make scientifically-based and effective decisions about Tibetan eco-environmental protection and land use. Copyright (c) 2010 Elsevier Ltd. All rights reserved.

  5. Herschel extreme lensing line observations: Dynamics of two strongly lensed star-forming galaxies near redshift z = 2

    International Nuclear Information System (INIS)

    Rhoads, James E.; Malhotra, Sangeeta; Allam, Sahar; Carilli, Chris; Combes, Françoise; Finkelstein, Keely; Finkelstein, Steven; Frye, Brenda; Gerin, Maryvonne; Guillard, Pierre; Nesvadba, Nicole; Rigby, Jane; Spaans, Marco; Strauss, Michael A.

    2014-01-01

    We report on two regularly rotating galaxies at redshift z ≈ 2, using high-resolution spectra of the bright [C II] 158 μm emission line from the HIFI instrument on the Herschel Space Observatory. Both SDSS090122.37+181432.3 ( S 0901 ) and SDSSJ120602.09+514229.5 ( t he Clone ) are strongly lensed and show the double-horned line profile that is typical of rotating gas disks. Using a parametric disk model to fit the emission line profiles, we find that S0901 has a rotation speed of vsin (i) ≈ 120 ± 7 km s –1 and a gas velocity dispersion of σ g < 23 km s –1 (1σ). The best-fitting model for the Clone is a rotationally supported disk having vsin (i) ≈ 79 ± 11 km s –1 and σ g ≲ 4 km s –1 (1σ). However, the Clone is also consistent with a family of dispersion-dominated models having σ g = 92 ± 20 km s –1 . Our results showcase the potential of the [C II] line as a kinematic probe of high-redshift galaxy dynamics: [C II] is bright, accessible to heterodyne receivers with exquisite velocity resolution, and traces dense star-forming interstellar gas. Future [C II] line observations with ALMA would offer the further advantage of spatial resolution, allowing a clearer separation between rotation and velocity dispersion.

  6. Using Quartile-Quartile Lines as Linear Models

    Science.gov (United States)

    Gordon, Sheldon P.

    2015-01-01

    This article introduces the notion of the quartile-quartile line as an alternative to the regression line and the median-median line to produce a linear model based on a set of data. It is based on using the first and third quartiles of a set of (x, y) data. Dynamic spreadsheets are used as exploratory tools to compare the different approaches and…

  7. Modeling operational behavior of a disassembly line

    Science.gov (United States)

    Kizilkaya, Elif A.; Gupta, Surendra M.

    2004-12-01

    In this paper we present a dynamic kanban (pull) system specifically developed for disassembly lines. This type of kanban system is much more complex than the traditional kanban system used in assembly lines. For instance, unlike the assembly line where the external demand occurs only at the last station, the demands in the disassembly case also occur at any of the intermittent stations. The reason is that as a product moves on the disassembly line, various parts are disassembled at every station and accumulated at that station. Therefore, there are as many demand sources as there are number of parts. We consider a case example involving the end-of-life products. Based on the precedence relationships and other criteria such as hazardous properties of the parts, we balance the disassembly line. The results of the disassembly line-balancing problem (DLBP) are used as input to the proposed dynamic kanban system for disassembly line (DKSDL). We compare the performance of the DKSDL to the modified kanban system for disassembly line (MKSDL), which was previously introduced by the authors. We show, via simulation, that the DKSDL is far superior to MKSDL considered.

  8. THE MASS MEDIA’S BEARING ON THE RESOLUTION OF POST-INDEPENDENCE SECURITY ISSUES IN NIGERIA

    Directory of Open Access Journals (Sweden)

    Osakue Stevenson Omoera

    2017-09-01

    Full Text Available Conceptualising national security continues to be a taxing undertaking as a range of factors point up its capacity at all levels of perception, and thus, cannot be restricted to a single definition due to its changing nature from one nation-state to another. Therefore, national security remains dynamic, fluid and multi-directional, but it is critical to the survival of any nation-state. In post-independence Nigeria, security threats to its national interests not only involve conventional threats such as the ones from other nation-states but also non-state actors and activities such as terrorists, arms dealers, pirates, heists, drug traffickers, kidnappers, street gangster insurgencies, border disputes and ethnic militias. Over the past fifty six years or so, traditional threats to national security in Nigeria have metamorphosed into grave security behemoths, which apparently cannot be eliminated by military forces or security institutions alone. The mass media have been suggested to have the capacity to contribute meaningfully towards assisting security institutions in eliminating or checking the security challenges, which the country is confronted with.  Perhaps, this is because the media are an integral part of the soft power infrastructure, which could facilitate the dissemination of information in a fast and effective way, thereby helping a nation such as Nigeria to put together the appropriate political action that is aimed at entrenching the desired national security. Deploying the agenda setting and framing theories, this article undertakes an appraisal of whether or not the Nigerian mass media (specifically, Daily Trust and The Punch have made impactful contributions toward the resolution of security issues in post-independence Nigeria, with a particular reference to the Boko Haram sect(s’ insurgencies. It employs analytic, in-depth interviews (IDIs and historical methods to look at some media reports on the insurgencies with the aim

  9. REMOTE SYNTHESIS AND CONTROL INFORMATION TECHNOLOGY OF SYSTEM-DYNAMIC MODELS

    Directory of Open Access Journals (Sweden)

    A. V. Masloboev

    2015-07-01

    Full Text Available The general line of research is concerned with development of information technologies and computer simulation tools for management information and analytical support of complex semistructured systems. Regional socio-economic systems are consideredas a representative of this system type. Investigation is carried out within the bounds of development strategy implementation of the Arctic zone of the Russian Federation and national safety until 2020 in the Murmansk region, specifically under engineering of high end information infrastructure for innovation and security control problem-solving of regional development. Research methodology consists of system dynamics modeling method, distributed information system engineering technologies, pattern-based modeling and design techniques. The work deals with development of toolkit for decision-making information support problem-solving in the field of innovation security management of regional economics. For that purpose a system-dynamic models suite of innovation process standard components and information technology for remote formation and control of innovation business simulation models under research have been developed. Designed toolkit provides innovation security index dynamics forecasting and innovation business effectiveness of regional economics. Information technology is implemented within the bounds of thin client architecture and is intended for simulation models design process automation of complex systems. Technology implementation software tools provide pattern-based system-dynamic models distributed formation and simulation control of innovation processes. The technology provides availability and reusability index enhancement of information support facilities in application to innovation process simulation at the expense of distributed access to innovation business simulation modeling tools and model synthesis by the reusable components, simulating standard elements of innovation

  10. Dynamic Rule Encryption for Mobile Payment

    Directory of Open Access Journals (Sweden)

    Emir Husni

    2017-01-01

    Full Text Available The trend of financial transactions by using a mobile phone or mobile payment increases. By using the mobile payment service, users can save money on mobile phone (handset and separate from the pulse. For protecting users, mobile payment service providers must complete the mobile payment service with the transaction security. One way to provide transaction security is to utilize a secure mobile payment application. This research provides a safety feature used for an Android-based mobile payment application. This security feature is making encryption rules dynamically named Dynamic Rule Encryption (DRE. DRE has the ability to protect data by means of encrypting data with dynamic rules, and DRE also has a token function for an authentication. DRE token raised with dynamic time-based rules. Here, the time is used as a reference with the order of the day in the year (day of the year. The processes of the DRE’s encryption, decryption, and the DRE’s functionality as the token are discussed in this paper. Here, the Hamming distance metric is employed for having maximum differences between plaintext and ciphertext.

  11. CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Cristea DUMITRU

    2011-12-01

    Full Text Available Critical Information Infrastructure security will always be difficult to ensure, just because of the features that make it irreplaceable tor other critical infrastructures normal operation. It is decentralized, interconnected interdependent, controlled by multiple actors (mainly private and incorporating diverse types of technologies. It is almost axiomatic that the disruption of the Critical Information Infrastructure affects systems located much farther away, and the cyber problems have direct consequences on the real world. Indeed the Internet can be used as a multiplier in order to amplify the effects of an attack on some critical infrastructures. Security challenges increase with the technological progress. One of the last lines of defense which comes to complete the overall security scheme of the Critical Information Infrastructure is represented by the Network Intrusion Detection Systems.

  12. Cloud Computing Security Latest Issues amp Countermeasures

    Directory of Open Access Journals (Sweden)

    Shelveen Pandey

    2015-08-01

    Full Text Available Abstract Cloud computing describes effective computing services provided by a third-party organization known as cloud service provider for organizations to perform different tasks over the internet for a fee. Cloud service providers computing resources are dynamically reallocated per demand and their infrastructure platform and software and other resources are shared by multiple corporate and private clients. With the steady increase in the number of cloud computing subscribers of these shared resources over the years security on the cloud is a growing concern. In this review paper the current cloud security issues and practices are described and a few innovative solutions are proposed that can help improve cloud computing security in the future.

  13. The determination of organochlorine pesticides based on dynamic microwave-assisted extraction coupled with on-line solid-phase extraction of high-performance liquid chromatography

    International Nuclear Information System (INIS)

    Chen Ligang; Ding Lan; Jin Haiyan; Song Daqian; Zhang Huarong; Li Jiantao; Zhang Kun; Wang Yutang; Zhang Hanqi

    2007-01-01

    A rapid technique based on dynamic microwave-assisted extraction coupled with on-line solid-phase extraction of high-performance liquid chromatography (DMAE-SPE-HPLC) has been developed. A TM 010 microwave resonance cavity built in the laboratory was applied to concentrate the microwave energy. The sample placed in the zone of microwave irradiation was extracted with 95% acetonitrile (ACN) aqueous solution which was driven by a peristaltic pump at a flow rate of 1.0 mL min -1 . The extraction can be completed in a recirculating system in 10 min. When a number of extraction cycles were completed, the extract (1 mL) was diluted on-line with water. Then the extract was loaded into an SPE column where the analytes were retained while the unretained matrix components were washed away. Subsequently, the analytes were automatically transferred from the SPE column to the analytical column and determined by UV detector at 238 nm. The technique was used for determination of organochlorine pesticides (OCPs) in grains, including wheat, rice, corn and bean. The limits of detection of OCPs are in the range of 19-37 ng g -1 . The recoveries obtained by analyzing the four spiked grain samples are in the range of 86-105%, whereas the relative standard deviation (R.S.D.) values are <8.7% ranging from 1.2 to 8.7%. Our method was demonstrated to be fast, accurate, and precise. In addition, only small quantities of solvent and sample were required

  14. Dynamic Oil-in-Water Concentration Acquisition on a Pilot-Scaled Offshore Water-Oil Separation Facility

    DEFF Research Database (Denmark)

    Løhndorf, Petar Durdevic; Raju, Chitra Sangaraju; Bram, Mads Valentin

    2017-01-01

    This article is a feasibility study on using fluorescence-based oil-in-water (OiW) monitors for on-line dynamic efficiency measurement of a deoiling hydrocyclone. Dynamic measurements are crucial in the design and validation of dynamic models of the hydrocyclones, and to our knowledge, no dynamic...

  15. Temperature dependence of dynamical permeability characterization of magnetic thin films using shorted microstrip line probe

    International Nuclear Information System (INIS)

    Li, Xiling; Li, Chengyi; Chai, Guozhi

    2017-01-01

    A temperature dependence microwave permeability characterization system of magnetic thin film up to 10 GHz is designed and fabricated. This system can be used at temperatures ranging from room temperature to 200 °C, and is based on a shorted microstrip probe, which is made by microwave printed circuit board. Without contacting the magnetic thin films to the probe, the microwave permeability of the film can be detected without any limitations of sample size and with almost the same accuracy, as shown by comparison with the results obtained from a shorted microstrip transmission-line fixture. The complex permeability can be deduced by an analytical approach from the measured reflection coefficient of a strip line ( S 11 ) with and without a ferromagnetic film material on it. The procedures are the same with the shorted microstrip transmission-line method. The microwave permeability of an oblique deposited CoZr thin film was investigated with this probe. The results show that the room temperature dynamic permeability of the CoZr film is in good agreement with the results obtained from the established short-circuited microstrip perturbation method. The temperature dependence permeability results fit well with the Landau–Lifshitz–Gilbert equation. Development of the temperature-dependent measurement of the magnetic properties of magnetic thin film may be useful for the high-frequency application of magnetic devices at high temperatures. (paper)

  16. Secure Skyline Queries on Cloud Platform.

    Science.gov (United States)

    Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian

    2017-04-01

    Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions.

  17. The Security Email Based on Smart Card

    Science.gov (United States)

    Lina, Zhang; Jiang, Meng Hai.

    Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can't be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.

  18. Trapping photons on the line: controllable dynamics of a quantum walk

    Science.gov (United States)

    Xue, Peng; Qin, Hao; Tang, Bao

    2014-04-01

    Optical interferometers comprising birefringent-crystal beam displacers, wave plates, and phase shifters serve as stable devices for simulating quantum information processes such as heralded coined quantum walks. Quantum walks are important for quantum algorithms, universal quantum computing circuits, quantum transport in complex systems, and demonstrating intriguing nonlinear dynamical quantum phenomena. We introduce fully controllable polarization-independent phase shifters in optical pathes in order to realize site-dependent phase defects. The effectiveness of our interferometer is demonstrated through realizing single-photon quantum-walk dynamics in one dimension. By applying site-dependent phase defects, the translational symmetry of an ideal standard quantum walk is broken resulting in localization effect in a quantum walk architecture. The walk is realized for different site-dependent phase defects and coin settings, indicating the strength of localization signature depends on the level of phase due to site-dependent phase defects and coin settings and opening the way for the implementation of a quantum-walk-based algorithm.

  19. Cloud Computing Security: A Survey

    Directory of Open Access Journals (Sweden)

    Issa M. Khalil

    2014-02-01

    Full Text Available Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for traditional computing systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide a comprehensive study of cloud computing security and privacy concerns. We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Additionally, we investigate and identify the limitations of the current solutions and provide insights of the future security perspectives. Finally, we provide a cloud security framework in which we present the various lines of defense and identify the dependency levels among them. We identify 28 cloud security threats which we classify into five categories. We also present nine general cloud attacks along with various attack incidents, and provide effectiveness analysis of the proposed countermeasures.

  20. The EU as an international security provider

    DEFF Research Database (Denmark)

    Rodt, Annemarie Peen; Wolff, Stefan; Whitman, Richard

    2015-01-01

    This contribution develops a framework of analysis that covers the actors involved in the policy making process of international security provision, the dynamics of this process itself, its outcomes (concrete strategies and policies) and their impact. Our efforts to establish such a framework...... of analysis, which could serve as the foundation for a mid-range theory of the EU as an international security provider, will examine the relevance of, and apply, existing theories of international relations/international security and foreign policy analysis to the specific case of the EU. The framework...... that will emerge from this analysis will then be tested and applied empirically in the following contributions that focus on how particular policies are formulated and implemented, and that analyse, in single and comparative case studies, the impact and effectiveness of the EU as an international security provider....

  1. Does employment security modify the effect of housing affordability on mental health?

    Directory of Open Access Journals (Sweden)

    Rebecca Bentley

    2016-12-01

    Full Text Available This paper uses longitudinal data to examine the interrelationship between two central social determinants of mental health – employment security and housing affordability.Data from ten annual waves of the longitudinal Household, Income and Labour Dynamics in Australia (HILDA survey (which commenced in 2000/1 and is ongoing were analysed using fixed-effects longitudinal linear regression. Change in the SF-36 Mental Component Summary (MCS score of working age individuals (25–64 years (51,885 observations of 10,776 people, associated with changes in housing affordability was examined. Models were adjusted for income, age, survey year, experience of serious injury/illness and separation/divorce. We tested for an additive interaction between the security of a household's employment arrangements and housing affordability.People in insecurely employed households appear more vulnerable than people in securely employed households to negative mental health effects of housing becoming unaffordable. In adjusted models, people in insecurely employed households whose housing became unaffordable experienced a decline in mental health (B=−1.06, 95% CI −1.75 to −0.38 while people in securely employed households experienced no difference on average.To progress our understanding of the Social Determinants of Health this analysis provides evidence of the need to bridge the (largely artificial separation of social determinants, and understand how they are related.

  2. Integrating dynamic and distributed compressive sensing techniques to enhance image quality of the compressive line sensing system for unmanned aerial vehicles application

    Science.gov (United States)

    Ouyang, Bing; Hou, Weilin; Caimi, Frank M.; Dalgleish, Fraser R.; Vuorenkoski, Anni K.; Gong, Cuiling

    2017-07-01

    The compressive line sensing imaging system adopts distributed compressive sensing (CS) to acquire data and reconstruct images. Dynamic CS uses Bayesian inference to capture the correlated nature of the adjacent lines. An image reconstruction technique that incorporates dynamic CS in the distributed CS framework was developed to improve the quality of reconstructed images. The effectiveness of the technique was validated using experimental data acquired in an underwater imaging test facility. Results that demonstrate contrast and resolution improvements will be presented. The improved efficiency is desirable for unmanned aerial vehicles conducting long-duration missions.

  3. Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

    Directory of Open Access Journals (Sweden)

    Jongho Moon

    2017-01-01

    Full Text Available Recently many authentication protocols using an extended chaotic map were suggested for a mobile user. Many researchers demonstrated that authentication protocol needs to provide key agreement, mutual authentication, and user anonymity between mobile user and server and resilience to many possible attacks. In this paper, we cautiously analyzed chaotic-map-based authentication scheme and proved that it is still insecure to off-line identity guessing, user and server impersonation, and on-line identity guessing attacks. To address these vulnerabilities, we proposed an improved protocol based on an extended chaotic map and a fuzzy extractor. We proved the security of the proposed protocol using a random oracle and AVISPA (Automated Validation of Internet Security Protocols and Applications tool. Furthermore, we present an informal security analysis to make sure that the improved protocol is invulnerable to possible attacks. The proposed protocol is also computationally efficient when compared to other previous protocols.

  4. Identification of Variables and Factors Impacting Consumer Behavior in On-line Shopping in India: An Empirical Study

    Science.gov (United States)

    Chhikara, Sudesh

    On-line shopping is a recent phenomenon in the field of E-Business and is definitely going to be the future of shopping in the world. Most of the companies are running their on-line portals to sell their products/services. Though online shopping is very common outside India, its growth in Indian Market, which is a large and strategic consumer market, is still not in line with the global market. The potential growth of on-line shopping has triggered the idea of conducting a study on on-line shopping in India. The present research paper has used exploratory study to depict and highlight the various categories of factors and variables impacting the behavior of consumers towards on-line shopping in India. The data was collected through in-depth interviews on a sample of 41 respondents from Delhi, Mumbai, Chennai and Bangalore. The results of the study show that on-line shopping in India is basically impacted by five categories of factors like demographics factor, Psychographics factor, Online shopping feature and policies, Technological factor, Security factor. The results of the study are used to present a comprehensive model of on-line shopping which could be further used by the researchers and practitioners for conducting future studies in the similar area. A brief operational definition of all the factors and variables impacting on-line shopping in India is also described. And finally practical implications of the study are also elucidated.

  5. Impact of Security Awareness Programs on End-User Security Behavior: A Quantitative Study of Federal Workers

    Science.gov (United States)

    Smith, Gwendolynn T.

    2012-01-01

    The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…

  6. Multi-perspective analysis of China's energy supply security

    International Nuclear Information System (INIS)

    Geng, Jiang-Bo; Ji, Qiang

    2014-01-01

    China's energy supply security has faced many challenges such as the drastic change of the international energy environment and the domestic energy situation and so on. This paper constructs a multi-dimensional indicator system for the main risks deriving from four aspects to evaluate the situation of China's energy supply security and analyze its evolution characteristics from 1994 to 2011. The results indicate that the situation of China's energy supply security generally presented a downtrend during 1994–2008, as a result of increasing international energy market monopoly and high volatility of international crude oil prices. After 2008, the overall level of China's energy supply security has improved to the level of 2003, which is attributed to the relatively stable international energy environment as well as the effective implementation of energy policies. - Highlights: • A multi-dimensional index system for energy supply security is constructed. • The dynamic influences of external and internal risks are analyzed. • China's energy supply security presents a downward trend during 1994–2008. • The level of China's energy supply security has improved since 2009

  7. Methodology for evaluation of economic security of industrial enterprises

    OpenAIRE

    Kopytko Marta Ivanovna

    2014-01-01

    This paper investigates the features of evaluation of ensuring economic security of industrial enterprises and the algorithm of complex evaluation of the economic security of industrial enterprises over time and the system of criteria and their limit values ​​and the dynamics of change to determine the level of economic security industrial enterprise in terms of its components.

  8. Architecture and Knowledge-Driven Self-Adaptive Security in Smart Space

    Directory of Open Access Journals (Sweden)

    Antti Evesti

    2013-03-01

    Full Text Available Dynamic and heterogeneous smart spaces cause challenges for security because it is impossible to anticipate all the possible changes at design-time. Self-adaptive security is an applicable solution for this challenge. This paper presents an architectural approach for security adaptation in smart spaces. The approach combines an adaptation loop, Information Security Measuring Ontology (ISMO and a smart space security-control model. The adaptation loop includes phases to monitor, analyze, plan and execute changes in the smart space. The ISMO offers input knowledge for the adaptation loop and the security-control model enforces dynamic access control policies. The approach is novel because it defines the whole adaptation loop and knowledge required in each phase of the adaptation. The contributions are validated as a part of the smart space pilot implementation. The approach offers reusable and extensible means to achieve adaptive security in smart spaces and up-to-date access control for devices that appear in the space. Hence, the approach supports the work of smart space application developers.

  9. Gender security between human development and human security. Recent issues in the political international agenda

    Directory of Open Access Journals (Sweden)

    Paola Degani

    2014-06-01

    Full Text Available Issues regarding security, for a long time have been proposed, both in the scientific literature, that in the writings of popular character, without taking into due consideration the specificity of the effects that certain threats can cause the different subjectivity or on specific groups rather than on other . In particular, very rarely takes into account the fact that, in relation to the condition of women, we can talk, referring to certain areas or aspects of the problem, think of the problem of violence, of a real security crisis. The safety cultures sedimentation processes of socialization through everyday practices, can be considered an integral part of the internal structures of states. The issues relating to the in / security for women are on the agenda institutional, only a few years, do not fall within the traditional framework of interventions aimed at regulating sector profiles of women, in line with a vision of the subject recipient of this policy individual as "neutral." These are issues that today are also of inter-governmental organizations, in particular the United Nations, a central political role with respect to the adoption of policies related to the affirmation, respect and the effectiveness of human rights and at the same time enrich and innovate in order substantial guidelines and decision-making processes in the field of security.

  10. Spectral shapes of Ar-broadened HCl lines in the fundamental band by classical molecular dynamics simulations and comparison with experiments

    Energy Technology Data Exchange (ETDEWEB)

    Tran, H., E-mail: ha.tran@lisa.u-pec.fr [Laboratoire Interuniversitaire des Systèmes Atmosphériques, UMR CNRS 7583, Université Paris Est Créteil, Université Paris Diderot, Institut Pierre-Simon Laplace, 94010 Créteil Cedex (France); Domenech, J.-L. [Instituto de Estructura de la Materia, Consejo Superior de Investigaciones Cientificas, (IEM-CSIC), Serrano 123, 28006 Madrid (Spain)

    2014-08-14

    Spectral shapes of isolated lines of HCl perturbed by Ar are investigated for the first time using classical molecular dynamics simulations (CMDS). Using reliable intermolecular potentials taken from the literature, these CMDS provide the time evolution of the auto-correlation function of the dipole moment, whose Fourier-Laplace transform leads to the absorption spectrum. In order to test these calculations, room temperature spectra of various lines in the fundamental band of HCl diluted in Ar are measured, in a large pressure range, with a difference-frequency laser spectrometer. Comparisons between measured and calculated spectra show that the CMDS are able to predict the large Dicke narrowing effect on the shape of HCl lines and to satisfactorily reproduce the shapes of HCl spectra at different pressures and for various rotational quantum numbers.

  11. Static security-based available transfer capability using adaptive neuro fuzzy inference system

    Energy Technology Data Exchange (ETDEWEB)

    Venkaiah, C.; Vinod Kumar, D.M.

    2010-07-01

    In a deregulated power system, power transactions between a seller and a buyer can only be scheduled when there is sufficient available transfer capability (ATC). Internet-based, open access same-time information systems (OASIS) provide market participants with ATC information that is continuously updated in real time. Static security-based ATC can be computed for the base case system as well as for the critical line outages of the system. Since critical line outages are based on static security analysis, the computation of static security based ATC using conventional methods is both tedious and time consuming. In this study, static security-based ATC was computed for real-time applications using 3 artificial intelligent methods notably the back propagation algorithm (BPA), the radial basis function (RBF) neural network, and the adaptive neuro fuzzy inference system (ANFIS). An IEEE 24-bus reliability test system (RTS) and 75-bus practical system were used to test these 3 different intelligent methods. The results were compared with the conventional full alternating current (AC) load flow method for different transactions.

  12. Static security-based available transfer capability using adaptive neuro fuzzy inference system

    International Nuclear Information System (INIS)

    Venkaiah, C.; Vinod Kumar, D.M.

    2010-01-01

    In a deregulated power system, power transactions between a seller and a buyer can only be scheduled when there is sufficient available transfer capability (ATC). Internet-based, open access same-time information systems (OASIS) provide market participants with ATC information that is continuously updated in real time. Static security-based ATC can be computed for the base case system as well as for the critical line outages of the system. Since critical line outages are based on static security analysis, the computation of static security based ATC using conventional methods is both tedious and time consuming. In this study, static security-based ATC was computed for real-time applications using 3 artificial intelligent methods notably the back propagation algorithm (BPA), the radial basis function (RBF) neural network, and the adaptive neuro fuzzy inference system (ANFIS). An IEEE 24-bus reliability test system (RTS) and 75-bus practical system were used to test these 3 different intelligent methods. The results were compared with the conventional full alternating current (AC) load flow method for different transactions.

  13. Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar

    Science.gov (United States)

    Botel, Gabriel

    This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive

  14. FOOD SECURITY PROBLEMS OF THE RUSSIAN FEDERATION

    Directory of Open Access Journals (Sweden)

    Natalia Polyanskaya

    2015-09-01

    Full Text Available The article describes the concepts and factors of food security and food sovereignty of the Russian Federation. The composition of the consumer basket, the most significant of its components, and based on threshold values of self-sufficiency is calculated in the dynamics of the prevalence of food independence. The groups of products, which are in the country to be at a level below the thresholds, regulated by the food security doctrine of the Russian Federation. Identified the possible General trend of development of agricultural production in the country.

  15. Investigation of contact line dynamics under a vapor bubble at boiling on the transparent heater

    Science.gov (United States)

    Surtaev, A. S.; Serdyukov, V. S.

    2018-01-01

    The paper presents the results of an experimental study of dynamics of vapor bubble growth and departure at pool boiling, obtained with the use of high-speed video recording and IR thermography. The study was carried out at saturated water boiling under the atmospheric pressure in the range of heat fluxes of 30-150 kW/m2. To visualize the process and determine the growth rates of the outer bubble diameter, microlayer region and dry spot area, transpa-rent thin film heater with the thickness of 1 μm deposited on sapphire substrate was used in the experiments, and video recording was performed from the bottom side of the heating surface. To study integral heat transfer as well as local non-stationary thermal characteristics, high-speed infrared thermography with a frequency of up to 1000 FPS was used. High-speed video recording showed that after formation of vapor bubble and microlayer region, dry spot appears in a short time (up to 1 ms) under the vapor bubble. Various stages of contact line boundary propagation were ob-served. It was shown that at the initial stage before the development of small-scale perturbations, the dry spot propaga-tion rate is constant. It was also showed that the bubble departure stage begins after complete evaporation of liquid in the microlayer region.

  16. Evaluation Report on The Department's Unclassified Cyber Security Program - 2009

    International Nuclear Information System (INIS)

    Anon

    2009-01-01

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter

  17. On-line vibration and loose parts monitoring of nuclear power stations as a preventive maintenance tool

    International Nuclear Information System (INIS)

    An equipment for on-line monitoring of vibrations and loose parts of nuclear power plants is described. The unit consists of piezoelectric transducers, preamplifiers, a data processor, and peripherals. It secures on-line measurement without interfering with the operation of the power plant. A diagram is given showing the monitor of vibrations and loose parts for pressurized water reactors and the Spectra-Scan equipment for the automatic recording and computer processing of noise signals is described. A survey is given of diagnostic methods for internal vibrations, noise and oscillations and procedures for the analysis of recordings are described. The experiences of Atomica International with the observation of vibrations in nuclear power plants are described and an economic assessment is presented of the efficiency of on-line monitoring of these vibrations. A cost-benefit analysis is made of such equipment which justifies their introduction. (B.S.)

  18. Radiation source states on-line supervision system design and implementation based on RFID technology

    International Nuclear Information System (INIS)

    Yang Binhua; Ling Qiu; Yin Guoli; Yang Kun; Wan Xueping; Wang Kan

    2011-01-01

    It puts forward radiation source states on-line monitoring resolution based on RFID technology. Firstly, the system uses RFID in real-time transmission of the radiation dose rate, and monitors the radiation source states and dose rate of the surrounding environment on-line. Then it adopts regional wireless networking mode to construct enterprise level monitoring network, which resolves long-distance wiring problems. And then it uses GPRS wireless to transport the real-time data to the monitoring center and the government supervision department, By adopting randomly dynamic cording in display update every day, it strengthens the supervision of the radiation source. At last this system has been successful applied to a thickness gauge project, which verifies the feasibility and practicality is good. (authors)

  19. Problem of Information Security Traffic on Internet

    Directory of Open Access Journals (Sweden)

    Slavko Šarić

    2012-10-01

    Full Text Available Internet information traffic becomes greater and moreimportant. With increasing growth of information importancerequirement for its security becomes indispensable. Theinformation security problem especially affect large and smallcompanies whose prosperity is depending on Internet presence.This affecting the three areas of Internet commerce: credit cardtransactions, virtual private networks and digital certification.To ensure information traffic it is necessary to find a solution,in a proper way, for three major problems: frontier problem,market problem and government problem. While the eventualemergence of security standards for Internet transactions isexpected, it will not automatically result in secure Internettransactions. In future, there is a wealth of security issues thatwill continue to require attention: internal security, continuedhacking, social engineering, malicious code, reliability andperformance, skills shortages and denial of se1vice attacks.

  20. A German Perspective on Security Research

    Science.gov (United States)

    Thoma, Klaus; Hiller, Daniel; Leismann, Tobias; Drees, Birgit

    Prior to 2007, there was no coherent federal approach to conceptualise and fund security research in Germany. This changed with the initiation of the national program for civil security research, managed by the German Ministry for Education and Research (BMBF). Over the course of only four years a continuous build-up of national capacities on civil security was established to better protect German citizens, commodities and infrastructures against terrorism, organised crime and the effects of man-made and natural disasters.

  1. A note on the security of IS-RFID, an inpatient medication safety.

    Science.gov (United States)

    Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid

    2014-01-01

    In this paper we investigate the security level of a comprehensive RFID solution to enhance inpatient medication safety, named IS-RFID, which has been recently proposed by Peris-Lopez et al. We analyses the security of the protocol against the known attacks in the context. The main target of this paper is to determine whether the new protocol provides the confidentiality property, which is expected to be provided by such a protocol. It was found that IS-RFID has critical weaknesses. The presented security investigations show that a passive adversary can retrieve secret parameters of patient's tag in cost of O(2(16)) off-line PRNG evaluations. Given the tag's secret parameters, any security claims are ruined. In this paper we presented an efficient passive secret disclosure attack which retrieves the main secret parameters related to the patient which shows that IS-RFID may put the patient safety on risk. The proposed attacking technique is in light of two vulnerabilities of the protocol: (1) the short length of the used PRNG, which is urged by the target technology, EPC C1 Gen2 ; (2) the message-generating mechanism utilizing PRNG was not carefully scrutinized. While the later point can be fixed by careful designing of the transferred messages between the protocol's party, the earlier point, i.e., the short length of the available PRNG for EPC C1 Gen2 tags, is a limitation which is forced by the technology. In addition, over the last years, schemes based solely on using simple operations or short PRNG (such as IS-RFID) have been shown to offer very low or no security at all. Recent advances in lightweight ciphers, such as PRESENT or Grain , seem a much more appropriate solution rather than relying on short PRNGs. However, such solutions breaks the EPC C1 Gen2 compatibility. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  2. Triple-line behavior and wettability controlled by nanocoated substrates: influence on sessile drop evaporation.

    Science.gov (United States)

    Sobac, B; Brutin, D

    2011-12-20

    In this article, we investigate the influence of the surface properties of substrates on the evaporation process. Using various nanocoatings, it is possible to modify the surface properties of substrates, such as the roughness and the surface energy, while maintaining constant thermal properties. Experiments are conducted under atmospheric conditions with five fluids (methanol, ethanol, propanol, toluene and water) and four coatings (PFC, PTFE, SiOC, and SiO(x)). The various combinations of these fluids and coatings allow for a wide range of drop evaporation properties to be studied: the dynamics of the triple line, the volatility of fluids, and a large range of wettabilities (from 17 to 135°). The experimental data are in very good quantitative agreement with existing models of quasi-steady, diffusion-driven evaporation. The experimental results show that the dynamics of the evaporative rate are proportional to the dynamics of the wetting radius. Thus, the models succeed in describing the evaporative dynamics throughout the evaporation process regardless of the behavior of the triple line. Moreover, the use of various liquids reveals the validity of the models regardless of their volatility. The results also confirm the recent finding of a universal relation for the time evolution of the drop mass, independent of the drop size and initial contact angle. Finally, this study highlights the separate and coupled roles of the triple line and the wettability on the sessile drop evaporation process. Data reveal that the more wet and pinned a drop, the shorter the evaporation time. © 2011 American Chemical Society

  3. Data security in Intelligent Transport Systems

    Directory of Open Access Journals (Sweden)

    Tomas Zelinka

    2012-10-01

    Full Text Available Intelligent Transport Services expect availability of the secure seamless communications solutions typically covering widely spread areas. Different ITS solutions require different portfolio of telecommunications service quality. These parameters have to correspond with ITS service performance parameters required by specific service. Even though quite extensive range of public wireless data services with reasonable coverage are provided, most of them are provided with no guaranteed quality and security. ITS requirements can be in most parameters easier reached if multi-path communications systems are applied core solution is combined with both public as well as private ones where and when it is needed. Such solution requires implementation of relevant flexible system architecture supported by the efficient decision processes. This paper is concentrated the telecommunications security issues relevant to the ITS wide area networking. Expected level of security varies in dependence on relevant ITS service requirements. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure (C2I or other vehicles (C2C progressively grow. Such trend upsurges the fatal problems appearance probability in case security of the wide area networks is not relevantly treated. That is reason why relevant communications security treatment becomes crucial part of the ITS solution. Besides of available "off shelf" security tools we present solution based on non-public universal identifier with dynamical extension (time and position dependency as an autonomous variables and data selection according to actor role or category. Presented results were obtained within projects e-Ident1, DOTEK2 and SRATVU3.

  4. A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment

    Directory of Open Access Journals (Sweden)

    Chenyu Wang

    2018-01-01

    Full Text Available With the great development of network technology, the multiserver system gets widely used in providing various of services. And the two-factor authentication protocols in multiserver system attract more and more attention. Recently, there are two new schemes for multiserver environment which claimed to be secure against the known attacks. However, after a scrutinization of these two schemes, we found that (1 their description of the adversary’s abilities is inaccurate; (2 their schemes suffer from many attacks. Thus, firstly, we corrected their description on the adversary capacities to introduce a widely accepted adversary model and then summarized fourteen security requirements of multiserver based on the works of pioneer contributors. Secondly, we revealed that one of the two schemes fails to preserve forward secrecy and user anonymity and cannot resist stolen-verifier attack and off-line dictionary attack and so forth and also demonstrated that another scheme fails to preserve forward secrecy and user anonymity and is not secure to insider attack and off-line dictionary attack, and so forth. Finally, we designed an enhanced scheme to overcome these identified weaknesses, proved its security via BAN logic and heuristic analysis, and then compared it with other relevant schemes. The comparison results showed the superiority of our scheme.

  5. On-line dynamic extraction and automated determination of readily bioavailable hexavalent chromium in solid substrates using micro-sequential injection bead-injection lab-on-valve hyphenated with electrothermal atomic absorption spectrometry

    DEFF Research Database (Denmark)

    Long, Xiangbao; Miró, Manuel; Hansen, Elo Harald

    2006-01-01

    A novel and miniaturized micro-sequential injection bead injection lab-on-valve (μSI-BI-LOV) fractionation system was developed for in-line microcolumn soil extraction under simulated environmental scenarios and accurate monitoring of the content of easily mobilisable hexavalent chromium in soil...... environments at the sub-low parts-per-million level. The flow system integrates dynamic leaching of hexavalent chromium using deionized water as recommended by the German Standard DIN 38414-S4 method; on-line pH adjustment of the extract by a 0.01 mol L-1 Tris-HNO3 buffer solution; isolation of the chromate...... polluted agricultural soil material (San Joaquin Soil-Baseline Trace Element Concentrations) with water-soluble Cr(VI) salts at different concentration levels. The potential of the μSI-BI-LOV set-up with renewable surfaces for flame-AAS determination of high levels of readily bioavailable chromate...

  6. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  7. International Conference on Dynamic Crack Propagation

    CERN Document Server

    1973-01-01

    The planning meeting for a conference on Dynamic Crack Propagation was held at M.LT. in February 1971 and attended by research workers from several industrial, governmental and academic organizations. It was felt that a more specialized meeting would provide a better opportunity for both U.S. and foreign researchers to exchange their ideas and views on dynamic fracture, a subject which is seldom emphasized in national or international fracture conferences. Dynamic crack propagation has been a concern to specialists in many fields: continuum mechanics, metallurgy, geology, polymer chemistry, orthopedics, applied mathematics, as well as structural design and testing. It impinges on a wide variety of problems such as rock breaking and earthquakes, pressure vessels and line pipes, comminution and the per­ formance of armament and ordnance, etc. Advances have been numerous, covering theories and experiments from both the microscopic and macro­ scopic points of view. Hence, the need for comparing the theoretical ...

  8. A Novel Image Stream Cipher Based On Dynamic Substitution

    OpenAIRE

    Elsharkawi, A.; El-Sagheer, R. M.; Akah, H.; Taha, H.

    2016-01-01

    Recently, many chaos-based stream cipher algorithms have been developed. Traditional chaos stream cipher is based on XORing a generated secure random number sequence based on chaotic maps (e.g. logistic map, Bernoulli Map, Tent Map etc.) with the original image to get the encrypted image, This type of stream cipher seems to be vulnerable to chosen plaintext attacks. This paper introduces a new stream cipher algorithm based on dynamic substitution box. The new algorithm uses one substitution b...

  9. The Efficiency of Improvement of the Economic Security System of Ukraine

    Directory of Open Access Journals (Sweden)

    Klunko Nataliya S.

    2017-09-01

    Full Text Available An analysis of approaches to the formation of efficiency of ensuring economic security was carried out. The essence of economic security has been defined and its material base has been described. Threats to the economic security of Ukraine have been systematized and their structure analyzed. Both internal and external measures to prevent threats to the economic security of Ukraine have been allocated. Dynamics of the factors on which the economic security of Ukraine depends has been considered. It has been determined that the socio-economic development strategy formulated makes the country’s economic security system efficient. Two approaches to the strategic development of the Ukrainian economy have been allocated: enhancing competitiveness and integration into the international economic associations.

  10. On-line dynamic fractionation and automatic determination of inorganic phosphorous in environmental solid substrates exploiting sequential injection microcolumn extraction and flow injection analysi

    DEFF Research Database (Denmark)

    Buanuam, Janya; Miró, Manuel; Hansen, Elo Harald

    2006-01-01

    Sequential injection microcolumn extraction (SI-MCE) based on the implementation of a soil containing microcartridge as external reactor in a sequential injection network is, for the first time, proposed for dynamic fractionation of macronutrients in environmental solids, as exemplified by the pa......Sequential injection microcolumn extraction (SI-MCE) based on the implementation of a soil containing microcartridge as external reactor in a sequential injection network is, for the first time, proposed for dynamic fractionation of macronutrients in environmental solids, as exemplified...... by the partitioning of inorganic phosphorous in agricultural soils. The on-line fractionation method capitalises on the accurate metering and sequential exposure of the various extractants to the solid sample by application of programmable flow as precisely coordinated by a syringe pump. Three different soil phase...... associations for phosphorus, that is, exchangeable, Al- and Fe-bound and Ca-bound fractions, were elucidated by accommodation in the flow manifold of the 3 steps of the Hietjles-Litjkema (HL) scheme involving the use of 1.0 M NH4Cl, 0.1 M NaOH and 0.5 M HCl, respectively, as sequential leaching reagents...

  11. Innovation in small and mediumsized firms in the security service industry

    DEFF Research Database (Denmark)

    Langergaard, Luise Li; Møller, Jørn Kjølseth; Hansen, Anne Vorre

    2014-01-01

    This article is a study of innovation in the security sector based on an analysis of three Danish security companies. It uncovers the logics and dynamics of innovation in the security business, which is part of the operational service sector. Operational service companies are forced to choose...... activities. In order to overcome this general ‘service squeeze’ and break with a mature market, security companies use different strategies for innovation. These strategies depend on the ability of the individual security companies to activate the innovative resources among employees in order to move...... the business activities further up in the market hierarchy of security services by offering more complex and knowledge-intensive solutions to the customers, thereby reducing price competition and increasing the profits of the business activity in the same way as known from other industries...

  12. On the Need for Relaxed Security Models

    DEFF Research Database (Denmark)

    Slides for the opening panel on "Issues in the Security of Wireless Network systems" at ICETE 2008.......Slides for the opening panel on "Issues in the Security of Wireless Network systems" at ICETE 2008....

  13. Cognitive Security of Wireless Communication Systems in the Physical Layer

    Directory of Open Access Journals (Sweden)

    Mustafa Harun Yılmaz

    2017-01-01

    Full Text Available While the wireless communication systems provide the means of connectivity nearly everywhere and all the time, communication security requires more attention. Even though current efforts provide solutions to specific problems under given circumstances, these methods are neither adaptive nor flexible enough to provide security under the dynamic conditions which make the security breaches an important concern. In this paper, a cognitive security (CS concept for wireless communication systems in the physical layer is proposed with the aim of providing a comprehensive solution to wireless security problems. The proposed method will enable the comprehensive security to ensure a robust and reliable communication in the existence of adversaries by providing adaptive security solutions in the communication systems by exploiting the physical layer security from different perspective. The adaptiveness relies on the fact that radio adapts its propagation characteristics to satisfy secure communication based on specific conditions which are given as user density, application specific adaptation, and location within CS concept. Thus, instead of providing any type of new security mechanism, it is proposed that radio can take the necessary precautions based on these conditions before the attacks occur. Various access scenarios are investigated to enable the CS while considering these conditions.

  14. Communications and Information: Emission Security

    National Research Council Canada - National Science Library

    1998-01-01

    The Air Force EMSEC process has experienced many changes. Although these changes were attempts to meet the variances of a dynamic world, they require security protection measures far beyond the needs of the average user...

  15. [The comparative evaluation of level of security culture in medical organizations].

    Science.gov (United States)

    Roitberg, G E; Kondratova, N V; Galanina, E V

    2016-01-01

    The study was carried out on the basis of clinic “Medicine” in 2014-2015 concerning security culture. The sampling included 465 filled HSPSC questionnaires. The comparative analysis of received was implemented. The “Zubovskaia district hospital” Having no accreditation according security standards and group of clinics from USA functioning for many years in the system of patient security support were selected as objects for comparison. The evaluation was implemented concerning dynamics of security culture in organization at implementation of strategies of security of patients during 5 years and comparison of obtained results with USA clinics was made. The study results demonstrated that in conditions of absence of implemented standards of security in medical organization total evaluation of security remains extremely low. The study of security culture using HSPSC questionnaire is an effective tool for evaluating implementation of various strategies of security ofpatient. The functioning in the system of international standards of quality, primarily JCI standards, permits during several years to achieve high indices of security culture.

  16. The effect of lignite quality variation on the efficiency of on-line ash analyzers

    Energy Technology Data Exchange (ETDEWEB)

    Galetakis, Michael J. [Technical University of Crete, Dept. of Mineral Resources Engineering, University Campus, 73 100 Hania (Greece); Pavloudakis, Francis F. [Public Power Corporation SA, General Division of Mines, Kifisou and Dyrrahiou 89, 104 43 Athens (Greece)

    2009-12-01

    A sustainable coal industry needs to achieve a number of objectives including improvements in utilization of deposits, energy efficiency, and environmental performance during combustion. The ''Clean Coal Concept'' promises to combine the secure and low cost electricity supply offered by hard coal and lignite with adequate environmental precautions. In this context, modern quality control systems, which are greatly based on the on-line analyzers, play an important role in achieving sustainability targets. This paper examines the possibility of using commercial on-line analysis systems for monitoring the mineral matter content of low quality lignite mined from the lignite basin of Megalopolis, Peloponnese, Greece. The effect of the accuracy of the on-line analyzers to process control, when used for the characterization of low rank coals with complex and variable composition, is investigated by carrying out numerous bench- and pilot-scale trials. Pilot-scale trials were based on a dual energy gamma-ray transmission analyzer, which was installed on the conveyor belt that transports lignite from the mine pit to the homogenization stockyard. All measurement data were compared to data gathered during the realisation of similar trials in the lignite mines of Ptolemais Basin, Northern Greece. Results indicated that the accuracy of the on-line measurements was not satisfactory and did not allow lignite quality monitoring in real time. The achieved inferior accuracy of the on-line measurement's accuracy, compared to previous applications at other mining sites, was related to the intense variation of the mineral matter content of lignite and lignite composition, which distorted the calibration of the analyzer. The latter is based on certain assumptions regarding the average mass absorption coefficient of the organic and mineral matter contained in the lignite. Further experimental work is needed to investigate solutions for successful implementation of

  17. Design of High-Security USB Flash Drives Based on Chaos Authentication

    Directory of Open Access Journals (Sweden)

    Teh-Lu Liao

    2018-05-01

    Full Text Available This paper aims to propose a novel design of high-security USB flash drives with the chaos authentication. A chaos authentication approach with the non-linear encryption and decryption function design is newly proposed and realized based on the controller design of chaos synchronization. To complete the design of high-security USB flash drives, first, we introduce six parameters into the original Henon map to adjust and obtain richer chaotic state responses. Then a discrete sliding mode scheme is proposed to solve the synchronization problem of discrete hyperchaotic Henon maps. The proposed sliding mode controller can ensure the synchronization of the master-slave Henon maps. The selection of the switching surface and the existence of the sliding motion are also addressed. Finally, the obtained results are applied to design a new high-security USB flash drive with chaos authentication. We built discrete hyperchaotic Henon maps in the smartphone (master and microcontroller (slave, respectively. The Bluetooth module is used to communicate between the master and the slave to achieve chaos synchronization such that the same random and dynamical chaos signal can be simultaneously obtained at both the USB flash drive and smartphone, and pass the chaos authentication. When users need to access data in the flash drive, they can easily enable the encryption APP in the smartphone (master for chaos authentication. After completing the chaos synchronization and authentication, the ARM-based microcontroller allows the computer to access the data in the high-security USB flash drive.

  18. Combining overt and covert anti-counterfeiting technologies for securities

    Science.gov (United States)

    Uematsu, Tsuyoshi

    2006-02-01

    The National Printing Bureau of Japan has been developing new anti-counterfeiting technologies as a banknote printer. Some of our technologies have already been effectively introduced into Japan's new banknote series. Anti-counterfeiting technologies can be applied not only to banknotes but also to other security documents depending on desired features. In this presentation, I will introduce three of our newly developed overt and covert security techniques, which are intended for document security and brand protection, as well as banknotes. "Metallic View" is mainly for offset printing. "Copy Check" (micro-structural lines involving luminescence) is for plate making technology. "ImageSwitch" is for a new security solution which has unlimited printing applications. All three techniques create "latent images" (some of which may be better known as "carrier screen images") that are useful in preventing counterfeiting. While each of the techniques is effective by itself, all are more effective when applied together. Combining these techniques could make all security documents harder to copy using IT scanners, and provide cost-effective anti-counterfeiting solutions for all security users.

  19. International Security, Development, and Human Rights: Policy Conversion or Conflict?

    Directory of Open Access Journals (Sweden)

    Miao-ling Lin Hasenkamp

    2012-04-01

    Full Text Available This article uses an institutional network governance approach to explore the overlapping dimension of the policy fields between security, development, and human rights, reflected in the US and German provincial reconstruction teams (PRTs in Afghanistan. The past two decades have witnessed a gradually changing paradigm in academic and policy debates regarding the questions of the normative basis of world order and possibilities for tackling imminent threats to security and peace (i.e. intra-state armed conflicts, failed states, terrorism, poverty, and deepening inequality. The introduction of concepts such as “human security” and “the right to humanitarian intervention/responsibility to protect (R2P” as well as critical examinations of peace-, nation-, and state-building missions (PNSB have led to a relativist tendency of state sovereignty and a changing attitude regarding how to address the intersection of security, development, and human rights. Despite this shift, the policy commitments to integrating these policy considerations remain puzzling. How have they been redefined, conceptualized, and put into practice? I argue that an integrated conceptual approach has facilitated the redefinition of common policy goals, principles, and the mobilization of resources. At the same time, civil and military cooperation, as demonstrated in the multifunctional work of PRTs, has been Janus-headed—permanently caught in an ongoing tension between the war on terror and short-term stability operation on the one hand and long-term durable peace and development on the other. The misunderstanding of its interim character, the dynamics of Afghan environment, the blurring of policy lines, and the differences between national PRT models have made it difficult to systematically assess the efficiency and legitimacy of each policy frame and program.

  20. Robust on-line monitoring of biogas processes; Robusta maettekniker on-line foer optimerad biogasproduktion

    Energy Technology Data Exchange (ETDEWEB)

    Nordberg, Aake; Hansson, Mikael; Kanerot, Mija; Krozer, Anatol; Loefving, Bjoern; Sahlin, Eskil

    2010-03-15

    project showed that pH-adjustment with Na{sub 3}PO{sub 4} can be a way of compensating for the losses of volatile compounds (up to 20% of VS), which occurs when standardized reference methods are used. This is a fundamental problem and requires further research. Monitoring of a laboratory-scale anaerobic digester with NIR showed that a previously developed multivariate model could predict propionate concentrations (R2= 0,92; RMSEP 0,39 g/L) in the interval 0-5 g/L, which is a relevant interval for inhibition (limit ca 3 g/L). A commercial FT-NIR instrument was subsequently installed at the production plant. However, the organic loading was decreased during the evaluation period due to process disturbances, at which the dynamic of the process was not in the range needed for prediction of e.g. propionate. Measurements and evaluation will continue during normal conditions after the completion of this project. Evaluation of a potentiometric sensor for ammonia with potential for on-line application showed low stability and a need for daily calibration, which therefore did not fulfill the requested demand. The project has demonstrated technologies with significant potential for on-line monitoring at production scale facilities, thus improving the knowledge base for making important decisions. Knowledge about on-line implementation has increased, and important insights into the limitations of standardized reference methods and substrate characteristics have been achieved. Instrument suppliers have in general a limited insight in the conditions at a biogas plant, which suggests that this type of WR-financed project is important for development in the area

  1. Structural damage diagnosis based on on-line recursive stochastic subspace identification

    International Nuclear Information System (INIS)

    Loh, Chin-Hsiung; Weng, Jian-Huang; Liu, Yi-Cheng; Lin, Pei-Yang; Huang, Shieh-Kung

    2011-01-01

    This paper presents a recursive stochastic subspace identification (RSSI) technique for on-line and almost real-time structural damage diagnosis using output-only measurements. Through RSSI the time-varying natural frequencies of a system can be identified. To reduce the computation time in conducting LQ decomposition in RSSI, the Givens rotation as well as the matrix operation appending a new data set are derived. The relationship between the size of the Hankel matrix and the data length in each shifting moving window is examined so as to extract the time-varying features of the system without loss of generality and to establish on-line and almost real-time system identification. The result from the RSSI technique can also be applied to structural damage diagnosis. Off-line data-driven stochastic subspace identification was used first to establish the system matrix from the measurements of an undamaged (reference) case. Then the RSSI technique incorporating a Kalman estimator is used to extract the dynamic characteristics of the system through continuous monitoring data. The predicted residual error is defined as a damage feature and through the outlier statistics provides an indicator of damage. Verification of the proposed identification algorithm by using the bridge scouring test data and white noise response data of a reinforced concrete frame structure is conducted

  2. Dynamic Characteristics of Communication Lines with Distributed Parameters to Control the Throttle-controlled Hydraulic Actuators

    Directory of Open Access Journals (Sweden)

    D. N. Popov

    2015-01-01

    Full Text Available The article considers a mathematical model of the hydraulic line for remote control of electro-hydraulic servo drive (EHSD with throttle control. This type of hydraulic lines is designed as a backup to replace the electrical connections, which are used to control EHSD being remote from the site with devices located to form the control signals of any object. A disadvantage of electric connections is that they are sensitive to magnetic fields and thereby do not provide the required reliability of the remote control. Hydraulic lines have no this disadvantage and therefore are used in aircraft and other industrial systems. However, dynamic characteristics of hydraulic systems still have been investigated insufficiently in the case of transmitting control signals at a distance at which the signal may be distorted when emerging the wave processes.The article results of mathematical simulation, which are verified through physical experimentation, largely eliminate the shortcomings of said information.The mathematical model described in the paper is based on the theory of unsteady pressure compressible fluids. In the model there are formulas that provide calculation of frequency characteristics of the hydraulic lines under hydraulic oscillations of the laminar flow parameters of viscous fluid.A real mock-up of the system under consideration and an experimental ad hoc unit are used to verify the results of mathematically simulated hydraulic systems.Calculated logarithmic amplitude and phase frequency characteristics compared with those obtained experimentally prove, under certain conditions, the proposed theoretical method of calculation. These conditions have to ensure compliance with initial parameters of fluid defined under stationary conditions. The applied theory takes into consideration a non-stationary hydraulic resistance of the line when calculating frequency characteristics.The scientific novelty in the article material is presented in

  3. PREFACE: Dynamics of wetting Dynamics of wetting

    Science.gov (United States)

    Grest, Gary S.; Oshanin, Gleb; Webb, Edmund B., III

    2009-11-01

    Capillary phenomena associated with fluids wetting other condensed matter phases have drawn great scientific interest for hundreds of years; consider the recent bicentennial celebration of Thomas Young's paper on equilibrium contact angles, describing the geometric shape assumed near a three phase contact line in terms of the relevant surface energies of the constituent phases [1]. Indeed, nearly a century has passed since the seminal papers of Lucas and Washburn, describing dynamics of capillary imbibition [2, 3]. While it is generally appreciated that dynamics of fluid wetting processes are determined by the degree to which a system is out of capillary equilibrium, myriad complications exist that challenge the fundamental understanding of dynamic capillary phenomena. The topic has gathered much interest from recent Nobel laureate Pierre-Gilles de Gennes, who provided a seminal review of relevant dissipation mechanisms for fluid droplets spreading on solid surfaces [4] Although much about the dynamics of wetting has been revealed, much remains to be learned and intrinsic technological and fundamental interest in the topic drives continuing high levels of research activity. This is enabled partly by improved experimental capabilities for resolving wetting processes at increasingly finer temporal, spatial, and chemical resolution. Additionally, dynamic wetting research advances via higher fidelity computational modeling capabilities, which drive more highly refined theory development. The significance of this topic both fundamentally and technologically has resulted in a number of reviews of research activity in wetting dynamics. One recent example addresses the evaluation of existing wetting dynamics theories from an experimentalist's perspective [5]. A Current Opinion issue was recently dedicated to high temperature capillarity, including dynamics of high temperature spreading [6]. New educational tools have recently emerged for providing instruction in wetting

  4. From control system security indices to attack identifiability

    NARCIS (Netherlands)

    Herdeiro Teixeira, A.M.; Sandberg, H

    2016-01-01

    In this paper, we investigate detectability and identifiability of attacks on linear dynamical systems that are subjected to external disturbances. We generalize a concept for a security index, which was previously introduced for static systems. The index exactly quantifies the resources

  5. Secure File Allocation and Caching in Large-scale Distributed Systems

    DEFF Research Database (Denmark)

    Di Mauro, Alessio; Mei, Alessandro; Jajodia, Sushil

    2012-01-01

    In this paper, we present a file allocation and caching scheme that guarantees high assurance, availability, and load balancing in a large-scale distributed file system that can support dynamic updates of authorization policies. The scheme uses fragmentation and replication to store files with hi......-balancing, and reducing delay of read operations. The system offers a trade-off-between performance and security that is dynamically tunable according to the current level of threat. We validate our mechanisms with extensive simulations in an Internet-like network.......In this paper, we present a file allocation and caching scheme that guarantees high assurance, availability, and load balancing in a large-scale distributed file system that can support dynamic updates of authorization policies. The scheme uses fragmentation and replication to store files with high...... security requirements in a system composed of a majority of low-security servers. We develop mechanisms to fragment files, to allocate them into multiple servers, and to cache them as close as possible to their readers while preserving the security requirement of the files, providing load...

  6. CERN Technical Training: new courses on computer security

    CERN Multimedia

    HR Department

    2009-01-01

    Two new trainings are available at CERN concerning computer security. • How to create secure software? The "Developing secure software" course (3.5 hours) is designed for software programmers, both for regular software and Web applications. It covers main aspects of security in different phases of the software development lifecycle. The last, optional hour discusses security issues of Web application developers. This course, although not hands-on, is interactive and full of real-life examples. The first session of this course will take place, in English, on 21 April in the CERN Technical Training Centre. More sessions will be scheduled in 2009. • How to safely navigate and send mails? The "Secure e-mail and Web browsing" course is an entry-level 1.5-hour course designed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. The first sessions ...

  7. CERN Technical Training: new courses on computer security

    CERN Multimedia

    HR Department

    2009-01-01

    Two new trainings are available at CERN concerning computer security. • How to create secure software? The "Developing secure software" course (3.5 hours) is designed for software programmers, both for regular software and Web applications. It covers main aspects of security in different phases of the software development lifecycle. The last, optional hour discusses security issues of Web application developers. This course, although not hands-on, is interactive and full of real-life examples. The first session of this course will take place, in English, on 21 April in the CERN Technical Training Centre. More sessions will be scheduled in 2009. • How to safely navigate and send mails? The "Secure e-mail and Web browsing" course is an entry-level 1.5-hour course designed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. The first sessions o...

  8. CERN Technical Training: new courses on computer security

    CERN Multimedia

    HR Department

    2009-01-01

    Two new trainings are available at CERN concerning computer security. • How to create secure software? The "Developing secure software" course (3.5 hours) is designed for software programmers, both for regular software and Web applications. It covers main aspects of security in different phases of the software development lifecycle. The last, optional hour discusses security issues of Web application developers. This course, although not hands-on, is interactive and full of real-life examples. The first session of this course will take place, in English, on 21 April in the CERN Technical Training Center. More sessions will be scheduled in 2009. • How to safely navigate and send mails? The "Secure e-mail and Web browsing" course is an entry-level 1.5-hour training aimed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. The first sessions o...

  9. Risk to Water Security on Small Islands

    Science.gov (United States)

    Holding, S. T.; Allen, D. M.

    2013-12-01

    The majority of fresh water available on small islands is shallow groundwater that forms a freshwater lens. Freshwater lenses are generally limited in extent and as such are vulnerable to many stressors that impact water security. These include stressors related to climate change, such as sea level rise, as well as those related to human impacts, such as contamination. Traditionally, water security assessments have focussed on indicators that provide a snapshot of the current condition. However, recent work suggests that in order to effectively manage the water system, it is also important to consider uncertain future impacts to the system by evaluating how different stressors might impact water security. In this study, a framework for assessing risk to water security was developed and tested on Andros Island in The Bahamas. The assessment comprises two main components that characterise the water system: numerical modelling studies and a hazard survey. A baseline numerical model of the freshwater lens throughout Andros Island was developed to simulate the morphology of the freshwater lens and estimate the freshwater resources currently available. The model was prepared using SEAWAT, a density-dependent flow and solute transport code. Various stressors were simulated in the model to evaluate the response of the freshwater lens to predicted future shifts in climate patterns, sea level rise, and changes in water use. A hazard survey was also conducted on the island to collect information related to the storage of contaminants, sanitation infrastructure, waste disposal practices and groundwater abstraction rates. The results of the survey form a geo-spatial database of the location and associated hazards to the freshwater lens. The resulting risk framework provides a ranking of overall risk to water security based on information from the numerical modelling and hazard survey. The risk framework is implemented in a Geographic Information System (GIS) and provides a map

  10. Coupling Fluid and Solute Dynamics Within the Ocular Surface Tear Film: A Modelling Study of Black Line Osmolarity

    KAUST Repository

    Zubkov, V. S.

    2012-07-06

    We present a mathematical model describing the spatial distribution of tear film osmolarity across the ocular surface of a human eye during one blink cycle, incorporating detailed fluid and solute dynamics. Based on the lubrication approximation, our model comprises three coupled equations tracking the depth of the aqueous layer of the tear film, the concentration of the polar lipid, and the concentration of physiological salts contained in the aqueous layer. Diffusive boundary layers in the salt concentration occur at the thinnest regions of the tear film, the black lines. Thus, despite large Peclet numbers, diffusion ameliorates osmolarity around the black lines, but nonetheless is insufficient to eliminate the build-up of solute in these regions. More generally, a heterogeneous distribution of solute concentration is predicted across the ocular surface, indicating that measurements of lower meniscus osmolarity are not globally representative, especially in the presence of dry eye. Vertical saccadic eyelid motion can reduce osmolarity at the lower black line, raising the prospect that select eyeball motions more generally can assist in alleviating tear film hyperosmolarity. Finally, our results indicate that measured evaporative rates will induce excessive hyperosmolarity at the black lines, even for the healthy eye. This suggests that further evaporative retardation at the black lines, for instance due to the cellular glycocalyx at the ocular surface or increasing concentrations of mucus, will be important for controlling hyperosmolarity as the black line thins. © 2012 Society for Mathematical Biology.

  11. Seismic Response Analysis of Concrete Lining Structure in Large Underground Powerhouse

    Directory of Open Access Journals (Sweden)

    Xiaowei Wang

    2017-01-01

    Full Text Available Based on the dynamic damage constitutive model of concrete material and seismic rock-lining structure interaction analysis method, the seismic response of lining structure in large underground powerhouse is studied in this paper. In order to describe strain rate dependence and fatigue damage of concrete material under cyclic loading, a dynamic constitutive model for concrete lining considering tension and shear anisotropic damage is presented, and the evolution equations of damage variables are derived. The proposed model is of simple form and can be programmed into finite element procedure easily. In order to describe seismic interaction characteristics of the surrounding rock and lining, an explicit dynamic contact analysis method considering bond and damage characteristics of contact face between the surrounding rock and lining is proposed, and this method can integrate directly without iteration. The proposed method is applied to seismic stability calculation of Yingxiuwan Underground Powerhouse, results reveal that the amplitude and duration of input seismic wave determine the damage degree of lining structure, the damage zone of lining structure is mainly distributed in its arch, and the contact face damage has great influence on the stability of the lining structure.

  12. Learning from the blackouts. Transmission system security in competitive electricity markets

    Energy Technology Data Exchange (ETDEWEB)

    none

    2005-07-01

    Electricity market reform has fundamentally changed the environment for maintaining reliable and secure power supplies. Growing inter-regional trade has placed new demands on transmission systems, creating a more integrated and dynamic network environment with new real-time challenges for reliable and secure transmission system operation. Despite these fundamental changes, system operating rules and practices remain largely unchanged. The major blackouts of 2003 and 2004 raised searching questions about the appropriateness of these arrangements. Management of system security needs to be transformed to maintain reliable electricity services in this more dynamic operating environment. These challenges raise fundamental issues for policymakers. This publication presents case studies drawn from recent large-scale blackouts in Europe, North America, and Australia. It concludes that a comprehensive, integrated policy response is required to avoid preventable large-scale blackouts in the future.

  13. MAC layer security issues in wireless mesh networks

    Science.gov (United States)

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  14. Climate Change Dynamics and Imperatives for Food Security in Nigeria

    Directory of Open Access Journals (Sweden)

    Olumide D. Onafeso

    2016-02-01

    Full Text Available Decadal variability in African rainfall is projected from General Circulation Models (GCMs to continue under elevated greenhouse gas scenarios. Effects on rain intensity, spatio-temporal variability of growing seasons, flooding, drought, and land-use change impose feedbacks at regional-local scales. Yet, empirical knowledge of associated impacts on crop yield is limited; thus, we examined the imperatives for food security in Nigeria. Bivariate correlation and multiple regression suggests impending drought in the northern region where livestock farming is predominant. Relative contributions of climate independent variables in determining crop yield by backward selection procedures with stepwise approach indexed the impacts of annual climate variability by a parameter computed as annual yield minus mean annual yield divided by the standard deviation. Results show Z-distribution approximately 5 to + 5, when 3 indicate impacts significant at 95% confidence levels. In conclusion, we established the interwoven relationship between climatic change and food security.

  15. The effect of sudden server breakdown on the performance of a disassembly line

    Science.gov (United States)

    Udomsawat, Gun; Gupta, Surendra M.

    2005-11-01

    Product and material recovery relies on the disassembly process to separate target components or materials from the end-of-life (EOL) products. Disassembly line is especially effective when products in large quantity are disassembled. Unlike an assembly line, a disassembly line is more complex and is subjected to numerous uncertainties including stochastic and multi-level arrivals of component demands, stochastic arrival times for EOL products, and process interruption due to equipment failure. These factors seriously impair the control mechanism in the disassembly line. A common production control mechanism is the traditional push system (TPS). TPS responds to the aforementioned complications by carrying substantial amounts of inventories. An alternative control mechanism is a newly developed multi-kanban pull system (MKS) that relies on dynamic routing of kanbans, which tends to minimize the system's inventories while maintaining demand serviceability. In this paper we explore the impact of sudden breakdown of server on the performance of a disassembly line. We compare the overall performances of the TPS and MKS by considering two scenarios. We present the solution procedure and results for these cases.

  16. Second-order quadrupolar line shapes under molecular dynamics: An additional transition in the extremely fast regime.

    Science.gov (United States)

    Hung, Ivan; Wu, Gang; Gan, Zhehong

    NMR spectroscopy is a powerful tool for probing molecular dynamics. For the classic case of two-site exchange, NMR spectra go through the transition from exchange broadening through coalescence and then motional narrowing as the exchange rate increases passing through the difference between the resonance frequencies of the two sites. For central-transition spectra of half-integer quadrupolar nuclei in solids, line shape change due to molecular dynamics occurs in two stages. The first stage occurs when the exchange rate is comparable to the second-order quadrupolar interaction. The second spectral transition comes at a faster exchange rate which approaches the Larmor frequency and generally reduces the isotropic quadrupolar shift. Such a two-stage transition phenomenon is unique to half-integer quadrupolar nuclei. A quantum mechanical formalism in full Liouville space is presented to explain the physical origin of the two-stage phenomenon and for use in spectral simulations. Variable-temperature 17 O NMR of solid NaNO 3 in which the NO 3 - ion undergoes 3-fold jumps confirms the two-stage transition process. The spectra of NaNO 3 acquired in the temperature range of 173-413K agree well with simulations using the quantum mechanical formalism. The rate constants for the 3-fold NO 3 - ion jumps span eight orders of magnitude (10 2 -10 10 s -1 ) covering both transitions of the dynamic 17 O line shape. Copyright © 2016 Elsevier Inc. All rights reserved.

  17. On Protocol Security in the Cryptographic Model

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus

    you as possible. This is the general problem of secure multiparty computation. The usual way of formalizing the problem is to say that a number of parties who do not trust each other wish to compute some function of their local inputs, while keeping their inputs as secret as possible and guaranteeing...... the channels by which they communicate. A general solution to the secure multiparty computation problem is a compiler which given any feasible function describes an efficient protocol which allows the parties to compute the function securely on their local inputs over an open network. Over the past twenty...... years the secure multiparty computation problem has been the subject of a large body of research, both research into the models of multiparty computation and research aimed at realizing general secure multiparty computation. The main approach to realizing secure multiparty computation has been based...

  18. Numerical study on the stick-slip motion of contact line moving on heterogeneous surfaces

    Science.gov (United States)

    Liu, Ming; Chen, Xiao-Peng

    2017-08-01

    We present a numerical study of a moving contact line (CL) crossing the intersecting region of hydrophilic and hydrophobic patterns on a solid wall using lattice Boltzmann methods (LBMs). To capture the interface between the two phases properly, we applied a phase field model coupled with the LBM. The evolutions of the CL velocity, dynamic contact angle, and apparent contact angle are analyzed for the so-called "stick" and "slip" processes. In the two processes, the evolution of the quantities follows different rules shortly after the initial quick transition, which is probably caused by finite interfacial thickness or non-equilibrium effects. For the stick process, the CL is almost fixed and energy is extracted from the main flow to rebuild the meniscus' profile. The evolution of the meniscus is mainly governed by mass conservation. The CL is depinned after the apparent contact angle surpasses the dynamic one, which implies that the interfacial segment in the vicinity of contact line is bended. For the slip process, the quantities evolve with features of relaxation. In the microscopic scale, the velocity of the CL depends on the balance between unbalanced Young's capillary force and viscous drag. To predict the apparent contact angle evolution, a model following the dynamics of an overdamped spring-mass system is proposed. Our results also show that the capillary flows in a channel with heterogeneous wall can be described generally with the Poiseuille flow superimposed by the above transient one.

  19. Research on network information security model and system construction

    OpenAIRE

    Wang Haijun

    2016-01-01

    It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the...

  20. Dynamic measurements at THz frequencies with a fast rotary delay line

    Science.gov (United States)

    Guerboukha, Hichem; Markov, Andrey; Qu, Hang; Skorobogatiy, Maksim

    2016-02-01

    Fabrication, characterization, and applications of a fast rotary linear optical delay line (FRLODL) for THz time-domain spectroscopy are presented. The FRLODL features two reflective surfaces with spatially separated incoming and outgoing beams. It has been manufactured using CNC machining. A linear dependence of the optical delay on the rotation angle allows a straightforward extraction of the conversion factor between the acquisition time (in ms) and the terahertz pulse time (in ps). The FRLODL has been tested using rotation speeds of up to 48 Hz, corresponding to an acquisition rate of up to 192 Hz with four blades incorporated on the same disk. At high speeds we observe a decrease of the bandwidth due to the limitations of the electronics, in particular, the transimpedance amplifier. An error analysis is performed by experimentally evaluating the signal-to-noise ratio and the dynamic range. With regard to the applications of the FRLODL, we first present observation of the evaporation of liquids, namely water, acetone and methanol. We then demonstrate monitoring of the spray painting process. Finally, detection of fast moving objects at 1 m/s and their thickness characterization are presented.

  1. Secure Infrastructure-Less Network (SINET)

    Science.gov (United States)

    2017-06-01

    WIRELESS TECHNOLOGY IN MOBILE DEVICES ..................................................................................................18 1. 4G LTE ...System LOS Line of Sight LTE Long-Term Evolution MANET Mobile Ad-hoc Network MCP Mobility Capabilities Package MPR Multipoint Relays NFC...National Security Agency, 2003). CCI, while unclassified, still requires strict physical control measures to protect against loss or compromise

  2. Deformable motion reconstruction for scanned proton beam therapy using on-line x-ray imaging

    NARCIS (Netherlands)

    Zhang, Ye; Knopf, A; Tanner, Colby; Boye, Dirk; Lomax, Antony J.

    2013-01-01

    Organ motion is a major problem for any dynamic radiotherapy delivery technique, and is particularly so for spot scanned proton therapy. On the other hand, the use of narrow, magnetically deflected proton pencil beams is potentially an ideal delivery technique for tracking tumour motion on-line. At

  3. Drop evaporation on superhydrophobic PTFE surfaces driven by contact line dynamics.

    Science.gov (United States)

    Ramos, S M M; Dias, J F; Canut, B

    2015-02-15

    In the present study, we experimentally study the evaporation modes and kinetics of sessile drops of water on highly hydrophobic surfaces (contact angle ∼160°), heated to temperatures ranging between 40° and 70 °C. These surfaces were initially constructed by means of controlled tailoring of polytetrafluoroethylene (PTFE) substrates. The evaporation of droplets was observed to occur in three distinct phases, which were the same for the different substrate temperatures. The drops started to evaporate in the constant contact radius (CCR) mode, then switched to a more complex mode characterized by a set of stick-slip events accompanied by a decrease in contact angle, and finally shifted to a mixed mode in which the contact radius and contact angle decreased simultaneously until the drops had completely evaporated. It is shown that in the case of superhydrophobic surfaces, the energy barriers (per unit length) associated with the stick-slip motion of a drop ranges in the nJ m(-1) scale. Furthermore, analysis of the evaporation rates, determined from experimental data show that, even in the CCR mode, a linear relationship between V(2/3) and the evaporation time is verified. The values of the evaporation rate constants are found to be higher in the pinned contact line regime (the CCR mode) than in the moving contact line regime. This behavior is attributed to the drop's higher surface to volume ratio in the CCR mode. Copyright © 2014 Elsevier Inc. All rights reserved.

  4. Attachment-security prime effect on skin-conductance synchronization in psychotherapists: An empirical study.

    Science.gov (United States)

    Palmieri, Arianna; Kleinbub, Johann R; Calvo, Vincenzo; Benelli, Enrico; Messina, Irene; Sambin, Marco; Voci, Alberto

    2018-03-01

    Physiological synchronization (PS) is a phenomenon of simultaneous activity between two persons' physiological signals. It has been associated with empathy, shared affectivity, and efficacious therapeutic relationships. The aim of the present study was to explore the possible connections between PS and the attachment system, seeking preliminary evidence of this link by means of an experimental manipulation of the sense of attachment security in psychotherapists according to a protocol by Mikulincer and Shaver (2001), which has been proven to elicit empathetic behavior. We compared the synchronization of skin-conductance signals in brief psychological interviews between 18 psychodynamic therapists and 18 healthy volunteers. A sense of attachment-security priming was administered to half of the therapists, whereas the other half received a positive-affect control prime. Lag analysis was performed to investigate the "leading" or "following" attitudes of the participants in the two conditions. Mixed-model regressions and evidence-ratio model comparisons were used to investigate the effects of the manipulation on PS. Therapist attachment anxiety and avoidance traits were considered covariates. The attachment-security prime showed a significant effect on PS lag dynamics, but not on overall PS amount. Lag analysis showed that the therapists in the attachment-security condition were significantly more prone to assume a leading attitude in the physiological coupling than the therapists in the control condition. Therapist attachment anxiety and avoidance had no apparent effect. Our result paves the way for further exploration of the clinical relationship from a physiological standpoint. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  5. Stick-Slip Motion of Moving Contact Line on Chemically Patterned Surfaces

    KAUST Repository

    Wu, Congmin; Lei, Siulong; Qian, Tiezheng; Wang, Xiaoping

    2009-01-01

    Based on our continuum hydrodynamic model for immiscible two-phase flows at solid surfaces, the stick-slip motion has been predicted for moving contact line at chemically patterned surfaces [Wang et al., J. Fluid Mech., 605 (2008), pp. 59-78]. In this paper we show that the continuum predictions can be quantitatively verified by molecular dynamics (MD) simulations. Our MD simulations are carried out for two immiscible Lennard-Jones fluids confined by two planar solid walls in Poiseuille flow geometry. In particular, one solid surface is chemically patterned with alternating stripes. For comparison, the continuum model is numerically solved using material parameters directly measured in MD simulations. From oscillatory fluid-fluid interface to intermittent stick-slip motion of moving contact line, we have quantitative agreement between the continuum and MD results. This agreement is attributed to the accurate description down to molecular scale by the generalized Navier boundary condition in our continuum model. Numerical results are also presented for the relaxational dynamics of fluid-fluid interface, in agreement with a theoretical analysis based on the Onsager principle of minimum energy dissipation. © 2010 Global-Science Press.

  6. Investigations of glass structure using fluorescence line narrowing and moleuclar dynamics simulations

    International Nuclear Information System (INIS)

    Weber, M.J.; Brawer, S.A.

    1982-01-01

    The local structure at individual ion sites in simple and multicomponent glasses is simulated using methods of molecular dynamics. Computer simulations of fluoroberyllate glasses predict a range of ion separations and coordination numbers that increases with increasing complexity of the glass composition. This occurs at both glass forming and glass modifying cation sites. Laser-induced fluorescence line-narrowing techniques provide a unique probe of the local environments of selected subsets of ions and are used to measure site to site variations in the electronic energy levels and transition probabilities of rare earth ions. These and additional results from EXAFS, neutron and x-ray diffraction, and NMR experiments are compared with simulated glass structures

  7. Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers

    OpenAIRE

    2012-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Te...

  8. Survey of cyber security issues in smart grids

    Science.gov (United States)

    Chen, Thomas M.

    2010-04-01

    The future smart grid will enable cost savings and lower energy use by means of smart appliances and smart meters which support dynamic load management and real-time monitoring of energy use and distribution. The introduction of two-way communications and control into power grid introduces security and privacy concerns. This talk will survey the security and privacy issues in smart grids using the NIST reference model, and relate these issues to cyber security in the Internet.

  9. Power system security enhancement through direct non-disruptive load control

    Science.gov (United States)

    Ramanathan, Badri Narayanan

    The transition to a competitive market structure raises significant concerns regarding reliability of the power grid. A need to build tools for security assessment that produce operating limit boundaries for both static and dynamic contingencies is recognized. Besides, an increase in overall uncertainty in operating conditions makes corrective actions at times ineffective leaving the system vulnerable to instability. The tools that are in place for stability enhancement are mostly corrective and suffer from lack of robustness to operating condition changes. They often pose serious coordination challenges. With deregulation, there have also been ownership and responsibility issues associated with stability controls. However, the changing utility business model and the developments in enabling technologies such as two-way communication, metering, and control open up several new possibilities for power system security enhancement. This research proposes preventive modulation of selected loads through direct control for power system security enhancement. Two main contributions of this research are the following: development of an analysis framework and two conceptually different analysis approaches for load modulation to enhance oscillatory stability, and the development and study of algorithms for real-time modulation of thermostatic loads. The underlying analysis framework is based on the Structured Singular Value (SSV or mu) theory. Based on the above framework, two fundamentally different approaches towards analysis of the amount of load modulation for desired stability performance have been developed. Both the approaches have been tested on two different test systems: CIGRE Nordic test system and an equivalent of the Western Electric Coordinating Council test system. This research also develops algorithms for real-time modulation of thermostatic loads that use the results of the analysis. In line with some recent load management programs executed by utilities, two

  10. Considerations on Cyber Security Assessments of Korean Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Han, Kyung-Soo; Lee, Cheol Kwon; Kang, Mingyun

    2015-01-01

    Korea Institute of Nuclear Nonproliferation and Control (KINAC) has prepared the regulatory standard RS-015 based on RG 5.71. RS-015 defines the elements of a cyber security program to be established in nuclear facilities and describes the security control items and relevant requirements. Cyber security assessments are important initial activities in a cyber security program for NPPs. Cyber security assessments can be performed in the following key steps: 1) Formation of a cyber security assessment team (CSAT); 2) Identification of critical systems and critical digital assets (CDAs); 3) Plant compliance checks with the security control requirements in RS-015. Through the assessments, the current status of security controls applied to NPPs can be found out. The assessments provide baseline data for remedial activities. Additional analyses with the results from the assessments should be performed before the implementation of remedial security controls. The cyber security team at the Korea Atomic Energy Research Institute (KAERI) has studied how to perform cyber security assessments for NPPs based on the regulatory requirements. Recently, KAERI's cyber security team has performed pilot cyber security assessments of a Korean NPP. Based on this assessment experience, considerations and checkpoints which would be helpful for full-scale cyber security assessments of Korean NPPs and the implementation of remedial security controls are discussed in this paper. Cyber security assessment is one of important and immediate activities for NPP cyber security. The quality of the first assessment will be a barometer for NPP cyber security. Hence cyber security assessments of Korean NPPs should be performed elaborately

  11. Considerations on Cyber Security Assessments of Korean Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Han, Kyung-Soo; Lee, Cheol Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Kang, Mingyun [E-Gonggam Co. Ltd., Daejeon (Korea, Republic of)

    2015-10-15

    Korea Institute of Nuclear Nonproliferation and Control (KINAC) has prepared the regulatory standard RS-015 based on RG 5.71. RS-015 defines the elements of a cyber security program to be established in nuclear facilities and describes the security control items and relevant requirements. Cyber security assessments are important initial activities in a cyber security program for NPPs. Cyber security assessments can be performed in the following key steps: 1) Formation of a cyber security assessment team (CSAT); 2) Identification of critical systems and critical digital assets (CDAs); 3) Plant compliance checks with the security control requirements in RS-015. Through the assessments, the current status of security controls applied to NPPs can be found out. The assessments provide baseline data for remedial activities. Additional analyses with the results from the assessments should be performed before the implementation of remedial security controls. The cyber security team at the Korea Atomic Energy Research Institute (KAERI) has studied how to perform cyber security assessments for NPPs based on the regulatory requirements. Recently, KAERI's cyber security team has performed pilot cyber security assessments of a Korean NPP. Based on this assessment experience, considerations and checkpoints which would be helpful for full-scale cyber security assessments of Korean NPPs and the implementation of remedial security controls are discussed in this paper. Cyber security assessment is one of important and immediate activities for NPP cyber security. The quality of the first assessment will be a barometer for NPP cyber security. Hence cyber security assessments of Korean NPPs should be performed elaborately.

  12. On multiscale moving contact line theory.

    Science.gov (United States)

    Li, Shaofan; Fan, Houfu

    2015-07-08

    In this paper, a multiscale moving contact line (MMCL) theory is presented and employed to simulate liquid droplet spreading and capillary motion. The proposed MMCL theory combines a coarse-grained adhesive contact model with a fluid interface membrane theory, so that it can couple molecular scale adhesive interaction and surface tension with hydrodynamics of microscale flow. By doing so, the intermolecular force, the van der Waals or double layer force, separates and levitates the liquid droplet from the supporting solid substrate, which avoids the shear stress singularity caused by the no-slip condition in conventional hydrodynamics theory of moving contact line. Thus, the MMCL allows the difference of the surface energies and surface stresses to drive droplet spreading naturally. To validate the proposed MMCL theory, we have employed it to simulate droplet spreading over various elastic substrates. The numerical simulation results obtained by using MMCL are in good agreement with the molecular dynamics results reported in the literature.

  13. Stability of the Broad-line Region Geometry and Dynamics in Arp 151 Over Seven Years

    Science.gov (United States)

    Pancoast, A.; Barth, A. J.; Horne, K.; Treu, T.; Brewer, B. J.; Bennert, V. N.; Canalizo, G.; Gates, E. L.; Li, W.; Malkan, M. A.; Sand, D.; Schmidt, T.; Valenti, S.; Woo, J.-H.; Clubb, K. I.; Cooper, M. C.; Crawford, S. M.; Hönig, S. F.; Joner, M. D.; Kandrashoff, M. T.; Lazarova, M.; Nierenberg, A. M.; Romero-Colmenero, E.; Son, D.; Tollerud, E.; Walsh, J. L.; Winkler, H.

    2018-04-01

    The Seyfert 1 galaxy Arp 151 was monitored as part of three reverberation mapping campaigns spanning 2008–2015. We present modeling of these velocity-resolved reverberation mapping data sets using a geometric and dynamical model for the broad-line region (BLR). By modeling each of the three data sets independently, we infer the evolution of the BLR structure in Arp 151 over a total of 7 yr and constrain the systematic uncertainties in nonvarying parameters such as the black hole mass. We find that the BLR geometry of a thick disk viewed close to face-on is stable over this time, although the size of the BLR grows by a factor of ∼2. The dynamics of the BLR are dominated by inflow, and the inferred black hole mass is consistent for the three data sets, despite the increase in BLR size. Combining the inference for the three data sets yields a black hole mass and statistical uncertainty of log10({M}BH}/{M}ȯ ) = {6.82}-0.09+0.09 with a standard deviation in individual measurements of 0.13 dex.

  14. Effectiveness Of Security Controls On Electronic Health Records

    Directory of Open Access Journals (Sweden)

    Everleen Wanyonyi

    2017-12-01

    Full Text Available Electronic Health Record EHR systems enhance efficiency and effectiveness in handling patients information in healthcare. This study focused on the EHR security by initially establishing the nature of threats affecting the system and reviewing the implemented security safeguards. The study was done at a referral hospital level 6 government facility in Kenya. Purposive sampling was used to select a sample of 196 out of 385 staff and a questionnaire designed for qualitative data collection. Data was analyzed using SPSS software. Correlations and binary logistic regression were obtained. Binary Logistic Regression BLR was used to establish the effect of the safeguards predictors on EHR security. It was established that physical security contributes more to the security of an information system than administrative controls and technical controls in that order. BLR helped in predicting effective safeguards to control EHR security threats in limited resourced public health facilities.

  15. Elements of ESA's policy on space and security

    Science.gov (United States)

    Giannopapa, Christina; Adriaensen, Maarten; Antoni, Ntorina; Schrogl, Kai-Uwe

    2018-06-01

    In the past decade Europe has been facing rising security threats, ranging from climate change, migrations, nearby conflicts and crises, to terrorism. The demand to tackle these critical challenges is increasing in Member States. Space is already contributing, and could further contribute with already existing systems and future ones. The increasing need for security in Europe and for safety and security of Europe's space activities has led to a growing number of activities in ESA in various domains. It has also driven new and strengthened partnerships with security stakeholders in Europe. At the European level, ESA is collaborating closely with the main European institutions dealing with space security. In addition, as an organisation ESA has evolved to conduct security-related projects and programmes and to address the threats to its own activities, thereby securing the investments of the Member States. Over the past years the Agency has set up a comprehensive regulatory framework in order to be able to cope with security related requirements. Over the past years, ESA has increased its exchanges with its Member States. The paper presents main elements of the ESA's policy on space and security. It introduces the current European context for space and security, the European goals in this domain and the specific objectives to which the Agency intends to contribute. Space and security in the ESA context is set out under two components: a) security from space and b) security in space, including the security of ESA's own activities (corporate security and the security of ESA's space missions). Subsequently, ESA's activities are elaborated around these two pillars, composed of different activities conducted in the most appropriate frameworks and in coordination with the relevant stakeholders and shareholders.

  16. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  17. An enhanced dynamic ID-based authentication scheme for telecare medical information systems

    Directory of Open Access Journals (Sweden)

    Ankita Chaturvedi

    2017-01-01

    Full Text Available The authentication schemes for telecare medical information systems (TMIS try to ensure secure and authorized access. ID-based authentication schemes address secure communication, but privacy is not properly addressed. In recent times, dynamic ID-based remote user authentication schemes for TMIS have been presented to protect user’s privacy. The dynamic ID-based authentication schemes efficiently protect the user’s privacy. Unfortunately, most of the existing dynamic ID-based authentication schemes for TMIS ignore the input verifying condition. This makes login and password change phases inefficient. Inefficiency of the password change phase may lead to denial of service attack in the case of incorrect input in the password change phase. To overcome these weaknesses, we proposed a new dynamic ID-based authentication scheme using a smart card. The proposed scheme can quickly detect incorrect inputs which makes the login and password change phase efficient. We adopt the approach with the aim to protect privacy, and efficient login and password change phases. The proposed scheme also resists off-line password guessing attack and denial of service attack. We also demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham logic. In addition, our scheme is comparable in terms of the communication and computational overheads with relevant schemes for TMIS.

  18. Adaptative synchronization in multi-output fractional-order complex dynamical networks and secure communications

    Science.gov (United States)

    Mata-Machuca, Juan L.; Aguilar-López, Ricardo

    2018-01-01

    This work deals with the adaptative synchronization of complex dynamical networks with fractional-order nodes and its application in secure communications employing chaotic parameter modulation. The complex network is composed of multiple fractional-order systems with mismatch parameters and the coupling functions are given to realize the network synchronization. We introduce a fractional algebraic synchronizability condition (FASC) and a fractional algebraic identifiability condition (FAIC) which are used to know if the synchronization and parameters estimation problems can be solved. To overcome these problems, an adaptative synchronization methodology is designed; the strategy consists in proposing multiple receiver systems which tend to follow asymptotically the uncertain transmitters systems. The coupling functions and parameters of the receiver systems are adjusted continually according to a convenient sigmoid-like adaptative controller (SLAC), until the measurable output errors converge to zero, hence, synchronization between transmitter and receivers is achieved and message signals are recovered. Indeed, the stability analysis of the synchronization error is based on the fractional Lyapunov direct method. Finally, numerical results corroborate the satisfactory performance of the proposed scheme by means of the synchronization of a complex network consisting of several fractional-order unified chaotic systems.

  19. Fuzzy assessment of health information system users' security awareness.

    Science.gov (United States)

    Aydın, Özlem Müge; Chouseinoglou, Oumout

    2013-12-01

    Health information systems (HIS) are a specific area of information systems (IS), where critical patient data is stored and quality health service is only realized with the correct use and efficient dissemination of this data to health workers. Therefore, a balance needs to be established between the levels of security and flow of information on HIS. Instead of implementing higher levels and further mechanisms of control to increase the security of HIS, it is preferable to deal with the arguably weakest link on HIS chain with respect to security: HIS users. In order to provide solutions and approaches for transforming users to the first line of defense in HIS but also to employ capable and appropriate candidates from the pool of newly graduated students, it is important to assess and evaluate the security awareness levels and characteristics of these existing and future users. This study aims to provide a new perspective to understand the phenomenon of security awareness of HIS users with the use of fuzzy analysis, and to assess the present situation of current and future HIS users of a leading medical and educational institution of Turkey, with respect to their security characteristics based on four different security scales. The results of the fuzzy analysis, the guide on how to implement this fuzzy analysis to any health institution and how to read and interpret these results, together with the possible implications of these results to the organization are provided.

  20. On-line control of nuclear fuel reprocessing

    International Nuclear Information System (INIS)

    Parus, I.; Kierzek, J.; Zoltowski, T.

    1977-01-01

    The development trends in the field of chemical processes control and the present state of the development of continuous composition analysers has been described. On this background the peculiarities of on-line control methods for spent nuclear fuel reprocessing have been discussed. The measuring methods for direct and indirect determination of chemical composition and nuclear safety are reviewed in detail. The review comprises such methods as: measurement of α, γ and neutron radiation emitted both by nuclides present in technological solutions and using external sources of different radiation, X-ray fluorescence, measurements of physicochemical parameters connected with the composition (pH, density, electrical conductivity), polarography and spectrophotometry. At the end of this review some new trends in process control based on dynamic process models have been presented. (author)