WorldWideScience

Sample records for on-line dynamic security

  1. On-line Dynamic Security Assessment in Power Systems

    DEFF Research Database (Denmark)

    Weckesser, Johannes Tilman Gabriel

    and solar radiation. Moreover, ongoing research suggests that demand response will be introduced to maintain power balance between generation and consumption at all times. Due to these changes the operating point of the power system will be less predictable and today’s stability and security assessment...... for early prediction of critical voltage sags is described. The method’s performance is compared to other prediction approaches. The results show that the proposed method succeeds in early, accurately and consistently predicting critically low voltage sags. An efficient on-line DSA not only identifies...

  2. Application of learning from examples methods for on-line dynamic security assessment of electric power systems - state of the art

    Energy Technology Data Exchange (ETDEWEB)

    Pecas Lopes, J.A. [Universidade do Porto, Porto (Portugal). Faculdade de Engenharia] Hatziargyriou, Nikos D. [National Technical University of Athens, Athens (Greece)

    1994-12-31

    This paper provides an overview of the application of `learning from examples` techniques like pattern recognition, artificial neural networks and decision trees, when used for fast dynamic security assessment. Problems concerning the system security evaluation relatively to transient stability and voltage stability are addressed with more details and references to research works in this field are briefly described. (author) 44 refs., 3 tabs.

  3. Efficient and secure comparison for on-line auctions

    NARCIS (Netherlands)

    Damgard, Ivan; Geisler, M.; Kroigaard, M.; Pieprzyk, J.; Ghodosi, H.; Dawson, E.

    2007-01-01

    We propose a protocol for secure comparison of integers based on homomorphic encryption. We also propose a homomorphic encryption scheme that can be used in our protocol and makes it more efficient than previous solutions. Our protocol is well-suited for application in on-line auctions, both with

  4. Efficient and Secure Comparison for On-Line Auctions

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Krøigaard, Mikkel; Geisler, Martin Joakim

    2007-01-01

    We propose a protocol for secure comparison of integers based on homomorphic encryption. We also propose a homomorphic encryption scheme that can be used in our protocol and makes it more efficient than previous solutions. Our protocol is well-suited for application in on-line auctions, both...... with respect to functionality and performance. It minimizes the amount of information bidders need to send, and for comparison of 16 bit numbers with security based on 1024 bit RSA (executed by two parties), our implementation takes 0.28 seconds including all computation and communication. Using precomputation...

  5. Perceptions Towards On-line Banking Security: An Empirical Investigation of a Developing Country`s Banking Sector, how secure is On-line Banking

    OpenAIRE

    Bongani Ngwenya; Khanyisa Malufu

    2012-01-01

    The increase in computer crime has led to scepticism about themove made by the banks to introduce on-line banking. Someview this as a noble move which has made the banking systemmore efficient, reliable and secure, while others view it as arisky and insecure way of banking. The aim of this study wasto assess whether on-line banking in the developing countriesis secure or not. The researcher chose a descriptive-quantitativeresearch design. Data was collected using a self constructedquestionnai...

  6. On-line control of the nonlinear dynamics for synchrotrons

    Science.gov (United States)

    Bengtsson, J.; Martin, I. P. S.; Rowland, J. H.; Bartolini, R.

    2015-07-01

    We propose a simple approach to the on-line control of the nonlinear dynamics in storage rings, based on compensation of the nonlinear resonance driving terms using beam losses as the main indicator of the strength of a resonance. The correction scheme is built on the analysis of the resonance driving terms in first perturbative order and on the possibility of using independent power supplies in the sextupole magnets, which is nowadays present in many synchrotron light sources. Such freedom allows the definition of "smart sextupole knobs" attacking each resonance separately. The compensation scheme has been tested at the Diamond light source and proved to be effective in opening up the betatron tune space, resonance free, available to the electron beam and to improve the beam lifetime.

  7. On-line control of the nonlinear dynamics for synchrotrons

    Directory of Open Access Journals (Sweden)

    J. Bengtsson

    2015-07-01

    Full Text Available We propose a simple approach to the on-line control of the nonlinear dynamics in storage rings, based on compensation of the nonlinear resonance driving terms using beam losses as the main indicator of the strength of a resonance. The correction scheme is built on the analysis of the resonance driving terms in first perturbative order and on the possibility of using independent power supplies in the sextupole magnets, which is nowadays present in many synchrotron light sources. Such freedom allows the definition of “smart sextupole knobs” attacking each resonance separately. The compensation scheme has been tested at the Diamond light source and proved to be effective in opening up the betatron tune space, resonance free, available to the electron beam and to improve the beam lifetime.

  8. Dynamic secrets in communication security

    CERN Document Server

    Xiao, Sheng; Towsley, Donald

    2013-01-01

    Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. 'Dynamic Secrets in Communication Security' presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic

  9. Human comment dynamics in on-line social systems

    Science.gov (United States)

    Wu, Ye; Zhou, Changsong; Chen, Maoying; Xiao, Jinghua; Kurths, Jürgen

    2010-12-01

    Human comment is studied using data from ‘tianya’ which is one of the most popular on-line social systems in China. We found that the time interval between two consecutive comments on the same topic, called inter-event time, follows a power-law distribution. This result shows that there is no characteristic decay time on a topic. It allows for very long periods without comments that separate bursts of intensive comments. Furthermore, the frequency of a different ID commenting on a topic also follows a power-law distribution. It indicates that there are some “hubs” in the topic who lead the direction of the public opinion. Based on the personal comments habit, a model is introduced to explain these phenomena. The numerical simulations of the model fit well with the empirical results. Our findings are helpful for discovering regular patterns of human behavior in on-line society and the evolution of the public opinion on the virtual as well as real society.

  10. Dynamics of user networks in on-line electronic auctions

    Czech Academy of Sciences Publication Activity Database

    Slanina, František

    2014-01-01

    Roč. 17, č. 1 (2014), "1450002-1"-"1450002-14" ISSN 0219-5259 R&D Projects: GA MŠk OC09078 Institutional support: RVO:68378271 Keywords : networks * random graphs * dynamics Subject RIV: BE - Theoretical Physics Impact factor: 0.968, year: 2014

  11. Secure Dynamic Program Repartitioning

    DEFF Research Database (Denmark)

    Hansen, Rene Rydhoff; Probst, Christian

    2005-01-01

    Secure program partitioning has been introduced as a language-based technique to allow the distribution of data and computation across mutualy untrusted hosts, while at the same time guaranteeing the protection of confidential data. Programs that have been annotated with security types......, but the partitioning compiler becomes a part of the network and can recompile applications, thus alowing hosts to enter or leave the framework. We contend that this setting is superior to static partitioning, since it allows redistribution of data and computations. This is especialy beneficial if the new host alows...... data and computations to better fulfil the trust requirements of the users. Erasure Policies ensure that the original host of the redistributed data or computation does not store the data any longer....

  12. Information Security Awareness On-Line Materials Design with Knowledge Maps

    Science.gov (United States)

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  13. On-line supercapacitor dynamic models for energy conversion and management

    International Nuclear Information System (INIS)

    Wu, C.H.; Hung, Y.H.; Hong, C.W.

    2012-01-01

    Highlights: ► On-line supercapacitor dynamic models are derived from time and frequency domains. ► Equivalent circuits with an ANN identifier are derived for nonlinear effects. ► Nonlinear effects include environmental temperature and operating voltage. ► Supercapacitor models can achieve both system fidelity and computation efficiency. - Abstract: This paper develops on-line nonlinear dynamic models of electrochemical supercapacitors which are for energy conversion and management. Based on the theory of electrochemical impedance spectroscopy, extensive alternative current impedance tests have been conducted to investigate the frequency-domain dynamics of these supercapacitors. A Nyquist diagram is plotted to help establish an equivalent electric circuit, which is regarded as the first-phase linear model. Two performance-influencing factors, environmental temperature and operating voltage, are considered as nonlinear effects. The nonlinear relationships among parameters of the capacitances and resistances in the first-phase model are established by a multi-layer artificial neural network. The neural parameters are trained using a back-propagation algorithm by feeding the experimental data bank. Combining the first-phase model and the on-line neural “parameter identifier”, the algorithm produces an on-line nonlinear dynamic model. Simulation results have proved that this proposed model is able to achieve both system fidelity and computational efficiency.

  14. Complex networks: Dynamics and security

    Indian Academy of Sciences (India)

    This paper presents a perspective in the study of complex networks by focusing on how dynamics may affect network security under attacks. ... Department of Mathematics and Statistics, Arizona State University, Tempe, Arizona 85287, USA; Institute of Mathematics and Computer Science, University of Sao Paulo, Brazil ...

  15. A correction to 'efficient and secure comparison for on-line auctions'

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Krøigaard, Mikkel; Geisler, Martin

    2009-01-01

    In this paper, we describe a correction to the cryptosystem proposed in Damgard et al. from Int. J. Applied Cryptography, Vol. 1, No. 1. Although, the correction is small and does not affect the performance of the protocols from Damgard et al., it is necessary, as the cryptosystem is not secure...

  16. Vehicle Dynamic Prediction Systems with On-Line Identification of Vehicle Parameters and Road Conditions

    Science.gov (United States)

    Hsu, Ling-Yuan; Chen, Tsung-Lin

    2012-01-01

    This paper presents a vehicle dynamics prediction system, which consists of a sensor fusion system and a vehicle parameter identification system. This sensor fusion system can obtain the six degree-of-freedom vehicle dynamics and two road angles without using a vehicle model. The vehicle parameter identification system uses the vehicle dynamics from the sensor fusion system to identify ten vehicle parameters in real time, including vehicle mass, moment of inertial, and road friction coefficients. With above two systems, the future vehicle dynamics is predicted by using a vehicle dynamics model, obtained from the parameter identification system, to propagate with time the current vehicle state values, obtained from the sensor fusion system. Comparing with most existing literatures in this field, the proposed approach improves the prediction accuracy both by incorporating more vehicle dynamics to the prediction system and by on-line identification to minimize the vehicle modeling errors. Simulation results show that the proposed method successfully predicts the vehicle dynamics in a left-hand turn event and a rollover event. The prediction inaccuracy is 0.51% in a left-hand turn event and 27.3% in a rollover event. PMID:23202231

  17. Security Dynamics of Cloud Computing

    OpenAIRE

    Khan, Khaled M.

    2009-01-01

    This paper explores various dimensions of cloud computing security. It argues that security concerns of cloud computing need to be addressed from the perspective of individual stakeholder. Security focuses of cloud computing are essentially different in terms of its characteristics and business model. Conventional way of viewing as well as addressing security such as ‘bolting-in’ on the top of cloud computing may not work well. The paper attempts to portray the security spectrum necessary for...

  18. Dynamic evolving spiking neural networks for on-line spatio- and spectro-temporal pattern recognition.

    Science.gov (United States)

    Kasabov, Nikola; Dhoble, Kshitij; Nuntalid, Nuttapod; Indiveri, Giacomo

    2013-05-01

    On-line learning and recognition of spatio- and spectro-temporal data (SSTD) is a very challenging task and an important one for the future development of autonomous machine learning systems with broad applications. Models based on spiking neural networks (SNN) have already proved their potential in capturing spatial and temporal data. One class of them, the evolving SNN (eSNN), uses a one-pass rank-order learning mechanism and a strategy to evolve a new spiking neuron and new connections to learn new patterns from incoming data. So far these networks have been mainly used for fast image and speech frame-based recognition. Alternative spike-time learning methods, such as Spike-Timing Dependent Plasticity (STDP) and its variant Spike Driven Synaptic Plasticity (SDSP), can also be used to learn spatio-temporal representations, but they usually require many iterations in an unsupervised or semi-supervised mode of learning. This paper introduces a new class of eSNN, dynamic eSNN, that utilise both rank-order learning and dynamic synapses to learn SSTD in a fast, on-line mode. The paper also introduces a new model called deSNN, that utilises rank-order learning and SDSP spike-time learning in unsupervised, supervised, or semi-supervised modes. The SDSP learning is used to evolve dynamically the network changing connection weights that capture spatio-temporal spike data clusters both during training and during recall. The new deSNN model is first illustrated on simple examples and then applied on two case study applications: (1) moving object recognition using address-event representation (AER) with data collected using a silicon retina device; (2) EEG SSTD recognition for brain-computer interfaces. The deSNN models resulted in a superior performance in terms of accuracy and speed when compared with other SNN models that use either rank-order or STDP learning. The reason is that the deSNN makes use of both the information contained in the order of the first input spikes

  19. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  20. Dynamic neural networks based on-line identification and control of high performance motor drives

    Science.gov (United States)

    Rubaai, Ahmed; Kotaru, Raj

    1995-01-01

    In the automated and high-tech industries of the future, there wil be a need for high performance motor drives both in the low-power range and in the high-power range. To meet very straight demands of tracking and regulation in the two quadrants of operation, advanced control technologies are of a considerable interest and need to be developed. In response a dynamics learning control architecture is developed with simultaneous on-line identification and control. the feature of the proposed approach, to efficiently combine the dual task of system identification (learning) and adaptive control of nonlinear motor drives into a single operation is presented. This approach, therefore, not only adapts to uncertainties of the dynamic parameters of the motor drives but also learns about their inherent nonlinearities. In fact, most of the neural networks based adaptive control approaches in use have an identification phase entirely separate from the control phase. Because these approaches separate the identification and control modes, it is not possible to cope with dynamic changes in a controlled process. Extensive simulation studies have been conducted and good performance was observed. The robustness characteristics of neuro-controllers to perform efficiently in a noisy environment is also demonstrated. With this initial success, the principal investigator believes that the proposed approach with the suggested neural structure can be used successfully for the control of high performance motor drives. Two identification and control topologies based on the model reference adaptive control technique are used in this present analysis. No prior knowledge of load dynamics is assumed in either topology while the second topology also assumes no knowledge of the motor parameters.

  1. Development of a Probabilistic Technique for On-line Parameter and State Estimation in Non-linear Dynamic Systems

    International Nuclear Information System (INIS)

    Tunc Aldemir; Miller, Don W.; Hajek, Brian K.; Peng Wang

    2002-01-01

    The DSD (Dynamic System Doctor) is a system-independent, interactive software under development for on-line state/parameter estimation in dynamic systems (1), partially supported through a Nuclear Engineering Education (NEER) grant during 1998-2001. This paper summarizes the recent accomplishments in improving the user-friendliness and computational capability of DSD

  2. On-line dynamic monitoring automotive exhausts: using BP-ANN for distinguishing multi-components

    Science.gov (United States)

    Zhao, Yudi; Wei, Ruyi; Liu, Xuebin

    2017-10-01

    Remote sensing-Fourier Transform infrared spectroscopy (RS-FTIR) is one of the most important technologies in atmospheric pollutant monitoring. It is very appropriate for on-line dynamic remote sensing monitoring of air pollutants, especially for the automotive exhausts. However, their absorption spectra are often seriously overlapped in the atmospheric infrared window bands, i.e. MWIR (3 5μm). Artificial Neural Network (ANN) is an algorithm based on the theory of the biological neural network, which simplifies the partial differential equation with complex construction. For its preferable performance in nonlinear mapping and fitting, in this paper we utilize Back Propagation-Artificial Neural Network (BP-ANN) to quantitatively analyze the concentrations of four typical industrial automotive exhausts, including CO, NO, NO2 and SO2. We extracted the original data of these automotive exhausts from the HITRAN database, most of which virtually overlapped, and established a mixed multi-component simulation environment. Based on Beer-Lambert Law, concentrations can be retrieved from the absorbance of spectra. Parameters including learning rate, momentum factor, the number of hidden nodes and iterations were obtained when the BP network was trained with 80 groups of input data. By improving these parameters, the network can be optimized to produce necessarily higher precision for the retrieved concentrations. This BP-ANN method proves to be an effective and promising algorithm on dealing with multi-components analysis of automotive exhausts.

  3. Development and Evaluation of an On-Line Educational Module for Volunteer Leaders on Bio-Security in Washington State 4-H Livestock Projects

    Science.gov (United States)

    Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat

    2011-01-01

    An on-line module on disease prevention was created for 4-H volunteer leaders who work with livestock projects in Washington to better prepare them to teach youth about bio-security and its importance in 4-H livestock projects. Evaluation of the module and usage statistics since the module's debut were collected and evaluated. The module increases…

  4. A Dynamic Framework for Water Security

    Science.gov (United States)

    Srinivasan, Veena; Konar, Megan; Sivapalan, Murugesu

    2017-04-01

    Water security is a multi-faceted problem, going beyond mere balancing of supply and demand. Conventional attempts to quantify water security starting rely on static indices at a particular place and point in time. While these are simple and scalable, they lack predictive or explanatory power. 1) Most static indices focus on specific spatial scales and largely ignore cross-scale feedbacks between human and water systems. 2) They fail to account for the increasing spatial specialization in the modern world - some regions are cities others are agricultural breadbaskets; so water security means different things in different places. Human adaptation to environmental change necessitates a dynamic view of water security. We present a framework that defines water security as an emergent outcome of a coupled socio-hydrologic system. Over the medium term (5-25 years), water security models might hold governance, culture and infrastructure constant, but allow humans to respond to changes and thus predict how water security would evolve. But over very long time-frames (25-100 years), a society's values, norms and beliefs themselves may themselves evolve; these in turn may prompt changes in policy, governance and infrastructure. Predictions of water security in the long term involve accounting for such regime shifts in the cultural and political context of a watershed by allowing the governing equations of the models to change.

  5. On-line caloric value sensor and validation of dynamic models applied to municipal solid waste

    NARCIS (Netherlands)

    Kessel, van L.B.M.; Leskens, M.; Brem, G.

    2002-01-01

    This paper deals with two aspects concerning the optimization of municipal solid waste combustion (MSWC) processes. First of all, an on-line calorific value sensor is discussed by means of which the calorific value of the waste can be estimated from actual process data. Experimental results on a

  6. Design tools for complex dynamic security systems.

    Energy Technology Data Exchange (ETDEWEB)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III (.; ); Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  7. Beyond the electronic textbook model: software techniques to make on-line educational content dynamic.

    Science.gov (United States)

    Frank, M S; Dreyer, K

    2001-06-01

    . This technology enables the educator to choreograph a stylized, interactive delivery of his or her message using multimedia components assembled in virtually any order, spanning any number of web pages for a given case or theme. An educator can thus exercise precise influence on specific learning objectives, embody his or her personal teaching style within the content, and ultimately enhance its educational impact. The described technology amplifies the efforts of the educator and provides a more dynamic and enriching learning environment for web-based education.

  8. On-Line Junction Temperature Monitoring of Switching Devices with Dynamic Compact Thermal Models Extracted with Model Order Reduction

    Directory of Open Access Journals (Sweden)

    Fabio Di Napoli

    2017-02-01

    Full Text Available Residual lifetime estimation has gained a key point among the techniques that improve the reliability and the efficiency of power converters. The main cause of failures are the junction temperature cycles exhibited by switching devices during their normal operation; therefore, reliable power converter lifetime estimation requires the knowledge of the junction temperature time profile. Since on-line dynamic temperature measurements are extremely difficult, in this work an innovative real-time monitoring strategy is proposed, which is capable of estimating the junction temperature profile from the measurement of the dissipated powers through an accurate and compact thermal model of the whole power module. The equations of this model can be easily implemented inside a FPGA, exploiting the control architecture already present in modern power converters. Experimental results on an IGBT power module demonstrate the reliability of the proposed method.

  9. Anticipating the unintended consequences of security dynamics.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Overfelt, James Robert; Malczynski, Leonard A.; Saltiel, David H.; Simon Paul Moulton

    2010-01-01

    In a globalized world, dramatic changes within any one nation causes ripple or even tsunamic effects within neighbor nations and nations geographically far removed. Multinational interventions to prevent or mitigate detrimental changes can easily cause secondary unintended consequences more detrimental and enduring than the feared change instigating the intervention. This LDRD research developed the foundations for a flexible geopolitical and socioeconomic simulation capability that focuses on the dynamic national security implications of natural and man-made trauma for a nation-state and the states linked to it through trade or treaty. The model developed contains a database for simulating all 229 recognized nation-states and sovereignties with the detail of 30 economic sectors including consumers and natural resources. The model explicitly simulates the interactions among the countries and their governments. Decisions among governments and populations is based on expectation formation. In the simulation model, failed expectations are used as a key metric for tension across states, among ethnic groups, and between population factions. This document provides the foundational documentation for the model.

  10. MANAGEMENT OF RESOURCES IN DYNAMICALLY CHANGING SECURITY ENVRIONMENT

    Directory of Open Access Journals (Sweden)

    Sevdalina Dimitrova

    2014-09-01

    Full Text Available The monograph recommends integration between science and practice, experts from national bodies and scientific research potential of academic community of military universities in the field of management of resources of security and defence in accordance to the challenges in security environment caused by its dynamic and often unpredictable changes.

  11. Security infrastructure for dynamically provisioned cloud infrastructure services

    NARCIS (Netherlands)

    Demchenko, Y.; Ngo, C.; de Laat, C.; Lopez, D.R.; Morales, A.; García-Espín, J.A.; Pearson, S.; Yee, G.

    2013-01-01

    This chapter discusses conceptual issues, basic requirements and practical suggestions for designing dynamically configured security infrastructure provisioned on demand as part of the cloud-based infrastructure. This chapter describes general use cases for provisioning cloud infrastructure services

  12. Household Food Security Policy Analysis A System Dynamics Perspective

    Directory of Open Access Journals (Sweden)

    Isdore Paterson Guma

    2015-08-01

    Full Text Available Household food security FS is complex and requires multiple stakeholder intervention. Systemic approach aids stakeholders to understand the mechanisms and feedback between complexities in food security providing effective decision making as global resource consumption continues to grow. The study investigated food security challenges and a system dynamics model was developed for evaluating policies and intervention strategies for better livelihood at household level. Dynamic synthesis methodology questionnaires and interview guide were used to unearth food security challenges faced by households. A causal loop diagram was drawn. The model demonstrates a balance between food stock seeds preserved seeds for sale and consumption from crop harvest throughout the food cycles. This research makes contribution to the literature by evaluating dynamic synthesis methodology and FS policy discussions from a feedback point of view.

  13. Secure Group Communications for Large Dynamic Multicast Group

    Institute of Scientific and Technical Information of China (English)

    Liu Jing; Zhou Mingtian

    2003-01-01

    As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dynamic multicast group have been researched and a solution based on SubGroup Secure Controllers (SGSCs) is presented, which solves many problems in IOLUS system and WGL scheme.

  14. DYNAMICS OF FOOD SECURITY IN RECENT DECADES

    Directory of Open Access Journals (Sweden)

    Florea Adrian

    2012-12-01

    Full Text Available By food security we understand the people's access, at all time, to food, needed for a healthy and active life. It can be thought at global, regional, state or local level, but only as a strategy with relevance only to the family, to be able to buy, thanks to its own production or purchase, sufficient food to meet the needs of all its members. Diet must be quantity sufficient, variety and of good enough quality and each family member should be healthy to take full advantage of consumed foods.

  15. Real-time synchronization of batch trajectories for on-line multivariate statistical process control using Dynamic Time Warping

    OpenAIRE

    González Martínez, Jose María; Ferrer Riquelme, Alberto José; Westerhuis, Johan A.

    2011-01-01

    This paper addresses the real-time monitoring of batch processes with multiple different local time trajectories of variables measured during the process run. For Unfold Principal Component Analysis (U-PCA)—or Unfold Partial Least Squares (U-PLS)-based on-line monitoring of batch processes, batch runs need to be synchronized, not only to have the same time length, but also such that key events happen at the same time. An adaptation from Kassidas et al.'s approach [1] will be introduced to ach...

  16. Assessing the Need for an On-Line Educational Module for Volunteer Leaders on Bio-Security in Washington State 4-H Livestock Projects

    Science.gov (United States)

    Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat

    2011-01-01

    4-H livestock projects present disease transmission risks that can be reduced by the use of bio-security practices. The responsibility of teaching bio-security to youth belongs primarily to volunteer leaders, who may not be aware of the importance of these practices. A needs assessment for an online educational module about bio-security revealed…

  17. Security Analysis of Dynamic SDN Architectures Based on Game Theory

    Directory of Open Access Journals (Sweden)

    Chao Qi

    2018-01-01

    Full Text Available Security evaluation of SDN architectures is of critical importance to develop robust systems and address attacks. Focused on a novel-proposed dynamic SDN framework, a game-theoretic model is presented to analyze its security performance. This model can represent several kinds of players’ information, simulate approximate attack scenarios, and quantitatively estimate systems’ reliability. And we explore several typical game instances defined by system’s capability, players’ objects, and strategies. Experimental results illustrate that the system’s detection capability is not a decisive element to security enhancement as introduction of dynamism and redundancy into SDN can significantly improve security gain and compensate for its detection weakness. Moreover, we observe a range of common strategic actions across environmental conditions. And analysis reveals diverse defense mechanisms adopted in dynamic systems have different effect on security improvement. Besides, the existence of equilibrium in particular situations further proves the novel structure’s feasibility, flexibility, and its persistent ability against long-term attacks.

  18. Dynamic reconfiguration of security policies in wireless sensor networks.

    Science.gov (United States)

    Pinto, Mónica; Gámez, Nadia; Fuentes, Lidia; Amor, Mercedes; Horcas, José Miguel; Ayala, Inmaculada

    2015-03-04

    Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs) allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies) and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs).We evaluate our approach using a case study from the intelligent transportation system domain.

  19. Using VO Concept for Managing Dynamic Security Associations

    NARCIS (Netherlands)

    Demchenko, Y.; Gommans, L.; de Laat, C.T.A.M.

    2006-01-01

    This research paper presents results of the analysis how the Virtual Organisation (VO) concept can be used for managing dynamic security associations in collaborative applications and for complex resource provisioning. The paper provides an overview of the current practice in VO management at the

  20. Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mónica Pinto

    2015-03-01

    Full Text Available Providing security and privacy to wireless sensor nodes (WSNs is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs.We evaluate our approach using a case study from the intelligent transportation system domain.

  1. Secure physical layer using dynamic permutations in cognitive OFDMA systems

    DEFF Research Database (Denmark)

    Meucci, F.; Wardana, Satya Ardhy; Prasad, Neeli R.

    2009-01-01

    This paper proposes a novel lightweight mechanism for a secure Physical (PHY) layer in Cognitive Radio Network (CRN) using Orthogonal Frequency Division Multiplexing (OFDM). User's data symbols are mapped over the physical subcarriers with a permutation formula. The PHY layer is secured...... with a random and dynamic subcarrier permutation which is based on a single pre-shared information and depends on Dynamic Spectrum Access (DSA). The dynamic subcarrier permutation is varying over time, geographical location and environment status, resulting in a very robust protection that ensures...... confidentiality. The method is shown to be effective also for existing non-cognitive systems. The proposed mechanism is effective against eavesdropping even if the eavesdropper adopts a long-time patterns analysis, thus protecting cryptography techniques of higher layers. The correlation properties...

  2. Dynamic model based on Bayesian method for energy security assessment

    International Nuclear Information System (INIS)

    Augutis, Juozas; Krikštolaitis, Ričardas; Pečiulytė, Sigita; Žutautaitė, Inga

    2015-01-01

    Highlights: • Methodology for dynamic indicator model construction and forecasting of indicators. • Application of dynamic indicator model for energy system development scenarios. • Expert judgement involvement using Bayesian method. - Abstract: The methodology for the dynamic indicator model construction and forecasting of indicators for the assessment of energy security level is presented in this article. An indicator is a special index, which provides numerical values to important factors for the investigated area. In real life, models of different processes take into account various factors that are time-dependent and dependent on each other. Thus, it is advisable to construct a dynamic model in order to describe these dependences. The energy security indicators are used as factors in the dynamic model. Usually, the values of indicators are obtained from statistical data. The developed dynamic model enables to forecast indicators’ variation taking into account changes in system configuration. The energy system development is usually based on a new object construction. Since the parameters of changes of the new system are not exactly known, information about their influences on indicators could not be involved in the model by deterministic methods. Thus, dynamic indicators’ model based on historical data is adjusted by probabilistic model with the influence of new factors on indicators using the Bayesian method

  3. Framework for optimal power flow incorporating dynamic system security

    International Nuclear Information System (INIS)

    El-Kady, M.A.; Owayedh, M.S.

    2006-01-01

    This paper introduces a novel framework and methodologies which are capable of tackling the complex issue of power system economy versus security in a practical and effective manner. At heart of achieving such a challenging and far-reaching objective is the incorporation of the Dyanamic Security Assessment (DSA) into production optimization techniques using the Transient Energy Function (TEF) method. In addition, and in parallel with the already well established concept of the system security, two new concepts pertaining to power system performance will be introduced in this paper, namely the concept of system dynamic susceptibility, which measures the level of systems weakness to a particular contingency and the concept of system consequent restorability, which measures the extent of contingency severity in terms of the required subsequent system restoration work should a particular contingency occur. (author)

  4. Automated on-line liquid–liquid extraction system for temporal mass spectrometric analysis of dynamic samples

    Energy Technology Data Exchange (ETDEWEB)

    Hsieh, Kai-Ta; Liu, Pei-Han [Department of Applied Chemistry, National Chiao Tung University, 1001 University Rd, Hsinchu, 300, Taiwan (China); Urban, Pawel L. [Department of Applied Chemistry, National Chiao Tung University, 1001 University Rd, Hsinchu, 300, Taiwan (China); Institute of Molecular Science, National Chiao Tung University, 1001 University Rd, Hsinchu, 300, Taiwan (China)

    2015-09-24

    Most real samples cannot directly be infused to mass spectrometers because they could contaminate delicate parts of ion source and guides, or cause ion suppression. Conventional sample preparation procedures limit temporal resolution of analysis. We have developed an automated liquid–liquid extraction system that enables unsupervised repetitive treatment of dynamic samples and instantaneous analysis by mass spectrometry (MS). It incorporates inexpensive open-source microcontroller boards (Arduino and Netduino) to guide the extraction and analysis process. Duration of every extraction cycle is 17 min. The system enables monitoring of dynamic processes over many hours. The extracts are automatically transferred to the ion source incorporating a Venturi pump. Operation of the device has been characterized (repeatability, RSD = 15%, n = 20; concentration range for ibuprofen, 0.053–2.000 mM; LOD for ibuprofen, ∼0.005 mM; including extraction and detection). To exemplify its usefulness in real-world applications, we implemented this device in chemical profiling of pharmaceutical formulation dissolution process. Temporal dissolution profiles of commercial ibuprofen and acetaminophen tablets were recorded during 10 h. The extraction-MS datasets were fitted with exponential functions to characterize the rates of release of the main and auxiliary ingredients (e.g. ibuprofen, k = 0.43 ± 0.01 h{sup −1}). The electronic control unit of this system interacts with the operator via touch screen, internet, voice, and short text messages sent to the mobile phone, which is helpful when launching long-term (e.g. overnight) measurements. Due to these interactive features, the platform brings the concept of the Internet-of-Things (IoT) to the chemistry laboratory environment. - Highlights: • Mass spectrometric analysis normally requires sample preparation. • Liquid–liquid extraction can isolate analytes from complex matrices. • The proposed system automates

  5. Automated on-line liquid–liquid extraction system for temporal mass spectrometric analysis of dynamic samples

    International Nuclear Information System (INIS)

    Hsieh, Kai-Ta; Liu, Pei-Han; Urban, Pawel L.

    2015-01-01

    Most real samples cannot directly be infused to mass spectrometers because they could contaminate delicate parts of ion source and guides, or cause ion suppression. Conventional sample preparation procedures limit temporal resolution of analysis. We have developed an automated liquid–liquid extraction system that enables unsupervised repetitive treatment of dynamic samples and instantaneous analysis by mass spectrometry (MS). It incorporates inexpensive open-source microcontroller boards (Arduino and Netduino) to guide the extraction and analysis process. Duration of every extraction cycle is 17 min. The system enables monitoring of dynamic processes over many hours. The extracts are automatically transferred to the ion source incorporating a Venturi pump. Operation of the device has been characterized (repeatability, RSD = 15%, n = 20; concentration range for ibuprofen, 0.053–2.000 mM; LOD for ibuprofen, ∼0.005 mM; including extraction and detection). To exemplify its usefulness in real-world applications, we implemented this device in chemical profiling of pharmaceutical formulation dissolution process. Temporal dissolution profiles of commercial ibuprofen and acetaminophen tablets were recorded during 10 h. The extraction-MS datasets were fitted with exponential functions to characterize the rates of release of the main and auxiliary ingredients (e.g. ibuprofen, k = 0.43 ± 0.01 h"−"1). The electronic control unit of this system interacts with the operator via touch screen, internet, voice, and short text messages sent to the mobile phone, which is helpful when launching long-term (e.g. overnight) measurements. Due to these interactive features, the platform brings the concept of the Internet-of-Things (IoT) to the chemistry laboratory environment. - Highlights: • Mass spectrometric analysis normally requires sample preparation. • Liquid–liquid extraction can isolate analytes from complex matrices. • The proposed system automates the

  6. Dynamic model of a natural water circulation boiler suitable for on-line monitoring of fossil/alternative fuel plants

    International Nuclear Information System (INIS)

    Sedić, Almir; Katulić, Stjepko; Pavković, Danijel

    2014-01-01

    Highlights: • Derivation of dynamic model of a natural water circulation boiler is presented. • Model is derived by employing basic laws of conservation of mass, energy and momentum. • Thus obtained boiler model does not include empirical relationships. • Model is validated against experimental data related to an external disturbance event. • The final model is used for simulation analysis/assessment of key boiler quantities. - Abstract: The environmental protection policies and legal obligations motivate process industries to implement new low-emission and high-efficiency technologies. For the purpose of production process optimization and related control system design it is worthwhile to first build an appropriate process model. Apart from favorable execution speed, accuracy, and reliability features, the model also needs to be straightforward and only include the physical and design characteristics of the overall plant and its individual components, instead of relying on empirical relationships. To this end, this paper presents a nonlinear dynamic model of the single-drum natural-circulation steam boiler evaporator circuit, based exclusively on the fundamental physical laws of conservation of mass, energy and momentum, wherein the reliance upon empirical relationships has been entirely avoided. The presented boiler system modeling approach is based on the analysis of the physical phenomena within the boiler drum, as well as within downcomer and furnace tubes, and it also takes into account the boiler system design-specific features such as cyclone steam separators, thus facilitating the derivation of a fully-physical process model. Due to the straightforwardness of the derived process model, it should also be useful for the analysis of similar steam boiler facilities, requiring only adjustments of key operational and design parameters such as operating pressure, temperature, steam capacity and characteristics of ancillary equipment such as pumps. To

  7. A coherency-based method to increase dynamic security in power systems

    Energy Technology Data Exchange (ETDEWEB)

    De Tuglie, E. [Dipartimento di Ingegneria dell' Ambiente e per lo Sviluppo Sostenibile - DIASS, Politecnico di Bari, Viale del Turismo 8, 74100 Taranto (Italy); Iannone, S.M.; Torelli, F. [Dipartimento di Elettrotecnica ed Elettronica - DEE, Politecnico di Bari, Via Re David 200, 70125 Bari (Italy)

    2008-08-15

    Dynamic security analysis is the evaluation of the ability of a system to withstand contingencies by surviving transient conditions to acceptable steady-state operative states. When potential instability due to contingency is detected, preventive action may be desired to improve the system security. This is very important in the on-line operation of a power system, especially when the system is stability-limited. The method proposed in this paper is based on the idea that increasing coherency between generators in the transient behaviour following a system perturbation gives rise to a more stable system. In this paper, we suggest the use of the ''input-output feedback-linearization'' with a reference trajectory obtained using a system dynamic equivalent based on the centre of inertia. To quantify coherency levels a new coherency indicator has been assumed for the given reference trajectory. The result is an increasing level in coherency, critical clearing time and system stability. The method is tested on the IEEE 30 bus test system. (author)

  8. ON-LINE DYNAMIC SECURITY ASSESSMENT OF A MICRO-GRID USING FUZZY LOGIC AND DISTRIBUTED PROCESSING

    Directory of Open Access Journals (Sweden)

    GUSTAVO SCHWEICKARDT

    2013-01-01

    Full Text Available La evaluación de la seguridad dinámica en línea se define como la habilidad de un sistema de potencia a soportar contingencias repentinas y sobrevivir el transitorio y llegar a un nuevo estado estacionario aceptable. Durante la operación del sistema la evaluación del nivel de seguridad dinámica es esencial para tomar medidas de control preventivas con el objetivo de llevar al sistema, en caso de que sea necesario, a un estado de operación más seguro. Debido a la gran complejidad de los sistemas de potencia y al gran número de componentes, la evaluación de la seguridad es computacionalmente compleja lo que la hace poco útil. Esto es más complejo cuando se desea evaluar la seguridad dinámica considerando las nuevas micro redes. Para afrontar este problema, se presenta un nuevo enfoque de evaluación de la seguridad dinámica en línea de micro redes. La propuesta emplea procesamiento distribuido y técnicas de inteligencia artificial para reducir los tiempos de cálculo lo que permite su ejecución en línea con la operación del sistema.

  9. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  10. Optimal dispatch in dynamic security constrained open power market

    International Nuclear Information System (INIS)

    Singh, S.N.; David, A.K.

    2002-01-01

    Power system security is a new concern in the competitive power market operation, because the integration of the system controller and the generation owner has been broken. This paper presents an approach for dynamic security constrained optimal dispatch in restructured power market environment. The transient energy margin using transient energy function (TEF) approach has been used to calculate the stability margin of the system and a hybrid method is applied to calculate the approximate unstable equilibrium point (UEP) that is used to calculate the exact UEP and thus, the energy margin using TEF. The case study results illustrated on two systems shows that the operating mechanisms are compatible with the new business environment. (author)

  11. An Encryption Key for Secure Authentication: The Dynamic Solution

    Directory of Open Access Journals (Sweden)

    Zubayr Khalid

    2017-06-01

    Full Text Available In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in type. Dynamic authentication protocol is still a theoretical concept. In this paper, we are focusing on a concept of authentication technique which is actually dynamic in genre, i.e. the password here will change in t time (where t is as small as possible. This technique comprises of both hardware and software part. In this paper, we have covered the idea of generating an efficient algorithm that can work as the final in the Dynamic Password Authentication system. We have used standard deviation within statistics to generalize the possible password which is further secured by Feistel Block Cipher and Advanced Encryption Standard technique (AES, leading and following the said mathematics respectively. In order to allow the system to create variable password in the least time interval possible, we must make sure our process is not much complex.

  12. On-line dynamic fractionation and automatic determination of inorganic phosphorous in environmental solid substrates exploiting sequential injection microcolumn extraction and flow injection analysi

    DEFF Research Database (Denmark)

    Buanuam, Janya; Miró, Manuel; Hansen, Elo Harald

    2006-01-01

    Sequential injection microcolumn extraction (SI-MCE) based on the implementation of a soil containing microcartridge as external reactor in a sequential injection network is, for the first time, proposed for dynamic fractionation of macronutrients in environmental solids, as exemplified by the pa......Sequential injection microcolumn extraction (SI-MCE) based on the implementation of a soil containing microcartridge as external reactor in a sequential injection network is, for the first time, proposed for dynamic fractionation of macronutrients in environmental solids, as exemplified...... by the partitioning of inorganic phosphorous in agricultural soils. The on-line fractionation method capitalises on the accurate metering and sequential exposure of the various extractants to the solid sample by application of programmable flow as precisely coordinated by a syringe pump. Three different soil phase...... associations for phosphorus, that is, exchangeable, Al- and Fe-bound and Ca-bound fractions, were elucidated by accommodation in the flow manifold of the 3 steps of the Hietjles-Litjkema (HL) scheme involving the use of 1.0 M NH4Cl, 0.1 M NaOH and 0.5 M HCl, respectively, as sequential leaching reagents...

  13. The determination of organochlorine pesticides based on dynamic microwave-assisted extraction coupled with on-line solid-phase extraction of high-performance liquid chromatography

    International Nuclear Information System (INIS)

    Chen Ligang; Ding Lan; Jin Haiyan; Song Daqian; Zhang Huarong; Li Jiantao; Zhang Kun; Wang Yutang; Zhang Hanqi

    2007-01-01

    A rapid technique based on dynamic microwave-assisted extraction coupled with on-line solid-phase extraction of high-performance liquid chromatography (DMAE-SPE-HPLC) has been developed. A TM 010 microwave resonance cavity built in the laboratory was applied to concentrate the microwave energy. The sample placed in the zone of microwave irradiation was extracted with 95% acetonitrile (ACN) aqueous solution which was driven by a peristaltic pump at a flow rate of 1.0 mL min -1 . The extraction can be completed in a recirculating system in 10 min. When a number of extraction cycles were completed, the extract (1 mL) was diluted on-line with water. Then the extract was loaded into an SPE column where the analytes were retained while the unretained matrix components were washed away. Subsequently, the analytes were automatically transferred from the SPE column to the analytical column and determined by UV detector at 238 nm. The technique was used for determination of organochlorine pesticides (OCPs) in grains, including wheat, rice, corn and bean. The limits of detection of OCPs are in the range of 19-37 ng g -1 . The recoveries obtained by analyzing the four spiked grain samples are in the range of 86-105%, whereas the relative standard deviation (R.S.D.) values are <8.7% ranging from 1.2 to 8.7%. Our method was demonstrated to be fast, accurate, and precise. In addition, only small quantities of solvent and sample were required

  14. Information Security: A Scientometric Study of the Profile, Structure, and Dynamics of an Emerging Scholarly Specialty

    Science.gov (United States)

    Olijnyk, Nicholas Victor

    2014-01-01

    The central aim of the current research is to explore and describe the profile, dynamics, and structure of the information security specialty. This study's objectives are guided by four research questions: 1. What are the salient features of information security as a specialty? 2. How has the information security specialty emerged and evolved from…

  15. Dynamic Security Assessment of Danish Power System Based on Decision Trees: Today and Tomorrow

    DEFF Research Database (Denmark)

    Rather, Zakir Hussain; Liu, Leo; Chen, Zhe

    2013-01-01

    The research work presented in this paper analyzes the impact of wind energy, phasing out of central power plants and cross border power exchange on dynamic security of Danish Power System. Contingency based decision tree (DT) approach is used to assess the dynamic security of present and future...

  16. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security

    National Research Council Canada - National Science Library

    Ganger, Gregory

    2000-01-01

    This report contains the technical content of a recent funding proposal. In it, we propose a new approach to network security in which each individual device erects its own security perimeter and defends its own critical resources...

  17. Dynamic Security Assessment Of Computer Networks In Siem-Systems

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Doynikova

    2015-10-01

    Full Text Available The paper suggests an approach to the security assessment of computer networks. The approach is based on attack graphs and intended for Security Information and Events Management systems (SIEM-systems. Key feature of the approach consists in the application of the multilevel security metrics taxonomy. The taxonomy allows definition of the system profile according to the input data used for the metrics calculation and techniques of security metrics calculation. This allows specification of the security assessment in near real time, identification of previous and future attacker steps, identification of attackers goals and characteristics. A security assessment system prototype is implemented for the suggested approach. Analysis of its operation is conducted for several attack scenarios.

  18. The study of the dynamic behaviour and safety of nuclear power plants by means of on-line, real time noise signal analysis

    International Nuclear Information System (INIS)

    Kemeny, L.G.

    1973-01-01

    This paper describes an on-line data acquisition system designed to carry out the above funtions. Preliminary results obtained during the monitoring of the HIFAR reactor of the Australian Atomic Energy Commission are reported and discussed. The relationships between experimental measurements and basic stochastic models are explored. (author)

  19. Integrating Future Land Use Scenarios to Evaluate the Spatio-Temporal Dynamics of Landscape Ecological Security

    Directory of Open Access Journals (Sweden)

    Yi Lu

    2016-11-01

    Full Text Available Urban ecological security is the basic principle of national ecological security. However, analyses of the spatial and temporal dynamics of ecological security remain limited, especially those that consider different scenarios of urban development. In this study, an integrated method is proposed that combines the Conversion of Land Use and its Effects (CLUE-S model with the Pressure–State–Response (P-S-R framework to assess landscape ecological security (LES in Huangshan City, China under two scenarios. Our results suggest the following conclusions: (1 the spatial and temporal dynamics of ecological security are closely related to the urbanization process; (2 although the average values of landscape ecological security are similar under different scenarios, the areas of relatively high security levels vary considerably; and (3 spatial heterogeneity in ecological security exists between different districts and counties, and the city center and its vicinity may face relatively serious declines in ecological security in the future. Overall, the proposed method not only illustrates the spatio-temporal dynamics of landscape ecological security under different scenarios but also reveals the anthropogenic effects on ecosystems by differentiating between causes, effects, and human responses at the landscape scale. This information is of great significance to decision-makers for future urban planning and management.

  20. Understanding human factors in cyber security as a dynamic system

    NARCIS (Netherlands)

    Young, H.J.; Vliet, A.J. van; Ven, J.G.S. van de; Jol, S.C.; Broekman, C.C.M.T.

    2018-01-01

    The perspective of human factors is largely missing from the wider cyber security dialogue and its scope is often limited. We propose a framework in which we consider cyber security as a state of a system. System change is brought on by an entity’s behavior. Interventions are ways of changing

  1. Analysis of Dynamic Complexity of the Cyber Security Ecosystem of Colombia

    Directory of Open Access Journals (Sweden)

    Angélica Flórez

    2016-07-01

    Full Text Available This paper presents two proposals for the analysis of the complexity of the Cyber security Ecosystem of Colombia (CEC. This analysis shows the available knowledge about entities engaged in cyber security in Colombia and the relationships between them, which allow an understanding of the synergy between the different existing components. The complexity of the CEC is detailed from the view of the Influence Diagram of System Dynamics and the Domain Diagram of Software Engineering. The resulting model makes cyber security evident as a strategic component of national security.

  2. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.

    Science.gov (United States)

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-04-21

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.

  3. Profiles of Food Security for US Farmworker Households and Factors Related to Dynamic of Change.

    Science.gov (United States)

    Ip, Edward H; Saldana, Santiago; Arcury, Thomas A; Grzywacz, Joseph G; Trejo, Grisel; Quandt, Sara A

    2015-10-01

    We recruited 248 farmworker families with preschool-aged children in North Carolina and examined food security indicators over 24 months to identify food security patterns and examine the dynamic of change over time. Participants in the Niños Sanos study, conducted 2011 to 2014, completed quarterly food security assessments. Based on responses to items in the US Household Food Security Survey Module, we identified different states of food security by using hidden Markov model analysis, and examined factors associated with different states. We delineated factors associated with changes in state by using mixed-effect ordinal logistic regression. About half of the households (51%) consistently stayed in the most food-secure state. The least food-secure state was transient, with only 29% probability of this state for 2 consecutive quarters. Seasonal (vs migrant) work status, having immigration documents (vs not documented), and season predicted higher levels of food security. Heterogeneity in food security among farmworker households calls for tailoring intervention strategies. The transiency and unpredictability of low food security suggest that access to safety-net programs could reduce low food security risk in this population.

  4. On-line filtering

    International Nuclear Information System (INIS)

    Verkerk, C.

    1978-01-01

    Present day electronic detectors used in high energy physics make it possible to obtain high event rates and it is likely that future experiments will face even higher data rates than at present. The complexity of the apparatus increases very rapidly with time and also the criteria for selecting desired events become more and more complex. So complex in fact that the fast trigger system cannot be designed to fully cope with it. The interesting events become thus contaminated with multitudes of uninteresting ones. To distinguish the 'good' events from the often overwhelming background of other events one has to resort to computing techniques. Normally this selection is made in the first part of the analysis of the events, analysis normally performed on a powerful scientific computer. This implies however that many uninteresting or background events have to be recorded during the experiment for subsequent analysis. A number of undesired consequences result; and these constitute a sufficient reason for trying to perform the selection at an earlier stage, in fact ideally before the events are recorded on magnetic tape. This early selection is called 'on-line filtering' and it is the topic of the present lectures. (Auth.)

  5. Social security, dynamic efficiency and self-control problems

    NARCIS (Netherlands)

    Bucciol, A.

    2008-01-01

    We develop an OLG model with uncertainty on labor income and death age to study the welfare implications of unfunded Social Security programs in an economy where agents are affected by temptation à la Gul and Pesendorfer (2001, Econometrica 69, 1403). Tempted agents give additional value to the

  6. Food Security, Land and Territorial Dynamics in Bolivia | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... national food supply, in favour of large agro-industrial producers in the East. These changes have affected the food security of more than 70% of the rural population. ... resulting in decreased food production and increased illegal imports of food. Recently the government abandoned its policy of selling food below market ...

  7. Social security in developing countries : operation and dynamics of social security mechanisms in rural Swaziland

    NARCIS (Netherlands)

    Leliveld, A.H.M.

    1994-01-01

    This study, which is based on field research carried out in Swaziland from October 1989 to December 1990, starts with an introductory chapter followed by three theoretical chapters on social security in developing countries. The content of these chapters is illustrated with an extensive case study

  8. On line portal imaging

    International Nuclear Information System (INIS)

    Munro, Peter

    1997-01-01

    Purpose/Objective: The purpose of this presentation is to examine the various imaging devices that have been developed for portal imaging, describe some of the image registration methods that have been developed to determine geometric errors quantitatively, and discuss how portal imaging has been incorporated into clinical practice. Discussion: Verification of patient positioning has always been an important aspect of external beam radiation therapy. Over the past decade many portal imaging devices have been developed by individual investigators and most accelerator manufacturers now offer 'on-line' portal imaging systems. The commercial devices include T.V. camera-based systems, liquid ionisation chamber systems, and shortly, flat panel systems. The characteristics of these imaging systems will be discussed. In addition, other approaches such as the use of kilovoltage x-ray sources, video monitoring, and ultrasound have been proposed for improving patient positioning. Some of the advantages of these approaches will be discussed. One of the major advantages of on-line portal imaging is that many quantitative techniques have been developed to detect errors in patient positioning. The general approach is to register anatomic structures on a portal image with the same structures on a digitized simulator film. Once the anatomic structures have been registered, any discrepancies in the position of the patient can be identified. One problem is finding a common frame of reference for the simulator and portal images, since the location of the radiation field within the pixel matrix may differ for the two images. As a result, a common frame of reference has to be established before the anatomic structures in the images can be registered - generally by registering radiation field edges identified in the simulator and portal images. In addition, distortions in patient geometry or rotations out of the image plane can confound the image registration techniques. Despite the

  9. On line portal imaging

    International Nuclear Information System (INIS)

    Munro, Peter

    1996-01-01

    Purpose/Objective: The purpose of this presentation is to examine the various imaging devices that have been developed for portal imaging; describe some of the image registration methods that have been developed to determine geometric errors quantitatively; discuss some of the ways that portal imaging has been incorporated into routine clinical practice; describe quality assurance procedures for these devices, and discuss the use of portal imaging devices for dosimetry applications. Discussion: Verification of patient positioning has always been an important aspect of external beam radiation therapy. Over the past decade many portal imaging devices have been developed by individual investigators and most accelerator manufacturers now offer 'on-line' portal imaging systems. The commercial devices can be classified into three categories: T.V. camera-based systems, liquid ionisation chamber systems, and amorphous silicon systems. Many factors influence the quality of images generated by these portal imaging systems. These include factors which are unavoidable (e.g., low subject contrast), factors which depend upon the individual imaging device forming the image (e.g., dose utilisation, spatial resolution) as well as factors which depend upon the characteristics of the linear accelerator irradiating the imaging system (x-ray source size, image magnification). The characteristics of individual imaging systems, such as spatial resolution, temporal response, and quantum utilisation will be discussed. One of the major advantages of on-line portal imaging is that many quantitative techniques have been developed to detect errors in patient positioning. The general approach is to register anatomic structures on a portal image with the same structures on a digitized simulator film. Once the anatomic structures have been registered, any discrepancies in the position of the patient can be identified. However, the task is not nearly as straight-forward as it sounds. One problem

  10. On-Line Maintenance Methodology Development

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyo Won; Kim, Jae Ho; Jae, Moo Sung [Hanyang University, Seoul (Korea, Republic of)

    2012-05-15

    Most of domestic maintenance activities for nuclear power plants are performed while overhaul. Therefore, On-Line Maintenance (OLM) is one of the proper risks informed application techniques for diffusing maintenance burden during overhaul with safety of the plant is secured. The NUMARC 93-01 (Rev.3) presents the OLM state of the art and it provides methodology. This study adopts NUMARC 93-01 (Rev.3) and present OLM. The reference component is Emergency Diesel Generator (EDG) of Ulchin 3, 4

  11. Climate Change Dynamics and Imperatives for Food Security in Nigeria

    Directory of Open Access Journals (Sweden)

    Olumide D. Onafeso

    2016-02-01

    Full Text Available Decadal variability in African rainfall is projected from General Circulation Models (GCMs to continue under elevated greenhouse gas scenarios. Effects on rain intensity, spatio-temporal variability of growing seasons, flooding, drought, and land-use change impose feedbacks at regional-local scales. Yet, empirical knowledge of associated impacts on crop yield is limited; thus, we examined the imperatives for food security in Nigeria. Bivariate correlation and multiple regression suggests impending drought in the northern region where livestock farming is predominant. Relative contributions of climate independent variables in determining crop yield by backward selection procedures with stepwise approach indexed the impacts of annual climate variability by a parameter computed as annual yield minus mean annual yield divided by the standard deviation. Results show Z-distribution approximately 5 to + 5, when 3 indicate impacts significant at 95% confidence levels. In conclusion, we established the interwoven relationship between climatic change and food security.

  12. PLANNING INTELLIGENCE ACTIVITIES IN A DYNAMIC SECURITY ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Anca Pavel

    2016-10-01

    Full Text Available The hypothesis introduced by this article is that, in order to perform intelligence missions and to obtain valuable intelligence for the consumers it is necessary to implement processes and tools to support planning activities. Today's challenges consist rather in the ability of intelligence organizations to identify and initiate new connections, processes and communication flows with other partners operating in the security environment than to plan in their own name secret operations. From this point of view, planning activities should focus on new procedures, at a much more extensive level in order to align institutional efforts beyond the boundaries of their own organization and the national community of information. Also, in order to coordinate intelligence activities, strategic planning must be anchored into a complex analysis of the potential impact of existing and possible future global phenomena that shape the security environment and thus identify better ways of improving results.

  13. On line portal imaging

    International Nuclear Information System (INIS)

    Munro, Peter

    1995-01-01

    Purpose/Objective: The purpose of this presentation is to review the physics of imaging with high energy x-ray beams; examine the various imaging devices that have been developed for portal imaging; describe some of the image registration methods that have been developed to determine errors in patient positioning quantitatively; and discuss some of the ways that portal imaging has been incorporated into routine clinical practice. Verification of patient positioning has always been an important aspect of external beam radiation therapy. Checks of patient positioning have generally been done with film, however, film suffers from a number of drawbacks, such as poor image display and delays due to film development. Over the past decade many portal imaging devices have been developed by individual investigators and most accelerator manufacturers now offer 'on-line' portal imaging systems, which are intended to overcome the limitations of portal films. The commercial devices can be classified into three categories: T.V. camera-based systems, liquid ionisation chamber systems, and amorphous silicon systems. Many factors influence the quality of images generated by these portal imaging systems. These include factors which are unavoidable (e.g., low subject contrast), factors which depend upon the individual imaging device forming the image (e.g., dose utilisation, spatial resolution) as well as factors which depend upon the characteristics of the linear accelerator irradiating the imaging system (x-ray source size, image magnification). The fundamental factors which limit image quality and the characteristics of individual imaging systems, such as spatial resolution, temporal response, and quantum utilisation will be discussed. One of the major advantages of on-line portal imaging is that many quantitative techniques have been developed to detect errors in patient positioning. The general approach is to register anatomic structures on a portal image with the same

  14. On-line monitoring of CO2 production in Lactococcus lactis during physiological pH decrease using membrane inlet mass spectrometry with dynamic pH calibration.

    Science.gov (United States)

    Andersen, Ann Zahle; Lauritsen, Frants Roager; Olsen, Lars Folke

    2005-12-20

    Monitoring CO2 production in systems, where pH is changing with time is hampered by the chemical behavior and pH-dependent volatility of this compound. In this article, we present the first method where the concentration and production rate of dissolved CO2 can be monitored directly, continuously, and quantitatively under conditions where pH changes rapidly ( approximately 2 units in 15 min). The method corrects membrane inlet mass spectrometry (MIMS) measurements of CO2 for pH dependency using on-line pH analysis and an experimentally established calibration model. It is valid within the pH range of 3.5 to 7, despite pH-dependent calibration constants that vary in a non-linear fashion with more than a factor of 3 in this interval. The method made it possible to determine the carbon dioxide production during Lactococcus lactis fermentations, where pH drops up to 3 units during the fermentation. The accuracy was approximately 5%. We used the method to investigate the effect of initial extracellular pH on carbon dioxide production during anarobic glucose fermentation by non-growing Lactocoocus lactis and demonstrated that the carbon dioxide production rate increases considerably, when the initial pH was increased from 6 to 6.8. (c) 2005 Wiley Periodicals, Inc.

  15. A dynamically weighted multi-modal biometric security system

    CSIR Research Space (South Africa)

    Brown, Dane

    2016-09-01

    Full Text Available The face, fingerprint and palmprint feature vectors are automatically extracted and dynamically selected for fusion at the feature-level, toward an improved human identification accuracy. The feature-level has a higher potential accuracy than...

  16. The Dynamics of the Option-Adjusted Spread of Brady Bond Securities

    Directory of Open Access Journals (Sweden)

    Luiz Otavio Calôba

    2003-06-01

    Full Text Available Brady bond securities represent a substantial fraction of emerging markets countries internationally tradable sovereign debt. The credit risk spread above and beyond the U.S. treasury curve for these securities is usually large in size and volatility. Moreover, most Brady bonds carry embedded options that lead to the existence of an Option-Adjusted Spread, OAS, which increase their risk profiles. In this paper we present an empirical study of the dynamics of Brady bonds OAS using a heath, Jarrow and Morton term structure pricing model. The dynamics of the spread shows that the proper risk management and pricing of these securities require the consideration of volatility in addition to the magnitude of the sovereign risk spread. That is, the proper risk measure for these securities would be the pair (OAS, OAS Volatility. A study of implied default probabilities is also presented. Our analysis is illustrated with bonds from Brazil, Argentina, Mexico, Poland, Bulgaria and the Philippines.

  17. An algorithm for on-line price discrimination

    NARCIS (Netherlands)

    D.D.B. van Bragt; D.J.A. Somefun (Koye); E. Kutschinski; J.A. La Poutré (Han)

    2002-01-01

    textabstractThe combination of on-line dynamic pricing with price discrimination can be very beneficial for firms operating on the Internet. We therefore develop an on-line dynamic pricing algorithm that can adjust the price schedule for a good or service on behalf of a firm. This algorithm (a

  18. Dynamic Security Assessment of Western Danish Power System Based on Ensemble Decision Trees

    DEFF Research Database (Denmark)

    Liu, Leo; Bak, Claus Leth; Chen, Zhe

    2014-01-01

    With the increasing penetration of renewable energy resources and other forms of dispersed generation, more and more uncertainties will be brought to the dynamic security assessment (DSA) of power systems. This paper proposes an approach that uses ensemble decision trees (EDT) for online DSA. Fed...... with online wide-area measurement data, it is capable of not only predicting the security states of current operating conditions (OC) with high accuracy, but also indicating the confidence of the security states 1 minute ahead of the real time by an outlier identification method. The results of EDT together...

  19. Dynamic Model of Islamic Hybrid Securities: Empirical Evidence From Malaysia Islamic Capital Market

    Directory of Open Access Journals (Sweden)

    Jaafar Pyeman

    2016-12-01

    Full Text Available Capital structure selection is fundamentally important in corporate financial management as it influence on mutually return and risk to stakeholders. Despite of Malaysia’s position as one of the major players of Islamic Financial Market, there are still lack of studies has been conducted on the capital structure of shariah compliant firms especially related to hybrid securities. The objective of this study is to determine the hybrid securities issuance model among the shariah compliant firms in Malaysia. As such, this study is to expand the literature review by providing comprehensive analysis on the hybrid capital structure and to develop dynamic Islamic hybrid securities model for shariah compliant firms. We use panel data of 50 companies that have been issuing the hybrid securities from the year of 2004- 2012. The outcomes of the studies are based on the dynamic model GMM estimation for the determinants of hybrid securities. Based on our model, risk and growth are considered as the most determinant factors for issuing convertible bond and loan stock. These results suggest that, the firms that have high risk but having good growth prospect will choose hybrid securities of convertible bond. The model also support the backdoor equity listing hypothesis by Stein (1992 where the hybrid securities enable the profitable firms to venture into positive NPV project by issuing convertible bond as it offer lower coupon rate as compare to the normal debt rate

  20. On line routing per mobile phone

    DEFF Research Database (Denmark)

    Bieding, Thomas; Görtz, Simon; Klose, Andreas

    2009-01-01

    On-line routing is concerned with building vehicle routes in an ongoing fashion in such a way that customer requests arriving dynamically in time are efficiently and effectively served. An indispensable prerequisite for applying on-line routing methods is mobile communication technology....... Additionally it is of utmost importance that the employed communication system is suitable integrated with the firm’s enterprise application system and business processes. On basis of a case study, we describe in this paper a system that is cheap and easy to implement due to the use of simple mobile phones...

  1. Dynamic studies of liver and thyroid function with the aid of a gamma camera and an on-line digital computer

    International Nuclear Information System (INIS)

    Raikar, U.R.; Ganatra, R.D.; Samuel, A.M.; Ramanathan, P.; Atmaram, S.H.

    1975-01-01

    Initial experience of dynamic studies with the use of a 16 K digital computer coupled to a scintillation camera is described. 1. A system for scoring bolus was developed taking into account peaking time, the ratio of counts at the peak and at 8 s after the peak and full width at half maximum. Various parameters affecting the boli are discussed. 2. A method is established for finding the slope of net early trapping of sup(99m)TcO 4 in the thyroid after subtraction of extrathyroidal vascular background. This value was found diagnostically useful in establishing the state of thyroid function in 26 patients. 3. Portal extraction half-times of various colloidal radiopharmaceuticals were studied in the first two-minute dynamic study of the liver. This determination provided a method of bioassay for the consistency of the production of colloid for liver scintigraphy. Differences were noted in the trapping time between the right and left lobes of the liver. 4. On the basis of portal extraction half-times, sup(99m)Tc phytate appeared to become colloidal instantaneously after injection into the circulation and its behavior in dynamic studies was more or less identical with that of the sup(99m)Tc-S-colloid. 5. Normal liver has a dual blood supply, while a malignancy in the liver derives blood from only the hepatic artery. Benign lesions such as abscesses and cysts are relatively avascular. This difference in the blood supply of benign and malignant space-occupying lesions in the liver was exploited in an early dynamic study of blood flow to offer a clue to the pathology of cold areas in 170 patients. (author)

  2. Spatio-temporal dynamics of security investments in an interdependent risk environment

    Science.gov (United States)

    Shafi, Kamran; Bender, Axel; Zhong, Weicai; Abbass, Hussein A.

    2012-10-01

    In a globalised world where risks spread through contagion, the decision of an entity to invest in securing its premises from stochastic risks no longer depends solely on its own actions but also on the actions of other interacting entities in the system. This phenomenon is commonly seen in many domains including airline, logistics and computer security and is referred to as Interdependent Security (IDS). An IDS game models this decision problem from a game-theoretic perspective and deals with the behavioural dynamics of risk-reduction investments in such settings. This paper enhances this model and investigates the spatio-temporal aspects of the IDS games. The spatio-temporal dynamics are studied using simple replicator dynamics on a variety of network structures and for various security cost tradeoffs that lead to different Nash equilibria in an IDS game. The simulation results show that the neighbourhood configuration has a greater effect on the IDS game dynamics than network structure. An in-depth empirical analysis of game dynamics is carried out on regular graphs, which leads to the articulation of necessary and sufficient conditions for dominance in IDS games under spatial constraints.

  3. The Dynamics Of Food Security In Sub-Saharan Africa

    Directory of Open Access Journals (Sweden)

    Degye Goshu

    2017-09-01

    Full Text Available This paper examines the dynamics of food supply per capita and undernourishment in Sub-Saharan Africa SSA for a panel of 42 countries. The dataset was constructed from the FAO and the World Bank global databases for four rounds in five-year intervals. Ordinal measures of national food supply status were generated from daily calorie supply per capita of SSA countries. Regional and inter-temporal dynamics of food supply status very low low medium transition rates and the associated forces underpinning this dynamic process were analyzed and stylized by parametric and non-parametric measures. Economic and socio-demographic factors and regional heterogeneities determining the dynamics of food supply situation in SSA were identified by random-effects ordered probit model. The empirical findings indicate that the food supply level of SSA countries was enhanced by agricultural production and industrial value added as a proxy for structural transformation. However it was adversely affected by military expenditure inflation level of consumer prices proportion of rural population age dependency ratio and regional heterogeneities. The likelihood of SSA countries to face incidence of very low low and medium calorie per capita supply was 23 percent 61 percent and 16 percent respectively. To improve the level of food supply per capita and thereby to reduce food poverty situation SSA countries and other stakeholders need to focus on policies designed to enhance economic growth through agricultural production creation of employment opportunities with structural transformation enhancing health care services improving their demographic structure through family planning and controlling national and regional shocks and instabilities.

  4. An energy security management model using quality function deployment and system dynamics

    International Nuclear Information System (INIS)

    Shin, Juneseuk; Shin, Wan-Seon; Lee, Changyong

    2013-01-01

    An energy security management model using quality function deployment (QFD) and system dynamics (SD) is suggested for application in public policymaking in developing economies. Through QFD, experts are guided toward identifying key energy security components, including indicators and policies, and in making these components consistent, focused, and customized for a particular country. Using these components as inputs, we construct an intermediate complex system dynamics model with a minimal number of crucial interactions. Key policies are simulated and evaluated in terms of the improvement of key indicators. Even with little data, our approach provides a coherent, useful, and customized energy security management model to help policymakers more effectively manage national energy security. To demonstrate its advantages, the model is applied to the Korean gas sector as an example. - Highlights: ► We suggest an energy security management model for developing economies. ► We identify a consistent set of key components, indicators and policies by using QFD. ► A coherent and practical system dynamics model based on QFD's output is constructed. ► The model is applied to the Korean gas sector as an example

  5. A secure and efficient audit mechanism for dynamic shared data in cloud storage.

    Science.gov (United States)

    Kwon, Ohmin; Koo, Dongyoung; Shin, Yongjoo; Yoon, Hyunsoo

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data.

  6. A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage

    Science.gov (United States)

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data. PMID:24959630

  7. The design of a dynamic security system at the XXIII Summer Olympics at Los Angeles

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1985-01-01

    The security requirements of the XXIII Summer Olympic Games at Los Angeles provided a challenge unparalleled in the history of the modern games. This paper discusses the dynamics involved and suggests that the principles used are applicable to many of today's security environments. The success of the Intrusion Detection Systems (IDS) employed at each of the three Olympic villages and at the Piper Technical Center is a known fact. How it was accomplished is addressed in a straightforward, systematic way. The paper also recognizes the contributions made by the security community, law enforcement agencies, the government, military, the security industry and RandD organizations. It was a team effort that reflected the spirit of the games and the American ''can-do'' attitude

  8. Technology transfer of dynamic IT outsourcing requires security measures in SLAs

    NARCIS (Netherlands)

    F. Dickmann (Frank); M. Brodhun (Maximilian); J. Falkner (Jürgen); T.A. Knoch (Tobias); U. Sax (Ulrich)

    2010-01-01

    textabstractFor the present efforts in dynamic IT outsourcing environments like Grid or Cloud computing security and trust are ongoing issues. SLAs are a proved remedy to build up trust in outsourcing relations. Therefore, it is necessary to determine whether SLAs can improve trust from the

  9. An adaptive cryptographic accelerator for network storage security on dynamically reconfigurable platform

    Science.gov (United States)

    Tang, Li; Liu, Jing-Ning; Feng, Dan; Tong, Wei

    2008-12-01

    Existing security solutions in network storage environment perform poorly because cryptographic operations (encryption and decryption) implemented in software can dramatically reduce system performance. In this paper we propose a cryptographic hardware accelerator on dynamically reconfigurable platform for the security of high performance network storage system. We employ a dynamic reconfigurable platform based on a FPGA to implement a PowerPCbased embedded system, which executes cryptographic algorithms. To reduce the reconfiguration latency, we apply prefetch scheduling. Moreover, the processing elements could be dynamically configured to support different cryptographic algorithms according to the request received by the accelerator. In the experiment, we have implemented AES (Rijndael) and 3DES cryptographic algorithms in the reconfigurable accelerator. Our proposed reconfigurable cryptographic accelerator could dramatically increase the performance comparing with the traditional software-based network storage systems.

  10. On-line dynamic extraction and automated determination of readily bioavailable hexavalent chromium in solid substrates using micro-sequential injection bead-injection lab-on-valve hyphenated with electrothermal atomic absorption spectrometry

    DEFF Research Database (Denmark)

    Long, Xiangbao; Miró, Manuel; Hansen, Elo Harald

    2006-01-01

    A novel and miniaturized micro-sequential injection bead injection lab-on-valve (μSI-BI-LOV) fractionation system was developed for in-line microcolumn soil extraction under simulated environmental scenarios and accurate monitoring of the content of easily mobilisable hexavalent chromium in soil...... environments at the sub-low parts-per-million level. The flow system integrates dynamic leaching of hexavalent chromium using deionized water as recommended by the German Standard DIN 38414-S4 method; on-line pH adjustment of the extract by a 0.01 mol L-1 Tris-HNO3 buffer solution; isolation of the chromate...... polluted agricultural soil material (San Joaquin Soil-Baseline Trace Element Concentrations) with water-soluble Cr(VI) salts at different concentration levels. The potential of the μSI-BI-LOV set-up with renewable surfaces for flame-AAS determination of high levels of readily bioavailable chromate...

  11. From Off-line to On-line Handwriting Recognition

    NARCIS (Netherlands)

    Lallican, P.; Viard-Gaudin, C.; Knerr, S.

    2004-01-01

    On-line handwriting includes more information on time order of the writing signal and on the dynamics of the writing process than off-line handwriting. Therefore, on-line recognition systems achieve higher recognition rates. This can be concluded from results reported in the literature, and has been

  12. On-line Learning of Prototypes and Principal Components

    NARCIS (Netherlands)

    Biehl, M.; Freking, A.; Hölzer, M.; Reents, G.; Schlösser, E.; Saad, David

    1998-01-01

    We review our recent investigation of on-line unsupervised learning from high-dimensional structured data. First, on-line competitive learning is studied as a method for the identification of prototype vectors from overlapping clusters of examples. Specifically, we analyse the dynamics of the

  13. The dynamics of security provision in the aftermath of war : How international efforts to contribute to security in post-settlement countries relate to national and local perceptions and practices of security

    NARCIS (Netherlands)

    Willems, R.C.

    2013-01-01

    This thesis is based on field research in eastern Democratic Republic of the Congo, Burundi and South Sudan and looks at the dynamics of security provisioning in post-settlement contexts. A particular focus is on international security interventions, which are constituted by Disarmament,

  14. Dynamic security issues in autonomous power systems with increasing wind power penetration

    DEFF Research Database (Denmark)

    Margaris, I.D.; Hansen, Anca Daniela; Sørensen, Poul Ejnar

    2011-01-01

    Asynchronous Generator (DFAG) and Permanent Magnet Synchronous Generator (PMSG) – are applied and issues regarding interaction with the power system are investigated. This paper provides conclusions about the dynamic security of non-interconnected power systems with high wind power penetration based...... on a complete model representation of the individual components of the system; three different types of conventional generators are included in the model, while the protection system is also incorporated. The load shedding following faults is finally discussed....

  15. Dynamic Auditing Protocol for Efficient and Secure Data Storage in Cloud Computing

    OpenAIRE

    J. Noorul Ameen; J. Jamal Mohamed; N. Nilofer Begam

    2014-01-01

    Cloud computing, where the data has been stored on cloud servers and retrieved by users (data consumers) the data from cloud servers. However, there are some security challenges which are in need of independent auditing services to verify the data integrity and safety in the cloud. Until now a numerous methods has been developed for remote integrity checking whichever only serve for static archive data and cannot be implemented to the auditing service if the data in the cloud is being dynamic...

  16. Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes

    Directory of Open Access Journals (Sweden)

    Qinghe Du

    2018-01-01

    Full Text Available The Internet of Things (IoT is expected to accommodate every object which exists in this world or likely to exist in the near future. The enormous scale of the objects is challenged by big security concerns, especially for common information dissemination via multicast services, where the reliability assurance for multiple multicast users at the cost of increasing redundancy and/or retransmissions also benefits eavesdroppers in successfully decoding the overheard signals. The objective of this work is to address the security challenge present in IoT multicast applications. Specifically, with the presence of the eavesdropper, an adaptive fountain code design is proposed in this paper to enhance the security for multicast in IoT. The main novel features of the proposed scheme include two folds: (i dynamical encoding scheme which can effectively decrease intercept probability at the eavesdropper; (ii increasing the transmission efficiency compared with the conventional nondynamical design. The analysis and simulation results show that the proposed scheme can effectively enhance information security while achieving higher transmission efficiency with a little accredited complexity, thus facilitating the secured wireless multicast transmissions over IoT.

  17. Comparison of Current On-line Payment Technologies

    OpenAIRE

    Mandadi, Ravi

    2006-01-01

    The purpose of this thesis work was to make a survey of current on-line payment technologies and find out which are they and how do they work? Compare and analyze them from a security point of view, as well as a usability point of view. What is good? What is bad? What is lacking? To achieve this purpose, an overview of the current on-line payment technologies was acquired through academic books and papers, Internet sites, magazines. Basic cryptographic and security related techniques were stu...

  18. CERN Video News on line

    CERN Multimedia

    2003-01-01

    The latest CERN video news is on line. In this issue : an interview with the Director General and reports on the new home for the DELPHI barrel and the CERN firemen's spectacular training programme. There's also a vintage video news clip from 1954. See: www.cern.ch/video or Bulletin web page

  19. On-line moisture analysis

    CERN Document Server

    Cutmore, N G

    2002-01-01

    Measurement of the moisture content of iron ore has become a key issue for controlling moisture additions for dust suppression. In most cases moisture content is still determined by manual or automatic sampling of the ore stream, followed by conventional laboratory analysis by oven drying. Although this procedure enables the moisture content to be routinely monitored, it is too slow for control purposes. This has generated renewed interest in on-line techniques for the accurate and rapid measurement of moisture in iron ore on conveyors. Microwave transmission techniques have emerged over the past 40 years as the dominant technology for on-line measurement of moisture in bulk materials, including iron ores. Alternative technologies have their limitations. Infra-red analysers are used in a variety of process industries, but rely on the measurement of absorption by moisture in a very thin surface layer. Consequently such probes may be compromised by particle size effects and biased presentation of the bulk mater...

  20. Two Stage Secure Dynamic Load Balancing Architecture for SIP Server Clusters

    Directory of Open Access Journals (Sweden)

    G. Vennila

    2014-08-01

    Full Text Available Session Initiation Protocol (SIP is a signaling protocol emerged with an aim to enhance the IP network capabilities in terms of complex service provision. SIP server scalability with load balancing has a greater concern due to the dramatic increase in SIP service demand. Load balancing of session method (request/response and security measures optimizes the SIP server to regulate of network traffic in Voice over Internet Protocol (VoIP. Establishing a honeywall prior to the load balancer significantly reduces SIP traffic and drops inbound malicious load. In this paper, we propose Active Least Call in SIP Server (ALC_Server algorithm fulfills objectives like congestion avoidance, improved response times, throughput, resource utilization, reducing server faults, scalability and protection of SIP call from DoS attacks. From the test bed, the proposed two-tier architecture demonstrates that the ALC_Server method dynamically controls the overload and provides robust security, uniform load distribution for SIP servers.

  1. A dynamic mathematical test of international property securities bubbles and crashes

    Science.gov (United States)

    Hui, Eddie C. M.; Zheng, Xian; Wang, Hui

    2010-04-01

    This study investigates property securities bubbles and crashes by using a dynamic mathematical methodology developed from the previous research (Watanabe et al. 2007a, b [31,32]). The improved model is used to detect the bubble and crash periods in five international countries/cities (namely, United States, United Kingdom, Japan, Hong Kong and Singapore) from Jan, 2000 to Oct, 2008. By this model definition, we are able to detect the beginning of each bubble period even before it bursts. Meanwhile, the empirical results show that most of property securities markets experienced bubble periods between 2003 and 2007, and crashes happened in Apr 2008 triggered by the Subprime Mortgage Crisis of US. In contrast, Japan suffered the shortest bubble period and no evidence has documented the existence of crash there.

  2. Dynamic Group Management Scheme for Sustainable and Secure Information Sensing in IoT

    Directory of Open Access Journals (Sweden)

    Hyungjoo Kim

    2016-10-01

    Full Text Available The services provided to users in the environment associated with the Internet of Things (hereinafter referred to as IoT begin with the information collected from sensors. It is imperative to transmit high-quality sensor data for providing better services. It is also required to collect data only from those authenticated sensors. Moreover, it is imperative to collect high-quality data on a sustainable and continuous basis in order to provide services anytime and anywhere in the IoT environment. Therefore, high-quality, authenticated sensor networks should be constructed. The most prominent routing protocol to enhance the energy consumption efficiency for the sustainable data collection in a sensor network is the LEACH routing protocol. The LEACH routing protocol transmits sensor data by measuring the energy of sensors and allocating sensor groups dynamically. However, these sensor networks have vulnerabilities such as key leakage, eavesdropping, replay attack and relay attack, given the nature of wireless network communication. A large number of security techniques have been studied in order to solve these vulnerabilities. Nonetheless, these studies still cannot support the dynamic sensor group allocation of the LEACH routing protocol. Furthermore, they are not suitable for the sensor nodes whose hardware computing ability and energy resources are limited. Therefore, this paper proposed a group sensor communication protocol that utilizes only the four fundamental arithmetic operations and logical operation for the sensor node authentication and secure data transmission. Through the security analysis, this paper verified that the proposed scheme was secure to the vulnerabilities resulting from the nature of wireless network communication. Moreover, this paper verified through the performance analysis that the proposed scheme could be utilized efficiently.

  3. Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security

    Directory of Open Access Journals (Sweden)

    Lu Rao

    2018-01-01

    Full Text Available Remote data auditing service is important for mobile clients to guarantee the intactness of their outsourced data stored at cloud side. To relieve mobile client from the nonnegligible burden incurred by performing the frequent data auditing, more and more literatures propose that the execution of such data auditing should be migrated from mobile client to third-party auditor (TPA. However, existing public auditing schemes always assume that TPA is reliable, which is the potential risk for outsourced data security. Although Outsourced Proofs of Retrievability (OPOR have been proposed to further protect against the malicious TPA and collusion among any two entities, the original OPOR scheme applies only to the static data, which is the limitation that should be solved for enabling data dynamics. In this paper, we design a novel authenticated data structure called bv23Tree, which enables client to batch-verify the indices and values of any number of appointed leaves all at once for efficiency. By utilizing bv23Tree and a hierarchical storage structure, we present the first solution for Dynamic OPOR (DOPOR, which extends the OPOR model to support dynamic updates of the outsourced data. Extensive security and performance analyses show the reliability and effectiveness of our proposed scheme.

  4. On line ultrasonic integrated backscatter

    International Nuclear Information System (INIS)

    Landini, L.; Picano, E.; Mazzarisi, A.; Santarelli, F.; Benassi, A.; De Pieri, G.

    1988-01-01

    A new equipment for on-line evaluation of index based on two-dimensional integrated backscatter from ultrasonic images is described. The new equipment is fully integrated into a B-mode ultrasonic apparatus which provides a simultaneous display of conventional information together with parameters of tissue characterization. The system has been tested with a backscattering model of microbubbles in polysaccharide solution, characterized by a physiological exponential time decay. An exponential fitting to the experimental data was performed which yielded r=0.95

  5. On-line nuclear orientation

    International Nuclear Information System (INIS)

    Krane, K.S.

    1990-01-01

    This grant has as its overall goal the pursuit of on-line nuclear orientation experiments for the purpose of eliciting details of nuclear structure from the decays of neutron-deficient nuclei, such as those produced by the Holifield Heavy-Ion Research Facility at Oak Ridge and extracted by the UNISOR Isotope Separator. This paper discusses: refrigerator development; the decay of 184 Au; the decay of 191 Hg to 191 Au; the decay of 189 Pt to 189 Ir; the decays of 109,111 Pd; the decay of 172 Er; and solid angle corrections

  6. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  7. On-line Ciphers and the Hash-CBC Constructions

    DEFF Research Database (Denmark)

    Bellare, M.; Boldyreva, A.; Knudsen, Lars Ramkilde

    2012-01-01

    We initiate a study of on-line ciphers. These are ciphers that can take input plaintexts of large and varying lengths and will output the i th block of the ciphertext after having processed only the first i blocks of the plaintext. Such ciphers permit length-preserving encryption of a data stream...... with only a single pass through the data. We provide security definitions for this primitive and study its basic properties. We then provide attacks on some possible candidates, including CBC with fixed IV. We then provide two constructions, HCBC1 and HCBC2, based on a given block cipher E and a family...... of computationally AXU functions. HCBC1 is proven secure against chosen-plaintext attacks assuming that E is a PRP secure against chosen-plaintext attacks, while HCBC2 is proven secure against chosen-ciphertext attacks assuming that E is a PRP secure against chosen-ciphertext attacks....

  8. Asynchronous anti-noise hyper chaotic secure communication system based on dynamic delay and state variables switching

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Hongjun [Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024 (China); Weifang Vocational College, Weifang 261041 (China); Wang, Xingyuan, E-mail: wangxy@dlut.edu.cn [Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024 (China); Zhu, Quanlong [Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024 (China)

    2011-07-18

    This Letter designs an asynchronous hyper chaotic secure communication system, which possesses high stability against noise, using dynamic delay and state variables switching to ensure the high security. The relationship between the bit error ratio (BER) and the signal-to-noise ratio (SNR) is analyzed by simulation tests, the results show that the BER can be ensured to reach zero by proportionally adjusting the amplitudes of the state variables and the noise figure. The modules of the transmitter and receiver are implemented, and numerical simulations demonstrate the effectiveness of the system. -- Highlights: → Asynchronous anti-noise hyper chaotic secure communication system. → Dynamic delay and state switching to ensure the high security. → BER can reach zero by adjusting the amplitudes of state variables and noise figure.

  9. On-line moisture analysis

    International Nuclear Information System (INIS)

    Cutmore, N.G.; Mijak, D.G

    2002-01-01

    Measurement of the moisture content of iron ore has become a key issue for controlling moisture additions for dust suppression. In most cases moisture content is still determined by manual or automatic sampling of the ore stream, followed by conventional laboratory analysis by oven drying. Although this procedure enables the moisture content to be routinely monitored, it is too slow for control purposes. This has generated renewed interest in on-line techniques for the accurate and rapid measurement of moisture in iron ore on conveyors. Microwave transmission techniques have emerged over the past 40 years as the dominant technology for on-line measurement of moisture in bulk materials, including iron ores. Alternative technologies have their limitations. Infra-red analysers are used in a variety of process industries, but rely on the measurement of absorption by moisture in a very thin surface layer. Consequently such probes may be compromised by particle size effects and biased presentation of the bulk material. Nuclear-based analysers measure the total hydrogen content in the sample and do not differentiate between free and combined moisture. Such analysers may also be sensitive to material presentation and elemental composition. Very low frequency electromagnetic probes, such as capacitance or conductance probes, operate in the frequency region where the DC conductivity dominates much of the response, which is a function not only of moisture content but also of ionic composition and chemistry. These problems are overcome using microwave transmission techniques, which also have the following advantages, as a true bulk moisture analysis is obtained, because a high percentage of the bulk material is analysed; the moisture estimate is mostly insensitive to any biased presentation of moisture, for example due to stratification of bulk material with different moisture content and because no physical contact is made between the sensor and the bulk material. This is

  10. Water security, risk, and economic growth: Insights from a dynamical systems model

    Science.gov (United States)

    Dadson, Simon; Hall, Jim W.; Garrick, Dustin; Sadoff, Claudia; Grey, David; Whittington, Dale

    2017-08-01

    Investments in the physical infrastructure, human capital, and institutions needed for water resources management have been noteworthy in the development of most civilizations. These investments affect the economy in two distinct ways: (i) by improving the factor productivity of water in multiple economic sectors, especially those that are water intensive such as agriculture and energy and (ii) by reducing acute and chronic harmful effects of water-related hazards like floods, droughts, and water-related diseases. The need for capital investment to mitigate risks and promote economic growth is widely acknowledged, but prior conceptual work on the relationship between water-related investments and economic growth has focused on the productive and harmful roles of water in the economy independently. Here the two influences are combined using a simple, dynamical systems model of water-related investment, risk, and growth. In cases where initial water security is low, initial investment in water-related assets enables growth. Without such investment, losses due to water-related hazards exert a drag on economic growth and may create a poverty trap. The presence and location of the poverty trap is context-specific and depends on the exposure of productive water-related assets to water-related risk. Exogenous changes in water-related risk can potentially push an economy away from a growth path toward a poverty trap. Our investigation shows that an inverted-U-shaped investment relation between the level of investment in water security and the current level of water security leads to faster rates of growth than the alternatives that we consider here, and that this relation is responsible for the "S"-curve that is posited in the literature. These results illustrate the importance of accounting for environmental and health risks in economic models and offer insights for the design of robust policies for investment in water-related productive assets to manage risk, in the face

  11. The RAppArmor Package: Enforcing Security Policies in R Using Dynamic Sandboxing on Linux

    Directory of Open Access Journals (Sweden)

    Jeroen Ooms

    2013-11-01

    Full Text Available The increasing availability of cloud computing and scientific super computers brings great potential for making R accessible through public or shared resources. This allows us to efficiently run code requiring lots of cycles and memory, or embed R functionality into, e.g., systems and web services. However some important security concerns need to be addressed before this can be put in production. The prime use case in the design of R has always been a single statistician running R on the local machine through the interactive console. Therefore the execution environment of R is entirely unrestricted, which could result in malicious behavior or excessive use of hardware resources in a shared environment. Properly securing an R process turns out to be a complex problem. We describe various approaches and illustrate potential issues using some of our personal experiences in hosting public web services. Finally we introduce the RAppArmor package: a Linux based reference implementation for dynamic sandboxing in R on the level of the operating system.

  12. On-line data display

    Science.gov (United States)

    Lang, Sherman Y. T.; Brooks, Martin; Gauthier, Marc; Wein, Marceli

    1993-05-01

    A data display system for embedded realtime systems has been developed for use as an operator's user interface and debugging tool. The motivation for development of the On-Line Data Display (ODD) have come from several sources. In particular the design reflects the needs of researchers developing an experimental mobile robot within our laboratory. A proliferation of specialized user interfaces revealed a need for a flexible communications and graphical data display system. At the same time the system had to be readily extensible for arbitrary graphical display formats which would be required for data visualization needs of the researchers. The system defines a communication protocol transmitting 'datagrams' between tasks executing on the realtime system and virtual devices displaying the data in a meaningful way on a graphical workstation. The communication protocol multiplexes logical channels on a single data stream. The current implementation consists of a server for the Harmony realtime operating system and an application written for the Macintosh computer. Flexibility requirements resulted in a highly modular server design, and a layered modular object- oriented design for the Macintosh part of the system. Users assign data types to specific channels at run time. Then devices are instantiated by the user and connected to channels to receive datagrams. The current suite of device types do not provide enough functionality for most users' specialized needs. Instead the system design allows the creation of new device types with modest programming effort. The protocol, design and use of the system are discussed.

  13. On-line computing in a classified environment

    International Nuclear Information System (INIS)

    O'Callaghan, P.B.

    1982-01-01

    Westinghouse Hanford Company (WHC) recently developed a Department of Energy (DOE) approved real-time, on-line computer system to control nuclear material. The system simultaneously processes both classified and unclassified information. Implementation of this system required application of many security techniques. The system has a secure, but user friendly interface. Many software applications protect the integrity of the data base from malevolent or accidental errors. Programming practices ensure the integrity of the computer system software. The audit trail and the reports generation capability record user actions and status of the nuclear material inventory

  14. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  15. Dynamical Analysis, Synchronization, Circuit Design, and Secure Communication of a Novel Hyperchaotic System

    Directory of Open Access Journals (Sweden)

    Li Xiong

    2017-01-01

    Full Text Available This paper is devoted to introduce a novel fourth-order hyperchaotic system. The hyperchaotic system is constructed by adding a linear feedback control level based on a modified Lorenz-like chaotic circuit with reduced number of amplifiers. The local dynamical entities, such as the basic dynamical behavior, the divergence, the eigenvalue, and the Lyapunov exponents of the new hyperchaotic system, are all investigated analytically and numerically. Then, an active control method is derived to achieve global chaotic synchronization of the novel hyperchaotic system through making the synchronization error system asymptotically stable at the origin based on Lyapunov stability theory. Next, the proposed novel hyperchaotic system is applied to construct another new hyperchaotic system with circuit deformation and design a new hyperchaotic secure communication circuit. Furthermore, the implementation of two novel electronic circuits of the proposed hyperchaotic systems is presented, examined, and realized using physical components. A good qualitative agreement is shown between the simulations and the experimental results around 500 kHz and below 1 MHz.

  16. Security Enhancement of Knowledge-based User Authentication through Keystroke Dynamics

    Directory of Open Access Journals (Sweden)

    Roy Soumen

    2016-01-01

    Full Text Available Keystroke Dynamics is a behavioural biometrics characteristic in Biometric science, which solve the issues in user identification or verification. In Knowledge-based user authentication technique, we compromise with PIN or password which is unsafe due to different type of attacks. It is good to choose password with the combination of upper and lower case letter with some digits and symbols, but which is very hard to remember or generally we forget to distinguish those passwords for different access control systems. Our system not only takes the users’ entered texts but their typing style is also account for. In our experiment, we have not taken hard password type texts, we have chosen some daily used words where users are habituated and comfortable at typing and we obtained the consisting typing pattern. Different distance-based and data mining algorithms we have applied on collected typing pattern and obtained impressive results. As per our experiment, if we use keystroke dynamics in existing knowledge based user authentication system with minimum of five daily used common texts then it increases the security level up to 97.6% to 98.2% (if we remove some of the irrelevant feature sets.

  17. The complexity of an investment competition dynamical model with imperfect information in a security market

    International Nuclear Information System (INIS)

    Xin Baogui; Ma Junhai; Gao Qin

    2009-01-01

    We present a nonlinear discrete dynamical model of investment competition with imperfect information for N heterogeneous oligopolists in a security market. In this paper, our focus is on a given three-dimensional model which exhibits highly rich dynamical behaviors. Based on Wen's Hopf bifurcation criterion [Wen GL. Criterion to identify Hopf bifurcations in maps of arbitrary dimension. Phys Rev E 2005;72:026201-3; Wen GL, Xu DL, Han X. On creation of Hopf bifurcations in discrete-time nonlinear systems. Chaos 2002;12(2):350-5] and Kuznetsov's normal form theory [Kuznetsov YA. Elements of applied bifurcation theory. New York: Springer-Verlag; 1998. p. 125-37], we study the model's stability, criterion and direction of Neimark-Sacker bifurcation. Moreover, we numerically simulate a complexity evolution route: fixed point, closed invariant curve, double closed invariant curves, fourfold closed invariant curves, strange attractor, period-3 closed invariant curve, period-3 2-tours, period-4 closed invariant curve, period-4 2-tours.

  18. SAInt – A novel quasi-dynamic model for assessing security of supply in coupled gas and electricity transmission networks

    NARCIS (Netherlands)

    Pambour, Kwabena Addo; Cakir Erdener, Burcin; Bolado-Lavin, Ricardo; Dijkema, Gerhard P.J.

    2017-01-01

    The integration of renewable energy sources into existing electric power systems is connected with an increased interdependence between natural gas and electricity transmission networks. To analyse this interdependence and its impact on security of supply, we developed a novel quasi-dynamic

  19. Dynamic Personal Identity and the Dynamic Identity Grid: How Theory and Concept Can Transform Information into Knowledge and Secure the American Homeland

    Science.gov (United States)

    2008-09-01

    80 Figure 12. Dynamic Identity Grid Strategy Canvas ..........................................................81 Figure 13. Hurdles to...GIG Global Information Grid HSPD Homeland Security Presidential Directive IAFIS Integrated Automated Fingerprint Identification System IP...recognizing a person based on a physiological or behavioral characteristic. Biometric features that can be measured include: facial, fingerprint , hand

  20. Development and Application of a New Grey Dynamic Hierarchy Analysis System (GDHAS) for Evaluating Urban Ecological Security

    Science.gov (United States)

    Shao, Chaofeng; Tian, Xiaogang; Guan, Yang; Ju, Meiting; Xie, Qiang

    2013-01-01

    Selecting indicators based on the characteristics and development trends of a given study area is essential for building a framework for assessing urban ecological security. However, few studies have focused on how to select the representative indicators systematically, and quantitative research is lacking. We developed an innovative quantitative modeling approach called the grey dynamic hierarchy analytic system (GDHAS) for both the procedures of indicator selection and quantitative assessment of urban ecological security. Next, a systematic methodology based on the GDHAS is developed to assess urban ecological security comprehensively and dynamically. This assessment includes indicator selection, driving force-pressure-state-impact-response (DPSIR) framework building, and quantitative evaluation. We applied this systematic methodology to assess the urban ecological security of Tianjin, which is a typical coastal super megalopolis and the industry base in China. This case study highlights the key features of our approach. First, 39 representative indicators are selected for the evaluation index system from 62 alternative ones available through the GDHAS. Second, the DPSIR framework is established based on the indicators selected, and the quantitative assessment of the eco-security of Tianjin is conducted. The results illustrate the following: urban ecological security of Tianjin in 2008 was in alert level but not very stable; the driving force and pressure subsystems were in good condition, but the eco-security levels of the remainder of the subsystems were relatively low; the pressure subsystem was the key to urban ecological security; and 10 indicators are defined as the key indicators for five subsystems. These results can be used as the basis for urban eco-environmental management. PMID:23698700

  1. A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system

    Directory of Open Access Journals (Sweden)

    Vanga Odelu

    2016-01-01

    Full Text Available With the rapid growth of the Internet, a lot of electronic patient records (EPRs have been developed for e-medicine systems. The security and privacy issues of EPRs are important for the patients in order to understand how the hospitals control the use of their personal information, such as name, address, e-mail, medical records, etc. of a particular patient. Recently, Lee et al. proposed a simple group password-based authenticated key agreement protocol for the integrated EPR information system (SGPAKE. However, in this paper, we show that Lee et al.’s protocol is vulnerable to the off-line weak password guessing attack and as a result, their scheme does not provide users’ privacy. To withstand this security weakness found in Lee et al.’s scheme, we aim to propose an effective dynamic group password-based authenticated key exchange scheme for the integrated EPR information system, which retains the original merits of Lee et al.’s scheme. Through the informal and formal security analysis, we show that our scheme provides users’ privacy, perfect forward security and known-key security, and also protects online and offline password guessing attacks. Furthermore, our scheme efficiently supports the dynamic group password-based authenticated key agreement for the integrated EPR information system. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool and show that our scheme is secure against passive and active attacks.

  2. On-line learning in radial basis functions networks

    OpenAIRE

    Freeman, Jason; Saad, David

    1997-01-01

    An analytic investigation of the average case learning and generalization properties of Radial Basis Function Networks (RBFs) is presented, utilising on-line gradient descent as the learning rule. The analytic method employed allows both the calculation of generalization error and the examination of the internal dynamics of the network. The generalization error and internal dynamics are then used to examine the role of the learning rate and the specialization of the hidden units, which gives ...

  3. Considerations in applying on-line IC techniques to BWR's

    International Nuclear Information System (INIS)

    Kaleda, R.J.

    1992-01-01

    Ion-Chromatography (IC) has moved from its traditional role as a laboratory analytical tool to a real time, dynamic, on-line measurement device to follow ppb and sub-ppb concentrations of deleterious impurities in nuclear power plants. Electric Power Research Institute (EPRI), individual utilities, and industry all have played significant roles in effecting the transition. This paper highlights considerations and the evolution in current on-line Ion Chromatography systems. The first applications of on-line techniques were demonstrated by General Electric (GE) under EPRI sponsorship at Rancho Seco (1980), Calvert Cliffs, and McGuire nuclear units. The primary use was for diagnostic purposes. Today the on-line IC applications have been expanded to include process control and routine plant monitoring. Current on-line IC's are innovative in design, promote operational simplicity, are modular for simplified maintenance and repair, and use field-proven components which enhance reliability. Conductivity detection with electronic or chemical suppression and spectrometric detection techniques are intermixed in applications. Remote multi-point sample systems have addressed memory effects. Early applications measured ionic species in the part per billion range. Today reliable part per trillion measurements are common for on-line systems. Current systems are meeting the challenge of EPRI guideline requirements. Today's on-line IC's, with programmed sampling systems, monitor fluid streams throughout a power plant, supplying data that can be trended, stored and retrieved easily. The on-line IC has come of age. Many technical challenges were overcome to achieve today's IC

  4. A new algorithm for combined dynamic economic emission dispatch with security constraints

    International Nuclear Information System (INIS)

    Arul, R.; Velusami, S.; Ravi, G.

    2015-01-01

    The primary objective of CDEED (combined dynamic economic emission dispatch) problem is to determine the optimal power generation schedule for the online generating units over a time horizon considered and simultaneously minimizing the emission level and satisfying the generators and system constraints. The CDEED problem is bi-objective optimization problem, where generation cost and emission are considered as two competing objective functions. This bi-objective CDEED problem is represented as a single objective optimization problem by assigning different weights for each objective functions. The weights are varied in steps and for each variation one compromise solution are generated and finally fuzzy based selection method is used to select the best compromise solution from the set of compromise solutions obtained. In order to reflect the test systems considered as real power system model, the security constraints are also taken into account. Three new versions of DHS (differential harmony search) algorithms have been proposed to solve the CDEED problems. The feasibility of the proposed algorithms is demonstrated on IEEE-26 and IEEE-39 bus systems. The result obtained by the proposed CSADHS (chaotic self-adaptive differential harmony search) algorithm is found to be better than EP (evolutionary programming), DHS, and the other proposed algorithms in terms of solution quality, convergence speed and computation time. - Highlights: • In this paper, three new algorithms CDHS, SADHS and CSADHS are proposed. • To solve DED with emission, poz's, spinning reserve and security constraints. • Results obtained by the proposed CSADHS algorithm are better than others. • The proposed CSADHS algorithm has fast convergence characteristic than others

  5. The contemporary dynamics of Sino-Indian relations: Examining maritime security, economics, energy and elite dialogue

    Science.gov (United States)

    Athwal, Amardeep

    This dissertation examines the modern-day dynamics of the Sino-Indian relationship---with a particular focus on issues relating to maritime security, economics, energy and elite bilateral dialogue. In exploring the contemporary nature of the Sino-Indian relationship, the dissertation also seeks to assess the accuracy of predominant neorealist accounts of the Sino-Indian relationship. Since the 1962 Sino-Indian War, most analysts have continued to emphasize the conflictual and competitive elements within the Sino-Indian relationship. The dissertation first explores the crucial post-independence history of Sino-Indian relations to provide the appropriate contextual background (chapter one). Thereafter, the dissertation explores the geopolitical significance of the Indian Ocean in light of soaring (global) energy demands. This then leads into an analysis of China and India's naval modernization and China's strategic partnership with Pakistan and Myanmar (chapter two). While acknowledging the credibility of neorealist insights in the realm of maritime security by detailing China and India's naval buildup and naval strategy, overall, it is found that the security dilemma argument is overstated. There is both a lack of threat perception and the existence of alternate explanations for both Chinese and Indian activities in Southern Asia. The dissertation then moves on to explore the positive elements within the Sino-Indian relationship---growing economic interdependence, energy convergence and elite consensus. In the economic realm (chapter three) it is found that Sino-Indian bilateral trade is increasingly being framed institutionally and rapidly expanding every year. The areas where the Sino-Indian economic relationship could be fruitfully expanded are traced and the great potential of bilateral trade is discussed. Thereafter, the dissertation highlights how China and India are beginning to coordinate energy policy (chapter four) as well as the growing political will

  6. The Dynamic VPN Controller. Secure Information Sharing in a Coalition Environment

    Science.gov (United States)

    2005-03-01

    coalitionName=" COALA "> <Security>Class A</Security> <Site siteName="SITE1"> <Remote> <Hostname>dvc.site1.com</Hostname> <IPAddress...34 COALA "> <Security>Class A</Security> <Site siteName="SITE1"> <Remote> <Hostname>dvc.site1.com</Hostname> <IPAddress>10.1.1.1

  7. Adaptative synchronization in multi-output fractional-order complex dynamical networks and secure communications

    Science.gov (United States)

    Mata-Machuca, Juan L.; Aguilar-López, Ricardo

    2018-01-01

    This work deals with the adaptative synchronization of complex dynamical networks with fractional-order nodes and its application in secure communications employing chaotic parameter modulation. The complex network is composed of multiple fractional-order systems with mismatch parameters and the coupling functions are given to realize the network synchronization. We introduce a fractional algebraic synchronizability condition (FASC) and a fractional algebraic identifiability condition (FAIC) which are used to know if the synchronization and parameters estimation problems can be solved. To overcome these problems, an adaptative synchronization methodology is designed; the strategy consists in proposing multiple receiver systems which tend to follow asymptotically the uncertain transmitters systems. The coupling functions and parameters of the receiver systems are adjusted continually according to a convenient sigmoid-like adaptative controller (SLAC), until the measurable output errors converge to zero, hence, synchronization between transmitter and receivers is achieved and message signals are recovered. Indeed, the stability analysis of the synchronization error is based on the fractional Lyapunov direct method. Finally, numerical results corroborate the satisfactory performance of the proposed scheme by means of the synchronization of a complex network consisting of several fractional-order unified chaotic systems.

  8. Dynamic (2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication

    International Nuclear Information System (INIS)

    Lai Hong; Xiao Jing-Hua; Mehmet, Orgun A.; Josef, Pieprzyk; Xue Li-Yin

    2015-01-01

    In this paper, we show that a (2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely. (paper)

  9. Integrated assessment and scenarios simulation of urban water security system in the southwest of China with system dynamics analysis.

    Science.gov (United States)

    Yin, Su; Dongjie, Guan; Weici, Su; Weijun, Gao

    2017-11-01

    The demand for global freshwater is growing, while global freshwater available for human use is limited within a certain time and space. Its security has significant impacts on both the socio-economic system and ecological system. Recently, studies have focused on the urban water security system (UWSS) in terms of either water quantity or water quality. In this study, water resources, water environment, and water disaster issues in the UWSS were combined to establish an evaluation index system with system dynamics (SD) and geographic information systems (GIS). The GIS method performs qualitative analysis from the perspective of the spatial dimension; meanwhile, the SD method performs quantitative calculation about related water security problems from the perspective of the temporal dimension. We established a UWSS model for Guizhou province, China to analyze influencing factors, main driving factors, and system variation law, by using the SD method. We simulated the water security system from 2005 to 2025 under four scenarios (Guiyang scenario, Zunyi scenario, Bijie scenario and combined scenario). The results demonstrate that: (1) the severity of water security in cities is ranked as follows: three cities are secure in Guizhou province, four cities are in basic security and two cities are in a situation of insecurity from the spatial dimension of GIS through water security synthesis; and (2) the major driving factors of UWSS in Guizhou province include agricultural irrigation water demand, soil and water losses area, a ratio increase to the standard of water quality, and investment in environmental protection. A combined scenario is the best solution for UWSS by 2025 in Guizhou province under the four scenarios from the temporal dimension of SD. The results of this study provide a useful suggestion for the management of freshwater for the cities of Guizhou province in southwest China.

  10. On-Line Impact Load Identification

    Directory of Open Access Journals (Sweden)

    Krzysztof Sekuła

    2013-01-01

    Full Text Available The so-called Adaptive Impact Absorption (AIA is a research area of safety engineering devoted to problems of shock absorption in various unpredictable scenarios of collisions. It makes use of smart technologies (systems equipped with sensors, controllable dissipaters and specialised tools for signal processing. Examples of engineering applications for AIA systems are protective road barriers, automotive bumpers or adaptive landing gears. One of the most challenging problems for AIA systems is on-line identification of impact loads, which is crucial for introducing the optimum real-time strategy of adaptive impact absorption. This paper presents the concept of an impactometer and develops the methodology able to perform real-time impact load identification. Considered dynamic excitation is generated by a mass M1 impacting with initial velocity V0. An analytical formulation of the problem, supported with numerical simulations and experimental verifications is presented. Two identification algorithms based on measured response of the impacted structure are proposed and discussed. Finally, a concept of the AIA device utilizing the idea of impactometer is briefly presented.

  11. Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report

    Energy Technology Data Exchange (ETDEWEB)

    Wheeler, Timothy A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Denman, Matthew R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Williams, R. A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Martin, Nevin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jankovsky, Zachary Kyle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-09-01

    Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities. iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber exploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by coupling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated impact and the associated degree of difficulty to achieve the attack vector) on accident management establishes a technical risk informed framework for developing effective cyber security controls for nuclear power.

  12. Robust on-line monitoring of biogas processes; Robusta maettekniker on-line foer optimerad biogasproduktion

    Energy Technology Data Exchange (ETDEWEB)

    Nordberg, Aake; Hansson, Mikael; Kanerot, Mija; Krozer, Anatol; Loefving, Bjoern; Sahlin, Eskil

    2010-03-15

    project showed that pH-adjustment with Na{sub 3}PO{sub 4} can be a way of compensating for the losses of volatile compounds (up to 20% of VS), which occurs when standardized reference methods are used. This is a fundamental problem and requires further research. Monitoring of a laboratory-scale anaerobic digester with NIR showed that a previously developed multivariate model could predict propionate concentrations (R2= 0,92; RMSEP 0,39 g/L) in the interval 0-5 g/L, which is a relevant interval for inhibition (limit ca 3 g/L). A commercial FT-NIR instrument was subsequently installed at the production plant. However, the organic loading was decreased during the evaluation period due to process disturbances, at which the dynamic of the process was not in the range needed for prediction of e.g. propionate. Measurements and evaluation will continue during normal conditions after the completion of this project. Evaluation of a potentiometric sensor for ammonia with potential for on-line application showed low stability and a need for daily calibration, which therefore did not fulfill the requested demand. The project has demonstrated technologies with significant potential for on-line monitoring at production scale facilities, thus improving the knowledge base for making important decisions. Knowledge about on-line implementation has increased, and important insights into the limitations of standardized reference methods and substrate characteristics have been achieved. Instrument suppliers have in general a limited insight in the conditions at a biogas plant, which suggests that this type of WR-financed project is important for development in the area

  13. Indonesian CPO availability analysis to support food and energy security: a system dynamic approach

    Science.gov (United States)

    Rahman, T.; Arkeman, Y.; Setyaningsih, D.; Saparita, R.

    2017-05-01

    The development of biofuels could be a solution to overcome the energy problem. One of biofuel that has the potential to be developed, namely palm oil biodiesel that is also the raw material for food. As a provider of CPO raw materials, the production of palm biodiesel could trigger competitions, from biofuels demand growth and utilization of agricultural resources. Thus, it needs to be analyzed to determine the adequency of CPO supply to fulfill the need of food and policy recomendation which sets the development of palm oil biodiesel can be synergies with food need especially for the supply of raw material CPO. To obtain the optimal policy in the synergy between the raw material of CPO for food and energy is a need to establish some policy scenarios that allow to be applied and then chosen the best policy alternative of all scenarios. The purpose of this research were to : 1) analysis the availability of CPO to meet the needs of food and energy, 2) provide policy recommendation with regard biodiesel development of food security. The model made used system dynamic method. Several scenarios that used in the model are: 1) existing condition, 2) The scenario increase biodiesel production capacity and increase land productivity, 3) reduction scenario CPO export by 30%, 4) scenario use othe raw material for biodiesel by 20%. The simulation results showed the availability of CPO raw materials would answer all needs of both food and biodiesel when there was an increase in productivity, diversification of raw materials, and also a reduction in palm oil exports. It was needed an integrated policy from upstream to downstream along with the consistency of implementation. Policy suggestions that could be considered were increased productivity through agricultural intensification, enforcement disincentive policies of CPO to exports, and development of non-CPO biodiesel raw materials and development of renewable energy.

  14. Discrete-Event Simulation with Agents for Modeling of Dynamic Asymmetric Threats in Maritime Security

    National Research Council Canada - National Science Library

    Ng, Chee W

    2007-01-01

    .... Discrete-event simulation (DES) was used to simulate a typical port-security, local, waterside-threat response model and to test the adaptive response of asymmetric threats in reaction to port-security procedures, while a multi-agent system (MAS...

  15. The Bochum on-line data acquisition system

    International Nuclear Information System (INIS)

    Paul, H.J.; Freiesleben, H.

    1986-01-01

    We describe an on-line data acquisition system based on a PDP 11 computer with CAMAC hardware. The software fully exploits the real-time features of the RSX-11M operating system. The basic characteristics of the program package, mainly written in FORTRAN 77, are: multitasking, shared common blocks, dynamical access to CAMAC hardware and data, and command orientated user interface. The system is particularly tailored for data acquisition in list mode of up to 64 parameters. (orig.)

  16. A Secure, Scalable and Elastic Autonomic Computing Systems Paradigm: Supporting Dynamic Adaptation of Self-* Services from an Autonomic Cloud

    Directory of Open Access Journals (Sweden)

    Abdul Jaleel

    2018-05-01

    Full Text Available Autonomic computing embeds self-management features in software systems using external feedback control loops, i.e., autonomic managers. In existing models of autonomic computing, adaptive behaviors are defined at the design time, autonomic managers are statically configured, and the running system has a fixed set of self-* capabilities. An autonomic computing design should accommodate autonomic capability growth by allowing the dynamic configuration of self-* services, but this causes security and integrity issues. A secure, scalable and elastic autonomic computing system (SSE-ACS paradigm is proposed to address the runtime inclusion of autonomic managers, ensuring secure communication between autonomic managers and managed resources. Applying the SSE-ACS concept, a layered approach for the dynamic adaptation of self-* services is presented with an online ‘Autonomic_Cloud’ working as the middleware between Autonomic Managers (offering the self-* services and Autonomic Computing System (requiring the self-* services. A stock trading and forecasting system is used for simulation purposes. The security impact of the SSE-ACS paradigm is verified by testing possible attack cases over the autonomic computing system with single and multiple autonomic managers running on the same and different machines. The common vulnerability scoring system (CVSS metric shows a decrease in the vulnerability severity score from high (8.8 for existing ACS to low (3.9 for SSE-ACS. Autonomic managers are introduced into the system at runtime from the Autonomic_Cloud to test the scalability and elasticity. With elastic AMs, the system optimizes the Central Processing Unit (CPU share resulting in an improved execution time for business logic. For computing systems requiring the continuous support of self-management services, the proposed system achieves a significant improvement in security, scalability, elasticity, autonomic efficiency, and issue resolving time

  17. Shawnee Mission's On-Line Cataloging System

    Directory of Open Access Journals (Sweden)

    Ellen Wasby Miller

    1971-03-01

    Full Text Available An on-line cataloging pilot project for two elementary schools is discussed. The system components are 2740 terminals, upper-lower-case input, IBM's FASTER generalized software package, and usual cards/labels output. Reasons for choosing FASTER, software and hardware features, operating procedures, system performance and costs are detailed. Future expansion to cataloging 100,000 annual K-12 acquisitions, on-line circulation, retrospective conversion, and union book catalogs is set forth.

  18. INIS retrieval service, towards on-line

    International Nuclear Information System (INIS)

    Ebinuma, Yukio; Komatsubara, Yasutoshi

    1983-01-01

    Japan Atomic Energy Research Institute executes the retrieval service of INIS atomic energy information by batch system in cooperation with Genshiryoku Kozaikai. This service is very popular to the users in whole Japan, but the demand of on-line service has increased recently. Therefore, it was decided to begin the INIS on-line service from January, 1984, through the on-line information retrieval system of the Japan Information Center of Science and Technology. It is expected that when the operation will be started, the utilization of INIS atomic energy information in Japan will drastically increase. Also Japan Atomic Energy Research Institute has carried out the retrieval service by on-line system for those in the institute besides the batch system, accordingly, at this opportunity, the state of utilization of both systems and their distinction to use effectively, and the operation and the method of utilization of the on-line information retrieval system of JICST are explained. In the on-line system, the users are accessible to the data base themselves, and immediate information retrieval is possible, while in the batch system, the related information can be retrieved without fail, and the troublesome operation of equipment is not necessary. (Kako, I.)

  19. Dynamic impact of the structure of the supply chain of perishable foods on logistics performance and food security

    Directory of Open Access Journals (Sweden)

    Javier Arturo Orjuela Castro

    2017-10-01

    Full Text Available Purpose: Understanding how the structure affects logistical performance and food security is critical in the supply chains of perishable foods (PFSC. This research proposes a system dynamics model to analyze the effects of structures: lean, agile, flexible, responsive and resilient, in the overall performance and of each agent of the PFSC. Design/methodology/approach: Using a system dynamics model and design of experiments it is studied how the different structures and their combination, affect the behavior of inventory, transportation, responsiveness, efficiency, availability and quality-safety of the fresh fruits supply chain and each echelon. Findings: The studies of supply chains have been done for each structure in an independent way; investigations are scarce in supply chains of perishable foods. The structures modeled in this research do not show the better performance in all the metrics of the chain, neither in all agents for each structure. The above implies the presence of trade-offs. Research limitations/implications: The results show the need to investigate mixed structures with the FPSC´s own characteristics; the model can be applied in other supply chains of perishable foods. Practical implications: Management by combining structures in the FFSC, improves logistics performance and contributes to food security. Social implications: The agents of the FFSC can apply the structures found in this study, to improve their logistics performance and the food security. Originality/value: The dynamics of individual and combined structures were identified, which constitutes a contribution to the discussion in the literature of such problems for FFSC. The model includes six echelons: farmers, wholesalers, agro-industry, third-party logistics operators and retailers. The dynamic contemplates deterioration rate to model perishability and others losses.

  20. Dynamic impact of the structure of the supply chain of perishable foods on logistics performance and food security

    Energy Technology Data Exchange (ETDEWEB)

    Castro, Javier Arturo Orjuela; Jaimes, Wilson Adarme

    2017-07-01

    Understanding how the structure affects logistical performance and food security is critical in the supply chains of perishable foods (PFSC). This research proposes a system dynamics model to analyze the effects of structures: lean, agile, flexible, responsive and resilient, in the overall performance and of each agent of the PFSC. Design/methodology/approach: Using a system dynamics model and design of experiments it is studied how the different structures and their combination, affect the behavior of inventory, transportation, responsiveness, efficiency, availability and quality-safety of the fresh fruits supply chain and each echelon. Findings: The studies of supply chains have been done for each structure in an independent way; investigations are scarce in supply chains of perishable foods. The structures modeled in this research do not show the better performance in all the metrics of the chain, neither in all agents for each structure. The above implies the presence of trade-offs. Research limitations/implications: The results show the need to investigate mixed structures with the FPSC´s own characteristics; the model can be applied in other supply chains of perishable foods. Practical implications: Management by combining structures in the FFSC, improves logistics performance and contributes to food security. Social implications: The agents of the FFSC can apply the structures found in this study, to improve their logistics performance and the food security. Originality/value: The dynamics of individual and combined structures were identified, which constitutes a contribution to the discussion in the literature of such problems for FFSC. The model includes six echelons: farmers, wholesalers, agro-industry, third-party logistics operators and retailers. The dynamic contemplates deterioration rate to model perishability and others losses.

  1. Dynamic impact of the structure of the supply chain of perishable foods on logistics performance and food security

    International Nuclear Information System (INIS)

    Castro, Javier Arturo Orjuela; Jaimes, Wilson Adarme

    2017-01-01

    Understanding how the structure affects logistical performance and food security is critical in the supply chains of perishable foods (PFSC). This research proposes a system dynamics model to analyze the effects of structures: lean, agile, flexible, responsive and resilient, in the overall performance and of each agent of the PFSC. Design/methodology/approach: Using a system dynamics model and design of experiments it is studied how the different structures and their combination, affect the behavior of inventory, transportation, responsiveness, efficiency, availability and quality-safety of the fresh fruits supply chain and each echelon. Findings: The studies of supply chains have been done for each structure in an independent way; investigations are scarce in supply chains of perishable foods. The structures modeled in this research do not show the better performance in all the metrics of the chain, neither in all agents for each structure. The above implies the presence of trade-offs. Research limitations/implications: The results show the need to investigate mixed structures with the FPSC´s own characteristics; the model can be applied in other supply chains of perishable foods. Practical implications: Management by combining structures in the FFSC, improves logistics performance and contributes to food security. Social implications: The agents of the FFSC can apply the structures found in this study, to improve their logistics performance and the food security. Originality/value: The dynamics of individual and combined structures were identified, which constitutes a contribution to the discussion in the literature of such problems for FFSC. The model includes six echelons: farmers, wholesalers, agro-industry, third-party logistics operators and retailers. The dynamic contemplates deterioration rate to model perishability and others losses.

  2. A Systematic Approach for Dynamic Security Assessment and the Corresponding Preventive Control Scheme Based on Decision Trees

    DEFF Research Database (Denmark)

    Liu, Leo; Sun, Kai; Rather, Zakir Hussain

    2014-01-01

    This paper proposes a decision tree (DT)-based systematic approach for cooperative online power system dynamic security assessment (DSA) and preventive control. This approach adopts a new methodology that trains two contingency-oriented DTs on a daily basis by the databases generated from power...... system simulations. Fed with real-time wide-area measurements, one DT of measurable variables is employed for online DSA to identify potential security issues, and the other DT of controllable variables provides online decision support on preventive control strategies against those issues. A cost......-effective algorithm is adopted in this proposed approach to optimize the trajectory of preventive control. The paper also proposes an importance sampling algorithm on database preparation for efficient DT training for power systems with high penetration of wind power and distributed generation. The performance...

  3. On-line monitoring for calibration reduction

    International Nuclear Information System (INIS)

    Hoffmann, M.

    2005-09-01

    On-Line Monitoring evaluates instrument channel performance by assessing its consistency with other plant indications. Elimination or reduction of unnecessary field calibrations can reduce associated labour costs, reduce personnel radiation exposure, and reduce the potential for calibration errors. On-line calibration monitoring is an important technique to implement a state-based maintenance approach and reduce unnecessary field calibrations. In this report we will look at how the concept is currently applied in the industry and what the arising needs are as it becomes more commonplace. We will also look at the PEANO System, a tool developed by the Halden Project to perform signal validation and on-line calibration monitoring. Some issues will be identified that are being addressed in the further development of these tools to better serve the future needs of the industry in this area. An outline for how to improve these points and which aspects should be taken into account is described in detail. (Author)

  4. On-line signal trend identification

    International Nuclear Information System (INIS)

    Tambouratzis, T.; Antonopoulos-Domis, M.

    2004-01-01

    An artificial neural network, based on the self-organizing map, is proposed for on-line signal trend identification. Trends are categorized at each incoming signal as steady-state, increasing and decreasing, while they are further classified according to characteristics such signal shape and rate of change. Tests with model-generated signals illustrate the ability of the self-organizing map to accurately and reliably perform on-line trend identification in terms of both detection and classification. The proposed methodology has been found robust to the presence of white noise

  5. On-line atomic data access

    Energy Technology Data Exchange (ETDEWEB)

    Schultz, D.R. [Oak Ridge National Lab., TN (United States); Nash, J.K. [Lawrence Livermore National Lab., CA (United States)

    1996-04-01

    The need for atomic data is one which continues to expand in a wide variety of applications including fusion energy, astrophysics, laser- produced plasma research, and plasma processing. Modern computer database and communications technology nables this data to be placed on-line and obtained by users of the Internet. Presented here is a summary of the observations and conclusions regarding such on-line atomic data access derived from a forum held at the Tenth APS Topical Conference on Atomic Processes in Plasmas.

  6. On-line monitoring for calibration reduction

    International Nuclear Information System (INIS)

    Hoffmann, Mario; Gran, Frauke Schmitt; Thunem, Harald P-J.

    2004-04-01

    On-Line Monitoring (OLM) of a channel's calibration state evaluates instrument channel performance by assessing its consistency with other plant indications. Industry and experience at several plants has shown this overall approach to be very effective in identifying instrument channels that are exhibiting degrading or inconsistent performance characteristics. The Halden Reactor Project has developed the signal validation system PEANO, which can be used to assist with the tasks of OLM. To further enhance the PEANO System for use as a calibration reduction tool, the following two additional modules have been developed; HRP Prox, which performs pre-processing and statistical analysis of signal data, Batch Monitoring Module (BMM), which is an off-line batch monitoring and reporting suite. The purpose and functionality of the HRP Prox and BMM modules are discussed in this report, as well as the improvements made to the PEANO Server to support these new modules. The Halden Reactor Project has established a Halden On-Line Monitoring User Group (HOLMUG), devoted to the discussion and implementation of on-line monitoring techniques in power plants. It is formed by utilities, vendors, regulatory bodies and research institutes that meet regularly to discuss implementation aspects of on-line monitoring, technical specification changes, cost-benefit analysis and regulatory issues. (Author)

  7. SPIRES I: on-line search guide

    International Nuclear Information System (INIS)

    Addis, L.

    1975-06-01

    SPIRES I is the first generation of the on-line Stanford Public Information Retrieval System. Designed as a prototype system, SPIRES I was later moved to the SLAC computing facility where it has been routinely available to SLAC users in the field of high-energy physics. The scope and use of the SPIRES I system are described in this manual

  8. HOPI: on-line injection optimization program

    International Nuclear Information System (INIS)

    LeMaire, J.L.

    1977-01-01

    A method of matching the beam from the 200 MeV linac to the AGS without the necessity of making emittance measurements is presented. An on-line computer program written on the PDP10 computer performs the matching by modifying independently the horizontal and vertical emittance. Experimental results show success with this method, which can be applied to any matching section

  9. Towards Dynamic Authentication in the Grid — Secure and Mobile Business Workflows Using GSet

    Science.gov (United States)

    Mangler, Jürgen; Schikuta, Erich; Witzany, Christoph; Jorns, Oliver; Ul Haq, Irfan; Wanek, Helmut

    Until now, the research community mainly focused on the technical aspects of Grid computing and neglected commercial issues. However, recently the community tends to accept that the success of the Grid is crucially based on commercial exploitation. In our vision Foster's and Kesselman's statement "The Grid is all about sharing." has to be extended by "... and making money out of it!". To allow for the realization of this vision the trust-worthyness of the underlying technology needs to be ensured. This can be achieved by the use of gSET (Gridified Secure Electronic Transaction) as a basic technology for trust management and secure accounting in the presented Grid based workflow. We present a framework, conceptually and technically, from the area of the Mobile-Grid, which justifies the Grid infrastructure as a viable platform to enable commercially successful business workflows.

  10. An Integrated Intranet and Dynamic Database Application for the Security Manager at Naval Postgraduate School

    Science.gov (United States)

    2002-09-01

    Basic for Applications ( VBA ) 6.0 as macros may not be supported in 8 future versions of Access. Access 2000 offers Internet- related features for...security features from Microsoft’s SQL Server. [1] 3. System Requirements Access 2000 is a resource-intensive application as are all Office 2000...1] • Modules – Functions and procedures written in the Visual Basic for Applications ( VBA ) programming language. The capabilities of modules

  11. Political Dynamics and Security in the Arabian Peninsula Through the 1990s,

    Science.gov (United States)

    1993-01-01

    Moreover, not only were historical and ideological differences between Syria and Iraq present, but Dam- ascus had supported Iran throughout the Iran...Iraq wanted to rebuild its war-dam- aged facilities as well as expand its industrial capacity., The need to show something for the war, coupled with a...outlooks, Gulf shaykhdoms articulated na- tional security policies through age -old political survival techniques. By 1992, however, and in large

  12. Understanding complexities in coupled dynamics of human-water and food security

    Science.gov (United States)

    Usmani, M.; Kondal, A.; Lin, L.; Colwell, R. R.; Jutla, A.

    2017-12-01

    Traditional premise of food security is associated with satisfying human hunger by providing sufficient calories to population. Water is the key variable associated with the growth of crops, which is then used as a metric of success for abundance of food across globe. The current framework often negates complex coupled interaction between availability of food nutrients and human well-being (such as productivity, work efficiency, low birth weight, physical and mental growth). Our analysis suggests that 1 in 3 humans suffer from malnutrition across the globe. In last five decades, most of the countries have a decreasing availability trend in at least one of the twenty-three essential food nutrients required for human well-being. We argue that food security can only be achieved if information on use of water for crops and consumption of food must include availability of nutrients for humans. Here, we propose a new concept of "consumptive nutrients" that include constant feedback mechanism between water-human and societal processes- essential for growth, distribution and consumption of food nutrients. Using Ethiopia as a signature rain-fed agricultural region, we will show how decreasing precipitation has led to an increase in crop productivity, but decreased availability of nutrients for humans. This in turn has destabilizing impact on overall regional economy. We will demonstrate why inclusion of nutrients must be a part of discussion for ensuring food security to human population.

  13. Educational On-Line Gaming Propensity

    DEFF Research Database (Denmark)

    Sudzina, Frantisek; Razmerita, Liana; Kirchner, Kathrin

    2014-01-01

    Educational on-line games are promising for new generations of students who are grown up digital. Th e new generations of students are technology savvy and spend lots of time on the web and on social networks. Based on an exploratory study, this article investigates the factors that infl uence...... students’ willingness to participate in serious games for teaching/learning. Th is study investigates the relationship between students’ behavior on Facebook, Facebook games, and their attitude toward educational on-line games. Th e results of the study reveal that the early adopters of educational games...... are likely to be students, who are young, have only a few Facebook connections, who currently play Facebook game(s). Furthermore, the study emphasizes that there may be differences between students coming from various countries....

  14. Trends in on-line data processing

    International Nuclear Information System (INIS)

    Masetti, M.

    1981-01-01

    The developement of integrated circuits has been characterized by an exponential growth of gates on a single chip that will still continue in the coming years. In parallel the price per bit is dropping down with more or less the same law. As a consequence of this a few statements can be made: The present 16-bit minicomputer in a small configuration is going to be substituted by a 16-bit microcomputer, and the 16-bit microcomputer in a powerful configuration by a 32-bit midi having also a virtual memory facility. Fully programmable or microcoded powerful devices like the LASS hardware processor or MICE, will allow an efficient on-line filter. Higher computing speed can be achieved by a multiprocessor configuration which can be insensitive to hardware failures. Therefore we are moving towards an integrated on-line computing system with much higher computing power than now and the present distinction between on-line and off-line will no longer be so sharp. As more processing can be performed on-line, fast high quality feed-back can be provided for the experiment. In the years to come the trend towards more processing power, at a lower price, and assembled in the same hardware volume will continue for at least five years; at the same time the future large high-energy physics experiments at LEP will be carried out within a wide international collaboration. In this environment methods must be found for a large fraction of the work to be distributed amongst the collaborators. To accomplish this aim it is necessary to introduce common standard practices concerning both hardware and software, in such a way that the seperate parts, developed by the collaborators, will be plug-compatible. (orig.)

  15. New Trends in on-line Marketing

    OpenAIRE

    Palkovič, Lukáš

    2011-01-01

    This bachelor thesis deals with new trend of internet marketing, it focuses especially on viral marketing. The theoretical part charasterizes the process of viral campaigns, furthermore deals with the components and aspects of on-line environment. Another separated chapter presents social networks, their place in viral marketing and at last but not least the viral video making process. The practical part contains different analyses of specific viral campaigns. The next and equally the last pa...

  16. Impacts of Base-Case and Post-Contingency Constraint Relaxations on Static and Dynamic Operational Security

    Science.gov (United States)

    Salloum, Ahmed

    Constraint relaxation by definition means that certain security, operational, or financial constraints are allowed to be violated in the energy market model for a predetermined penalty price. System operators utilize this mechanism in an effort to impose a price-cap on shadow prices throughout the market. In addition, constraint relaxations can serve as corrective approximations that help in reducing the occurrence of infeasible or extreme solutions in the day-ahead markets. This work aims to capture the impact constraint relaxations have on system operational security. Moreover, this analysis also provides a better understanding of the correlation between DC market models and AC real-time systems and analyzes how relaxations in market models propagate to real-time systems. This information can be used not only to assess the criticality of constraint relaxations, but also as a basis for determining penalty prices more accurately. Constraint relaxations practice was replicated in this work using a test case and a real-life large-scale system, while capturing both energy market aspects and AC real-time system performance. System performance investigation included static and dynamic security analysis for base-case and post-contingency operating conditions. PJM peak hour loads were dynamically modeled in order to capture delayed voltage recovery and sustained depressed voltage profiles as a result of reactive power deficiency caused by constraint relaxations. Moreover, impacts of constraint relaxations on operational system security were investigated when risk based penalty prices are used. Transmission lines in the PJM system were categorized according to their risk index and each category was as-signed a different penalty price accordingly in order to avoid real-time overloads on high risk lines. This work also extends the investigation of constraint relaxations to post-contingency relaxations, where emergency limits are allowed to be relaxed in energy market models

  17. 76 FR 7102 - Simplified Network Application Processing System, On-line Registration and Account Maintenance

    Science.gov (United States)

    2011-02-09

    ... the Chief Counsel for Advocacy of the Small Business Administration that the proposed rule, if adopted... Industry and Security (BIS) amends the Export Administration Regulations to implement a mandatory on-line... in their accounts current. This rulemaking is consistent with the goals and principles of Executive...

  18. The Dynamics of Good Governance in Promoting Energy Security: The Case of Bangladesh

    Directory of Open Access Journals (Sweden)

    Sakib B. Amin

    2017-07-01

    Full Text Available In the modern era, energy and its sustainability have emerged as one of the most important economic issues worldwide. It is widely believed that no country has managed to embrace development without ensuring a sustainable energy supply that could be accessed by a large portion of the population. Thus, this concept of energy sufficiency is of greater importance for the underdeveloped countries those, historically, had not been able to match their local energy demand. Apart from the inefficiencies and resource constraints associated with the energy sector, lack of good governance within an economy is believed to be a critical issue in aggravating energy crisis in those countries. However, following strategic impotence, political unwillingness and inefficient governance of the energy sector, the underdeveloped countries have failed to mitigate the energy deficits which in turn have hampered the development prospects in those countries. This paper highlights the potential roles good governance can play to promote energy security considering the case of Bangladesh, a developing country that is leaving no stones unturned in becoming a middle-income country by 2021. Besides, the role of good governance in complementing fuel diversification as a tool for ensuring energy security has also been put forward. Thus, the government of Bangladesh should reinstate good governance within the economy creating a favourable environment for investment in the energy sector which would enhance competition and mitigate inefficiencies in energy generation, transmission, and distribution.

  19. Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization

    Directory of Open Access Journals (Sweden)

    Wai Kuan Yip

    2007-01-01

    Full Text Available We introduce a novel method for secure computation of biometric hash on dynamic hand signatures using BioPhasor mixing and discretization. The use of BioPhasor as the mixing process provides a one-way transformation that precludes exact recovery of the biometric vector from compromised hashes and stolen tokens. In addition, our user-specific discretization acts both as an error correction step as well as a real-to-binary space converter. We also propose a new method of extracting compressed representation of dynamic hand signatures using discrete wavelet transform (DWT and discrete fourier transform (DFT. Without the conventional use of dynamic time warping, the proposed method avoids storage of user's hand signature template. This is an important consideration for protecting the privacy of the biometric owner. Our results show that the proposed method could produce stable and distinguishable bit strings with equal error rates (EERs of and for random and skilled forgeries for stolen token (worst case scenario, and for both forgeries in the genuine token (optimal scenario.

  20. Methods for Calculating Frequency of Maintenance of Complex Information Security System Based on Dynamics of Its Reliability

    Science.gov (United States)

    Varlataya, S. K.; Evdokimov, V. E.; Urzov, A. Y.

    2017-11-01

    This article describes a process of calculating a certain complex information security system (CISS) reliability using the example of the technospheric security management model as well as ability to determine the frequency of its maintenance using the system reliability parameter which allows one to assess man-made risks and to forecast natural and man-made emergencies. The relevance of this article is explained by the fact the CISS reliability is closely related to information security (IS) risks. Since reliability (or resiliency) is a probabilistic characteristic of the system showing the possibility of its failure (and as a consequence - threats to the protected information assets emergence), it is seen as a component of the overall IS risk in the system. As it is known, there is a certain acceptable level of IS risk assigned by experts for a particular information system; in case of reliability being a risk-forming factor maintaining an acceptable risk level should be carried out by the routine analysis of the condition of CISS and its elements and their timely service. The article presents a reliability parameter calculation for the CISS with a mixed type of element connection, a formula of the dynamics of such system reliability is written. The chart of CISS reliability change is a S-shaped curve which can be divided into 3 periods: almost invariable high level of reliability, uniform reliability reduction, almost invariable low level of reliability. Setting the minimum acceptable level of reliability, the graph (or formula) can be used to determine the period of time during which the system would meet requirements. Ideally, this period should not be longer than the first period of the graph. Thus, the proposed method of calculating the CISS maintenance frequency helps to solve a voluminous and critical task of the information assets risk management.

  1. Cloud Radar: Near Real-Time Detection of Security Failures in Dynamic Virtualized Infrastructures

    NARCIS (Netherlands)

    Bleikertz, Sören; Vogel, Carsten; Groß, Thomas

    2014-01-01

    Cloud infrastructures are designed to share physical resources among many different tenants while ensuring overall secu- rity and tenant isolation. The complexity of dynamically changing and growing cloud environments, as well as insider attacks, can lead to misconfigurations that ultimately result

  2. Security Analysis of a Block Encryption Algorithm Based on Dynamic Sequences of Multiple Chaotic Systems

    Science.gov (United States)

    Du, Mao-Kang; He, Bo; Wang, Yong

    2011-01-01

    Recently, the cryptosystem based on chaos has attracted much attention. Wang and Yu (Commun. Nonlin. Sci. Numer. Simulat. 14 (2009) 574) proposed a block encryption algorithm based on dynamic sequences of multiple chaotic systems. We analyze the potential flaws in the algorithm. Then, a chosen-plaintext attack is presented. Some remedial measures are suggested to avoid the flaws effectively. Furthermore, an improved encryption algorithm is proposed to resist the attacks and to keep all the merits of the original cryptosystem.

  3. On-line neutron activation analyzers

    International Nuclear Information System (INIS)

    Flahaut, V.; Colmon, A.

    1999-01-01

    A neutronic analyser has been designed to determine the composition of the flow of raw materials entering a cement factory on the conveyor belt. This new system gives a reliable analysis of the whole cargo that outdates the sampling or the usual surface analysis based on fluorescence spectrometry. The accuracy is about 1%.The neutrons interact with the materials on an average depth of 25 cm and are absorbed by nuclei, these nuclei produce photons whose energy is characteristic of the chemical element itself. The composition can be deduced by measuring the number of photons emitted and their energy. The analysis is made on-line and can concern the search for about 10 compounds. In the case of cement the list of compounds is: SiO 2 , CaO, Al 2 O 3 , Fe 2 O 3 , MgO, Na 2 O, TiO 2 , S, Mn 2 O 3 , K 2 O, and H 2 O. The neutron generator involves a deuterium ion source whose deuterium ions are accelerated by means of an electrical field and impinge on a tritiated target, the nuclear reactions between deuterium and tritium produce 14 MeV neutrons. This neutron analysing technique can be adapted to any need of on-line composition determination. (A.C.)

  4. On line nuclear orientation: opportunity and challenge

    International Nuclear Information System (INIS)

    Stone, N.J.

    1985-01-01

    The development of the on-line nuclear orientation (OLNO) technique is reviewed. The present potential of the technique is discussed in the light of the attainable temperatures, the use of ion implantation and the required isotope flux. Limitations associated with spin-lattice relaxation are considered in some detail and a survey of accessible nuclei is presented. An outline comparison is given between OLNO and other methods for producing orientation of nuclei, for measuring nuclear spins and static moments and for the study of level structure and transition probabilities. The conclusion is drawn that the method in its present form has extensive potential over a wide range of nuclei. Future prospects for in-beam polarisation giving access to nuclei of shorter half lives are referred to briefly. (Auth.)

  5. An on-line diagnostic expert system

    International Nuclear Information System (INIS)

    Felkel, L.

    1987-01-01

    As experience with on-line information systems, experts systems and artificial intelligence tools grows, the authors retreat from the first euphoria that AI could help them solve the problem they were unable to solve with conventional programming. The major effort of the development time goes into building the knowledge-base. There is no such thing as a generic knowledge-base for nuclear power plants as there is, for example, for the diagnosis of a Boeing 747 aircraft. AI-methods, tools and hardware are still in a state which does not optimally lend itself to real-time application. The ability of developing prototype systems to investigate variants otherwise too costly to justify is one advantage that the authors gladly accept. Last, but no least the tools provide a flexible and adaptable user interface (desktop window systems) etc. The development of such tools in a project would be prohibitive and room for experimentation would be limited

  6. On-Line Algorithms and Reverse Mathematics

    Science.gov (United States)

    Harris, Seth

    In this thesis, we classify the reverse-mathematical strength of sequential problems. If we are given a problem P of the form ∀X(alpha(X) → ∃Zbeta(X,Z)) then the corresponding sequential problem, SeqP, asserts the existence of infinitely many solutions to P: ∀X(∀nalpha(Xn) → ∃Z∀nbeta(X n,Zn)). P is typically provable in RCA0 if all objects involved are finite. SeqP, however, is only guaranteed to be provable in ACA0. In this thesis we exactly characterize which sequential problems are equivalent to RCA0, WKL0, or ACA0.. We say that a problem P is solvable by an on-line algorithm if P can be solved according to a two-player game, played by Alice and Bob, in which Bob has a winning strategy. Bob wins the game if Alice's sequence of plays 〈a0, ..., ak〉 and Bob's sequence of responses 〈 b0, ..., bk〉 constitute a solution to P. Formally, an on-line algorithm A is a function that inputs an admissible sequence of plays 〈a 0, b0, ..., aj〉 and outputs a new play bj for Bob. (This differs from the typical definition of "algorithm", though quite often a concrete set of instructions can be easily deduced from A.). We show that SeqP is provable in RCA0 precisely when P is solvable by an on-line algorithm. Schmerl proved this result specifically for the graph coloring problem; we generalize Schmerl's result to any problem that is on-line solvable. To prove our separation, we introduce a principle called Predictk(r) that is equivalent to -WKL0 for standard k, r.. We show that WKL0 is sufficient to prove SeqP precisely when P has a solvable closed kernel. This means that a solution exists, and each initial segment of this solution is a solution to the corresponding initial segment of the problem. (Certain bounding conditions are necessary as well.) If no such solution exists, then SeqP is equivalent to ACA0 over RCA 0 + ISigma02; RCA0 alone suffices if only sequences of standard length are considered. We use different techniques from Schmerl to prove

  7. Software for on-line experiments

    International Nuclear Information System (INIS)

    Ivanchenko, I.M.

    1981-01-01

    A review of nowadays development state of software of on-line electron experiments is presented. The principles of organization of real time systems on second generation computer base are considered. The following methods for projections search are considered: combinator methods, global methods, methods of tracking, methods of a supporting band. The following methods for determining parameter estimates based on the Lorentz equation are analysed: analytical simulation of trajectories, determination of parameters by the iterative method using the technique of calculation of recycled integrals, multidimensional statistical analysis. For the purpose of successful usage and development of software the technique of selfdocumented programs is created and the computer is applied for preparing, revising and circulation of external descriptions which as program complexes are constructed according to the hierarchical principle [ru

  8. On line protection systems for induction motors

    International Nuclear Information System (INIS)

    Colak, I.; Celik, H.; Sefa, I.; Demirbas, S.

    2005-01-01

    Protection of induction motors is very important since they are widely used in industry for many applications due to their high robustness, reliability, low cost and maintenance, high efficiency and long service life. So, protecting these motors is crucial for operations. This paper presents a combined protection approach for induction motors. To achieve this, the electrical values of the induction motor were measured with sensitivity ±1% through a data acquisition card and processed with software developed in Visual C++. An on line protection system for induction motors was achieved easily and effectively. The experimental results have shown that the induction motor was protected against the possible problems faced during the operation. The software developed for this protection provides flexible and reliable media for operators and their motors. It is expected that the motor protection achieved in this study might be faster than the classical techniques and also may be applied to larger motors easily after small modifications of the software

  9. Aprender a innovar: una experiencia on line

    Directory of Open Access Journals (Sweden)

    Joaquín MORENO MARCHAL

    2014-11-01

    Full Text Available La creatividad y la innovación se han convertido en recursos clave en la denominada sociedad del conocimiento, que bien podría ser también llamada sociedad de la innovación. Pero innovar es una actividad compleja, que integra la aplicación de múltiples capacidades, el pensamiento divergente y convergente, la gestión de equipos humanos, la comunicación. Ahora bien, a innovar se puede, y se debe, aprender. Aprender a innovar es un reto y también una obligación para el conjunto del sistema educativo en todos sus niveles. Partiendo de estas consideraciones este trabajo expone una experiencia de aprendizaje de la creatividad y de la innovación a través de un curso totalmente on line basado en la plataforma MOODLE, en el marco del Programa de Formación Permanente de la Universidad de Cádiz. Se presenta un modelo del proceso de innovación, denominado CREALAB, de elaboración propia. Este modelo se ha utilizado como base del proceso de aprendizaje de la creatividad y de la innovación y en el diseño del curso, está organizado en torno a actividades y tiene un carácter iterativo y realimentado. Se presentan además el conjunto del diseño metodológico y los resultados obtenidos en las dos ediciones celebradas hasta el momento. El diseño del curso totalmente on line y los resultados alcanzados permiten estimar un alto potencial de aplicación, tanto a nivel personal como a nivel organizacional.

  10. On-line Social Interactions and Executive Functions

    Directory of Open Access Journals (Sweden)

    Oscar eYbarra

    2012-04-01

    Full Text Available A successful social interaction requires fast, on-line, and active construction of an ever-changing mental-model of another’s person beliefs, expectations, emotions, and desires. It also requires the ability to inhibit inappropriate behaviors, problem-solve, take-turns, and pursue goals in a distraction-rich environment. All these tasks rely on executive functions (EF—working memory, attention/cognitive control, and inhibition. Executive functioning has long been viewed as relatively static. However, starting with recent reports of successful cognitive interventions, this view is changing and now EFs are seen as much more open to both short and long term training, warm-up, and exhaustion effects. Some of the most intriguing evidence comes from research showing how social interaction enhances performance on standard EF tests. Interestingly, the latest research indicates these EF benefits are selectively conferred by certain on-line, dynamic social interactions, which require participants to engage with another person and actively construct the model of their mind. We review this literature and highlight its connection with evolutionary and cultural theories emphasizing links between intelligence and social life.

  11. On-line control of nuclear fuel reprocessing

    International Nuclear Information System (INIS)

    Parus, I.; Kierzek, J.; Zoltowski, T.

    1977-01-01

    The development trends in the field of chemical processes control and the present state of the development of continuous composition analysers has been described. On this background the peculiarities of on-line control methods for spent nuclear fuel reprocessing have been discussed. The measuring methods for direct and indirect determination of chemical composition and nuclear safety are reviewed in detail. The review comprises such methods as: measurement of α, γ and neutron radiation emitted both by nuclides present in technological solutions and using external sources of different radiation, X-ray fluorescence, measurements of physicochemical parameters connected with the composition (pH, density, electrical conductivity), polarography and spectrophotometry. At the end of this review some new trends in process control based on dynamic process models have been presented. (author)

  12. On-line monitoring of main coolant pump seals

    International Nuclear Information System (INIS)

    Stevens, D.M.; Spencer, J.W.; Morris, D.J.; Glass, S.W.; Sommerfield, G.A.; Harrison, D.

    1984-06-01

    The Babcock and Wilcox Company has developed and implemented a Reactor Coolant Pump Monitoring and Diagnostic System (RCPM and DS). The system has been installed at Toledo Edison Company's Davis-Besse Nuclear Power Station Unit 1. The RCPM and PS continuously monitors a number of indicators of pump performance and notifies the plant operator of out-of-tolerance conditions or pump performance trending toward out-of-tolerance conditions. Pump seal parameters being monitored include pump internal pressures, temperatures, and flow rates. Rotordynamic performanvce and plant operating conditions are also measured with a variety of dynamic sensors. This paper describes the implementation of the system and the results of on-line monitoring of four RC pumps

  13. Water security, risk and economic growth: lessons from a dynamical systems model

    Science.gov (United States)

    Dadson, Simon; Hall, Jim; Garrick, Dustin; Sadoff, Claudia; Grey, David; Whittington, Dale

    2016-04-01

    Investments in the physical infrastructure, human capital, and institutions needed for water resources management have been a noteworthy feature in the development of most civilisations. These investments affect the economy in two distinct ways: (i) by improving the factor productivity of water in multiple sectors of the economy, especially those that are water intensive such as agriculture and energy; and (ii) by reducing the acute and chronic harmful effects of water-related hazards like floods, droughts, and water-related diseases. The need for capital investment to mitigate these risks in order to promote economic growth is widely acknowledged, but prior work to conceptualise the relationship between water-related risks and economic growth has focused on the productive and harmful roles of water in the economy independently. Here the two influences are combined using a simple, dynamical model of water-related investment, risk, and growth at the national level. The model suggests the existence of a context-specific threshold above which growth proceeds along an 'S'-curve. In many cases there is a requirement for initial investment in water-related assets to enable growth. Below the threshold it is possible for a poverty trap to arise. The presence and location of the poverty trap is context-specific and depends on the relative exposure of productive water-related assets to risk, compared with risks faced by assets in the wider economy. Exogenous changes in the level of water-related risk (through, for example, climate and land cover change) can potentially push an economy away from a growth path towards a poverty trap. These results illustrate the value of accounting for environmental risk in models of economic growth and may offer guidance in the design of robust policies for investment in water-related productive assets to manage risk, particularly in the face of global and regional environmental change.

  14. Architecting security with Paradigm

    NARCIS (Netherlands)

    Andova, S.; Groenewegen, L.P.J.; Verschuren, J.H.S.; Vink, de E.P.; Lemos, de R.; Fabre, J.C.; Gacek, C.; Gadducci, F.; Beek, ter M.

    2009-01-01

    For large security systems a clear separation of concerns is achieved through architecting. Particularly the dynamic consistency between the architectural components should be addressed, in addition to individual component behaviour. In this paper, relevant dynamic consistency is specified through

  15. On-line maintenance at Cofrentes NPP

    International Nuclear Information System (INIS)

    Roldan Vilches, J.; Moreno Matarranz, M. A.; Hermana Mendioroz, I.

    1998-01-01

    Cofrentes NPP has begun in 1997 activities related to At Power Preventive Maintenance over trains or systems which lead to a voluntary entry in a Limitative Condition of Operation (LCO) of the Technical Specifications. From others benefits, this program ha improved the risk management and the staff's knowledge over the functions and safety implications of the different systems, the better exploit of the resources, the co-ordination of the different organisations involved (Maintenance an Operation) and the reductions of works during shutdowns. Previous to each work, a feasibility study analyzes qualitative and quantitative (PSA), using the Risk Monitor, the implications on safety of all the tasks, assuring that the global safety of the Plant is always maintained. Tech. Spec. are analyzed in detail and also are analyzed situations of simultaneous unavailabilities of systems which could lead to a high risk situation. Two different risk controls are defined (punctual and accumulated) to assure that high risk situations will not be given. Finally, historical risk profile is analyzed to assure that the accumulated risk increase is not significant. Risk Monitor helps staff in the schedule and follow-up of the activities of On-Line Maintenance. Each one of the tasks are deeply planned and harshly analyzed and are carried out by high qualified workers. By the moment, this program is running with fully satisfaction on the Plant. (Author)

  16. SOL: INNOVACIÓN ON-LINE

    Directory of Open Access Journals (Sweden)

    Rubén Faúndez

    2007-11-01

    Full Text Available Las aplicaciones de simulación tienden a ser cada vez más cercanas a usuarios e industrias. Sin embargo, muchas de ellas no poseen ni la capacidad ni el conocimiento como para desarrollar internamente sus modelos de simulación. Por este motivo, y como una forma de apoyar la toma de decisiones basándose en modelos de simulación, se presenta la plataforma SOL (Simulación On Line. La metodología completa de trabajo, así como la interacción entre SOL, Empresa y Asesor, son presentadas. Su base de datos, los niveles de usuarios, sus funcionalidades, y la creación automatizada de información grafica y visual, también son explicadas. En el caso de aplicación, el uso de SOL para apoyar la toma de decisiones en una operación de movimiento de material, permite a los tomadores de decisión acceder a análisis robustos basados en información extraída de los modelos de simulación. SOL, al almacenar información, funcionar vía web, generar análisis automatizados y crear visualizaciones, permite cumplir con las expectativas de los usuarios respecto a una solución integral en simulación.

  17. Simplified automatic on-line document searching

    International Nuclear Information System (INIS)

    Ebinuma, Yukio

    1983-01-01

    The author proposed searching method for users who need not-comprehensive retrieval. That is to provide flexible number of related documents for the users automatically. A group of technical terms are used as search terms to express an inquiry. Logical sums of the terms in the ascending order of frequency of the usage are prepared sequentially and automatically, and then the search formulas, qsub(m) and qsub(m-1) which meet certain threshold values are selected automatically also. Users justify precision of the search output up to 20 items retrieved by the formula qsub(m). If a user wishes more than 30% of recall ratio, the serach result should be output by qsub(m), and if he wishes less than 30% of it, it should be output by qsub(m-1). The search by this method using one year volume of INIS Database (76,600 items) and five inquiries resulted in 32% of recall ratio and 36% of precision ratio on the average in the case of qsub(m). The connecting time of a terminal was within 15 minutes per an inquiry. It showed more efficiency than that of an inexperienced searcher. The method can be applied to on-line searching system for database in which natural language only or natural language and controlled vocabulary are used. (author)

  18. Application of on-line analytical processing technique in accelerator

    International Nuclear Information System (INIS)

    Xie Dong; Li Weimin; He Duohui; Liu Gongfa; Xuan Ke

    2005-01-01

    A method of application of the on-line analytical processing technique in accelerator is described, which includes data pre-processing, the process of constructing of data warehouse and on-line analytical processing. (authors)

  19. Simultaneous Determination of Palladium and Platinum by On-line ...

    African Journals Online (AJOL)

    NJD

    using high performance liquid chromatography equipped with an on-line enrichment technique. Prior to ... The on-line enrichment system (Waters Corporation, USA) that was ... Using an appropriate volume (industrial plant effluents 20 mL,.

  20. Evaluation of surface water dynamics for water-food security in seasonal wetlands, north-central Namibia

    Directory of Open Access Journals (Sweden)

    T. Hiyama

    2014-09-01

    Full Text Available Agricultural use of wetlands is important for food security in various regions. However, land-use changes in wetland areas could alter the water cycle and the ecosystem. To conserve the water environments of wetlands, care is needed when introducing new cropping systems. This study is the first attempt to evaluate the water dynamics in the case of the introduction of rice-millet mixed-cropping systems to the Cuvelai system seasonal wetlands (CSSWs in north-central Namibia. We first investigated seasonal changes in surface water coverage by using satellite remote sensing data. We also assessed the effect of the introduction of rice-millet mixed-cropping systems on evapotranspiration in the CSSWs region. For the former investigation, we used MODIS and AMSR-E satellite remote sensing data. These data showed that at the beginning of the wet season, surface water appears from the southern (lower part and then expands to the northern (higher part of the CSSWs. For the latter investigation, we used data obtained by the classical Bowen ratio-energy balance (BREB method at an experimental field site established in September 2012 on the Ogongo campus, University of Namibia. This analysis showed the importance of water and vegetation conditions when introducing mixed-cropping to the region.

  1. Influence of visualization on consumption during on-line shopping

    OpenAIRE

    Hictaler, Urška

    2013-01-01

    This diploma work studies the influence of visualization on consumption during on-line shopping. The first part of the thesis starts with key areas of visualization, consumption and on-line shopping. Visualization, areas of use, human perception and ways of product presentation in on-line shops are defined discussed first. Next, consumption, consumers and factors that influence their decisions and satisfaction are defined. The last topic in the first part of the thesis discusses on-line shopp...

  2. A Distributed System for Learning Programming On-Line

    Science.gov (United States)

    Verdu, Elena; Regueras, Luisa M.; Verdu, Maria J.; Leal, Jose P.; de Castro, Juan P.; Queiros, Ricardo

    2012-01-01

    Several Web-based on-line judges or on-line programming trainers have been developed in order to allow students to train their programming skills. However, their pedagogical functionalities in the learning of programming have not been clearly defined. EduJudge is a project which aims to integrate the "UVA On-line Judge", an existing…

  3. Dynamic model of minimax control over economic security state of the region in the presence of risks

    Directory of Open Access Journals (Sweden)

    Andrey Fedorovich Shorikov

    2012-06-01

    Full Text Available Investigation and solution of management of economic security state in the region (MESSR requires development of a dynamic economic-mathematical model that takes into account the presence of control actions, uncontrolled parameters (risk modeling errors, etc. and availability of information deficit. At the same time, the existing approaches to solving such problems are based primarily on static models and the use of stochastic modeling of the device, which is required for the application of knowledge of the probability characteristics of the main model parameters and special conditions for the realization of the process. We should note that to use the apparatus of stochastic modeling, very strict conditions are required, which in practice are usually not feasible in advance In this paper, we propose to use a deterministic approach for modeling and solving the original problem in the form of a dynamic programming problem of minimax control (optimization of a guaranteed result MESSR at the determined point of time, taking into account the availability of risks of deterministic and stochastic nature (combined risks model. At thesametime, under therisks in thesocial and economic system we understand thefactors that negatively catastrophically affect the results of the reviewed processes inside it. For an effective use, a technique of prediction and assessment of time rows and stochastic risks in MESSR optimization process is presented, which can serve as a basis for the development of appropriate computer software. To solve the problem of program minimax control MESSR in the presence of risks, we propose a method which is reduced to the realization of a finite number of solutions of linear and convex mathematical programming and discrete optimization problem. The proposed method makes it possible to develop efficient numerical procedures to implement computer simulation of the dynamics of the problem, build program minimax control and gain optimal

  4. Safeguarding on-line accountability data

    International Nuclear Information System (INIS)

    Carlson, R.L.

    1980-06-01

    HEDL is developing a computerized accountability system that addresses the concerns of data access and data protection. The system utilizes a distributed processing network with transaction oriented software. Microprocessor controlled data accumulation stations are utilized which permit data editing to reduce errors, while maintaining several levels of backup protection. Software changes are allowed only after thorough review, protected by passwording, and are overchecked by audit. Protection against misuse by unauthorized individuals utilizes extensive physical security of the computer and the remote terminals. The positive identification devices and strict software control ensure that individuals cannot subvert the system without leaving an audit trail of their actions. This serves as a deterrent against malevolent acts by the authorized user

  5. Building collaboration tools and access to on-line facilities

    International Nuclear Information System (INIS)

    Agarwal, D.; Sachs, S.

    1996-11-01

    Network-based facilities will allow researchers at different locations to collaborate on experiments as if they all were together in the same laboratory. The expected value of these geographically distributed environments includes substantially increased effectiveness in doing science, and an enabling capability for analytical and high-value production use by industry. The Distributed, Collaboratory Experiment Environments (DCEE) Program consists of four projects that were established to build prototype remote experiment and collaborative environments. The work undertaken in this project represents some of the research and development of the mechanisms and infrastructure required to make collaboratories a reality. Some of these mechanisms have already been developed. Several other mechanisms, such as data dissemination, resource management for the sharing of experiment control, safety and security, electronic notebooks, elements of telepresence, and integrated user interfaces need further research and development. The pilot application for these collaborative tools is the Advanced Light Source (ALS) Beamline 7.0 at the Ernest Orlando Lawrence Berkeley Laboratory. The ALS is a particle accelerator and is a source of very high brilliance soft X-ray beams. One experimental facility is the Spectro-Microscopy Facility Beamline 7.0. Through this project, the Spectro-Microscopy Facility will be opened up to users from a wide range of organizations. The goal is to build software that will not only put the ALS Beamline 7.0 on-line, but will also serve as building blocks for future collaboratory development

  6. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  7. On-line monitoring of methane in sewer air.

    Science.gov (United States)

    Liu, Yiwen; Sharma, Keshab R; Murthy, Sudhir; Johnson, Ian; Evans, Ted; Yuan, Zhiguo

    2014-10-16

    Methane is a highly potent greenhouse gas and contributes significantly to climate change. Recent studies have shown significant methane production in sewers. The studies conducted so far have relied on manual sampling followed by off-line laboratory-based chromatography analysis. These methods are labor-intensive when measuring methane emissions from a large number of sewers, and do not capture the dynamic variations in methane production. In this study, we investigated the suitability of infrared spectroscopy-based on-line methane sensors for measuring methane in humid and condensing sewer air. Two such sensors were comprehensively tested in the laboratory. Both sensors displayed high linearity (R(2) > 0.999), with a detection limit of 0.023% and 0.110% by volume, respectively. Both sensors were robust against ambient temperature variations in the range of 5 to 35°C. While one sensor was robust against humidity variations, the other was found to be significantly affected by humidity. However, the problem was solved by equipping the sensor with a heating unit to increase the sensor surface temperature to 35°C. Field studies at three sites confirmed the performance and accuracy of the sensors when applied to actual sewer conditions, and revealed substantial and highly dynamic methane concentrations in sewer air.

  8. Deformable motion reconstruction for scanned proton beam therapy using on-line x-ray imaging

    NARCIS (Netherlands)

    Zhang, Ye; Knopf, A; Tanner, Colby; Boye, Dirk; Lomax, Antony J.

    2013-01-01

    Organ motion is a major problem for any dynamic radiotherapy delivery technique, and is particularly so for spot scanned proton therapy. On the other hand, the use of narrow, magnetically deflected proton pencil beams is potentially an ideal delivery technique for tracking tumour motion on-line. At

  9. Identification of Variables and Factors Impacting Consumer Behavior in On-line Shopping in India: An Empirical Study

    Science.gov (United States)

    Chhikara, Sudesh

    On-line shopping is a recent phenomenon in the field of E-Business and is definitely going to be the future of shopping in the world. Most of the companies are running their on-line portals to sell their products/services. Though online shopping is very common outside India, its growth in Indian Market, which is a large and strategic consumer market, is still not in line with the global market. The potential growth of on-line shopping has triggered the idea of conducting a study on on-line shopping in India. The present research paper has used exploratory study to depict and highlight the various categories of factors and variables impacting the behavior of consumers towards on-line shopping in India. The data was collected through in-depth interviews on a sample of 41 respondents from Delhi, Mumbai, Chennai and Bangalore. The results of the study show that on-line shopping in India is basically impacted by five categories of factors like demographics factor, Psychographics factor, Online shopping feature and policies, Technological factor, Security factor. The results of the study are used to present a comprehensive model of on-line shopping which could be further used by the researchers and practitioners for conducting future studies in the similar area. A brief operational definition of all the factors and variables impacting on-line shopping in India is also described. And finally practical implications of the study are also elucidated.

  10. A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application

    Science.gov (United States)

    Compagna, Luca; El Khoury, Paul; Massacci, Fabio; Saidane, Ayda

    Providing context-dependent security services is an important challenge for ambient intelligent systems. The complexity and the unbounded nature of such systems make it difficult even for the most experienced and knowledgeable security engineers, to foresee all possible situations and interactions when developing the system. In order to solve this problem context based self- diagnosis and reconfiguration at runtime should be provided.

  11. Research on early warning of food security using a system dynamics model: evidence from Jiangsu province in China.

    Science.gov (United States)

    Xu, Jianling; Ding, Yi

    2015-01-01

    Analyzing the early warning of food security, this paper sets the self-sufficiency rate as the principal indicator in a standpoint of supplement. It is common to use the quantitative methods to forecast and warning the insecurity. However, this paper considers more about the probable outcome when the government intervenes. By constructing the causal feedbacks among grain supplement, demand, productive input, and the policy factors to simulate the future food security in Jiangsu province, conclusions can be drawn as the following: (1) The situation of food security is insecure if the self-sufficiency rate is under 68.3% according to the development of system inertia. (2) it is difficult to guarantee the food security in Jiangsu just depending on the increase of grain sown area. (3) The valid solution to ensure the food security in Jiangsu is to improve the productivity. © 2015 Institute of Food Technologists®

  12. PUMAS: The On-line journal of Math and Science Examples for Pre-College Education

    Science.gov (United States)

    Trainer, Melissa G.; Kahn, Ralph A.

    2015-11-01

    PUMAS - “Practical Uses of Math And Science” - is an on-line collection of brief examples showing how math and science topics taught in K-12 classes can be used in interesting settings, including every day life. The examples are written primarily by scientists, engineers, and other content experts having practical experience with the material. They are aimed mainly at classroom teachers to enrich their presentation of math and science topics. The goal of PUMAS is to capture, for the benefit of pre-college education, the flavor of the vast experience that working scientists have with interesting and practical uses of math and science. There are currently over 80 examples in the PUMAS collection, and they are organized by curriculum topics and tagged with relevant grade levels and curriculum topic benchmarks. The published examples cover a wide range of subject matter: from demonstrating why summer is hot, to describing the fluid dynamics of a lava lamp, to calculating the best age to collect Social Security Benefits. The examples are available to all interested parties via the PUMAS web site: http://pumas.nasa.gov/.We invite the community to participate in the PUMAS collection. We seek scientists and scientific thinkers to provide innovative examples of practical uses for teachers to use to enrich the classroom experience, and content experts to participate in peer-review. We also seek teachers to review examples for originality, accuracy of content, clarity of presentation, and grade-level appropriateness. Finally, we encourage teachers to mine this rich repository for real-world examples to demonstrate the value of math in science in everyday life.

  13. Probabilistic Forecasting for On-line Operation of Urban Drainage Systems

    DEFF Research Database (Denmark)

    Löwe, Roland

    This thesis deals with the generation of probabilistic forecasts in urban hydrology. In particular, we focus on the case of runoff forecasting for real-time control (RTC) on horizons of up to two hours. For the generation of probabilistic on-line runoff forecasts, we apply the stochastic grey...... and forecasts have on on-line runoff forecast quality. Finally, we implement the stochastic grey-box model approach in a real-world real-time control (RTC) setup and study how RTC can benefit from a dynamic quantification of runoff forecast uncertainty....

  14. DOE-EPRI On-Line Monitoring Implementation Guidelines

    International Nuclear Information System (INIS)

    E. Davis, R. Bickford

    2003-01-01

    Industry and EPRI experience at several plants has shown on-line monitoring to be very effective in identifying out-of-calibration instrument channels or indications of equipment-degradation problems. The EPRI implementation project for on-line monitoring has demonstrated the feasibility of on-line monitoring at several participating nuclear plants. The results have been very encouraging, and substantial progress is anticipated in the coming years

  15. On line systems of information acquisition

    International Nuclear Information System (INIS)

    Kucharek, P.; Toth, J.

    2004-01-01

    The modern methods of tracing the real state of working funds and the decisions made on the basis of the portfolio of factors, with the possibility of depicting the results of strategical decisions, enable the companies to compete in the hard environs of the global competition. Common platform providing the total information about dynamics of procedures and production goods in the real time is applied in many power plants of the SE, Plc. The software platform SYSTEM 1 is the subject to the constant development in accordance with the needs of modern management of working fond. The System 1(tm) release 5.0 is expected in the second quarter of 2004. New approach to application package according to users demands will provide higher comfort by using a product. New possibilities will be demonstrated on particular SE, Plc applications. Scenario of determination of potential breakdown of a machine - elements of a machine at the very beginning and the way of support decision on different levels of management. Operation, maintenance, optimization of production and the management of the whole company can decide on the basis of the knowledge and the factors provided in real time and fully by one environs directly on the manager's desk

  16. Remote Automatic Material On-Line Sensor

    Energy Technology Data Exchange (ETDEWEB)

    Magnuson, Erik

    2005-12-20

    Low cost NMR sensor for measuring moisture content of forest products. The Department of Energy (DOE) Industries of the Future (IOF) program seeks development and implementation of technologies that make industry more efficient--in particular, more energy-efficient. Quantum Magnetics, Inc. (QM), a wholly-owned subsidiary of GE Security, received an award under the program to investigate roles for low-cost Nuclear Magnetic Resonance (NMR) technology in furtherance of these goals. Most NMR systems are designed for high-resolution spectroscopy applications. These systems use intense magnetic fields produced by superconducting magnets that drive price and operating cost to levels beyond industry tolerance. At low magnetic fields, achievable at low cost, one loses the ability to obtain spectroscopic information. However, measuring the time constants associated with the NMR signal, called NMR relaxometry, gives indications of chemical and physical states of interest to process control and optimization. It was the purpose of this effort to investigate the technical and economic feasibility of using such low-field, low-cost NMR to monitor parameters enabling greater process efficiencies. The primary target industry identified in the Cooperative Development Agreement was the wood industry, where the moisture content of wood is a key process parameter from the time the cut tree enters a mill until the time it is delivered as pieces of lumber. Extracting the moisture is energy consuming, and improvements in drying efficiency stand to reduce costs and emissions substantially. QM designed and developed a new, low-cost NMR instrument suitable for inspecting lumber up to 3 inches by 12 inches in cross section, and other materials of similar size. Low cost is achieved via an inexpensive, permanent magnet and low-cost NMR spectrometer electronics. Laboratory testing demonstrated that the NMR system is capable of accurate ({+-} 0.5%) measurements of the moisture content of wood for

  17. System Dynamics of Polysilicon for Solar Photovoltaics: A Framework for Investigating the Energy Security of Renewable Energy Supply Chains

    Directory of Open Access Journals (Sweden)

    Debra Sandor

    2018-01-01

    Full Text Available Renewable energy, produced with widely available low-cost energy resources, is often included as a component of national strategies to address energy security and sustainability. Market and political forces cannot disrupt the sun or wind, unlike oil and gas supplies. However, the cost of renewable energy is highly dependent on technologies manufactured through global supply chains in leading manufacturing countries. The countries that contribute to the global supply chains may take actions that, directly or indirectly, influence global access to materials and components. For example, high-purity polysilicon, a key material in solar photovoltaics, has experienced significant price fluctuations, affecting the manufacturing capacity and cost of both polysilicon and solar panels. This study developed and validated an initial system dynamics framework to gain insights into global trade in polysilicon. The model represents an initial framework for exploration. Three regions were modeled—China, the United States, and the rest of the world—for a range of trade scenarios to understand the impacts of import duties and non-price drivers on the relative volumes of imports and domestic supply. The model was validated with the historical case of China imposing an import duty on polysilicon from the United States, the European Union, and South Korea, which altered the regional flows of polysilicon—in terms of imports, exports, and domestic production—to varying degrees. As expected, the model tracked how regional demand shares and influx volumes decrease as a duty on a region increases. Using 2016 as a reference point, in the scenarios examined for U.S. exports to China, each 10% increase in the import duty results in a 40% decrease in import volume. The model also indicates that, under the scenarios investigated, once a duty has been imposed on a region, the demand share from that region declines and does not achieve pre-duty levels, even as global

  18. On-Line Monitoring of Fermentation Processes by Near Infrared and Fluorescence Spectroscopy

    DEFF Research Database (Denmark)

    Svendsen, Carina

    Monitoring and control of fermentation processes is important to ensure high product yield, product quality and product consistency. More knowledge on on-line analytical techniques such as near infrared and fluorescence spectroscopy is desired in the fermentation industry to increase the efficiency...... of on-line monitoring systems. The primary aim of this thesis is to elucidate and explore the dynamics in fermentation processes by spectroscopy. Though a number of successful on-line lab-scale monitoring systems have been reported, it seems that several challenges are still met, which limits the number...... of full-scale systems implemented in industrial fermentation processes. This thesis seeks to achieve a better understanding of the techniques near infrared and fluorescence spectroscopy and thereby to solve some of the challenges that are encountered. The thesis shows the advantages of applying real...

  19. Optimization of an on-line function generation

    CERN Document Server

    Versteele, C

    1977-01-01

    A particular example of process control is the analog function generator of the CERN proton synchrotron. For magnet field correction, some magnets have to follow reference currents synchronous with the pulses of the synchrotron. Depending on the dynamic behaviour of the magnet system to be controlled, the output current will show a somewhat distorted image of the reference current used as input. An on-line computer strategy has been designed to compensate the distortions: i.e. to adjust the input function at successive pulses in such a way that the output current follows the reference as closely as required. However, the identification of such a system is not carried out because it is difficult and singular in any case. Modifications cannot be computed directly, but will result from an iterative strategy: the closed-loop adaptive control is based on a maximization procedure, requiring little memory and no gradient information. The algorithm is a variant of the optimization method called extended sequential se...

  20. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  1. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  2. On-line stable isotope measurements during plant and soil gas exchange

    International Nuclear Information System (INIS)

    Yakir, D.

    2001-01-01

    Recent techniques for on-line stable isotope measurements during plant and soil exchange of CO 2 and/or water vapor are briefly reviewed. For CO 2 , these techniques provide means for on-line measurements of isotopic discrimination during CO 2 exchange by leaves in the laboratory and in the field, of isotopic discrimination during soil respiration and during soil-atmosphere CO 2 exchange, and of isotopic discrimination in O 2 during plant respiration. For water vapor, these techniques provide means to measure oxygen isotopic composition of water vapor during leaf transpiration and for the analysis of sub microliter condensed water vapor samples. Most of these techniques involve on-line sampling of CO 2 and water vapor from a dynamic, intact soil or plant system. In the laboratory, these systems also allow on-line isotopic analysis by continuous-flow isotope ratio mass spectrometry. The information obtained with these on-line techniques is becoming increasingly valuable, and often critical, for ecophysiologial research and in the study of biosphere-atmosphere interactions. (author)

  3. Algorithms for the on-line travelling salesman

    NARCIS (Netherlands)

    Ausiello, G.; Feuerstein, E.; Leonardi, S.; Stougie, L.; Talamo, M.

    1999-01-01

    In this paper the problem of efficiently serving a sequence of requests presented in an on-line fashion located at points of a metric space is considered. We call this problem the On-Line Travelling Salesman Problem (OLTSP). It has a variety of relevant applications in logistics and robotics. We

  4. On-Line Voltage Stability Assessment based on PMU Measurements

    DEFF Research Database (Denmark)

    Garcia-Valle, Rodrigo; P. Da Silva, Luiz C.; Nielsen, Arne Hejde

    2009-01-01

    This paper presents a method for on-line monitoring of risk voltage collapse based on synchronised phasor measurement. As there is no room for intensive computation and analysis in real-time, the method is based on the combination of off-line computation and on-line monitoring, which are correlat...

  5. On-line and bulk analysis for the resource industries

    International Nuclear Information System (INIS)

    Lim, C.S.; Sowerby, B.D.; Tickner, J.R.; Madsen, I.C.

    2001-01-01

    Nuclear techniques are the basis of many CSIRO on-line and bulk analysis systems that are now widely used in the mineral and energy industries. The continuous analysis and rapid response of these systems have led to improved control of mining, processing and blending operations. This paper reviews recent developments in neutron, gamma-ray and X-ray techniques for on-line and bulk analysis by CSIRO Minerals including neutron techniques for the on-conveyor belt determination of the composition of cement raw meal, the on-line analysis of composition in pyrometallurgical applications, the on-conveyor belt determination of ash in coal, and the rapid and accurate determination of gold in bulk laboratory samples. The paper also discusses a new gamma-ray technique for the on-line determination of ash in coal and the application of X-ray diffraction techniques for the on-line determination of mineralogy in the cement industry

  6. DYNAMICS OF DEVELOPMENT OF FINANCIAL SAFETY OF THE ENTERPRISE AS A COMPLEX ECONOMIC SECURITY OF THE STATE

    Directory of Open Access Journals (Sweden)

    Tetiana Ganushchak

    2017-09-01

    Full Text Available The purpose of the paper is to the performance of the evaluation of the financial safety of the enterprise. To achieve the stated aim it has been necessary to solve the following tasks: to use the approaches as to the evaluation of the financial safety of the enterprise, to introduce the analysis system of the financial safety of the enterprise, to consider the structural logical scheme of the analysis procedure of the financial safety of the enterprise, to give the description of the integral indicator of the financial safety of the enterprise; to evaluate and compare companies in the paltry industry according to the level of their financial safety. Methodology. Methodologial basis of the research are the scientific methods, such as : method of logical generalization, dialectical method of recognition of the economic phenomena – to give the definitions of «economic security of the enterprise», «financial security of the enterprise», grouping method, analysis which were used to estimate indicator position of the financial security of the poultry company, graph method which was applied to compare integral estimation of the enterprise;methods of synthesis, deduction, induction, method of the expert estimation to calculate and implement integral marker of the financial security of the poultry company;method of the correlation analysis which was used to identify weight coefficients of the all sided figures of the solvency , business activity, profitability, financial steadiness, pay ability. The priority in methods using was defined by the particular tasks and goals. Results of the research showned into a wide set of the ways of financial enterprise safety as a component of economic security of the state. There is an evaluation of enterprise financial safety on the basis of calculations of integral indicator, including combined indices of profitability (unprofitability, pay ability or the lack of that, business activity (fading, financial

  7. Trivariate Modeling of Interparental Conflict and Adolescent Emotional Security: An Examination of Mother-Father-Child Dynamics.

    Science.gov (United States)

    Cheung, Rebecca Y M; Cummings, E Mark; Zhang, Zhiyong; Davies, Patrick T

    2016-11-01

    Recognizing the significance of interacting family subsystems, the present study addresses how interparental conflict is linked to adolescent emotional security as a function of parental gender. A total of 272 families with a child at 12.60 years of age (133 boys, 139 girls) were invited to participate each year for three consecutive years. A multi-informant method was used, along with trivariate models to test the associations among mothers, fathers, and their adolescent children's behaviors. The findings from separate models of destructive and constructive interparental conflict revealed intricate linkages among family members. In the model of destructive interparental conflict, mothers and fathers predicted each other's conflict behaviors over time. Moreover, adolescents' exposure to negativity expressed by either parent dampened their emotional security. Consistent with child effects models, adolescent emotional insecurity predicted fathers' destructive conflict behaviors. As for the model of constructive interparental conflict, fathers predicted mothers' conflict behaviors over time. Adolescents' exposure to fathers' constructive conflict behaviors also enhanced their sense of emotional security. Consistent with child effects models, adolescent emotional security predicted mothers' and fathers' constructive conflict behaviors. These findings extended the family and the adolescent literature by indicating that family processes are multiidirectional, involving multiple dyads in the study of parents' and adolescents' functioning. Contributions of these findings to the understanding of interparental conflict and emotional security in adolescence are discussed.

  8. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  9. The effect of lignite quality variation on the efficiency of on-line ash analyzers

    Energy Technology Data Exchange (ETDEWEB)

    Galetakis, Michael J. [Technical University of Crete, Dept. of Mineral Resources Engineering, University Campus, 73 100 Hania (Greece); Pavloudakis, Francis F. [Public Power Corporation SA, General Division of Mines, Kifisou and Dyrrahiou 89, 104 43 Athens (Greece)

    2009-12-01

    A sustainable coal industry needs to achieve a number of objectives including improvements in utilization of deposits, energy efficiency, and environmental performance during combustion. The ''Clean Coal Concept'' promises to combine the secure and low cost electricity supply offered by hard coal and lignite with adequate environmental precautions. In this context, modern quality control systems, which are greatly based on the on-line analyzers, play an important role in achieving sustainability targets. This paper examines the possibility of using commercial on-line analysis systems for monitoring the mineral matter content of low quality lignite mined from the lignite basin of Megalopolis, Peloponnese, Greece. The effect of the accuracy of the on-line analyzers to process control, when used for the characterization of low rank coals with complex and variable composition, is investigated by carrying out numerous bench- and pilot-scale trials. Pilot-scale trials were based on a dual energy gamma-ray transmission analyzer, which was installed on the conveyor belt that transports lignite from the mine pit to the homogenization stockyard. All measurement data were compared to data gathered during the realisation of similar trials in the lignite mines of Ptolemais Basin, Northern Greece. Results indicated that the accuracy of the on-line measurements was not satisfactory and did not allow lignite quality monitoring in real time. The achieved inferior accuracy of the on-line measurement's accuracy, compared to previous applications at other mining sites, was related to the intense variation of the mineral matter content of lignite and lignite composition, which distorted the calibration of the analyzer. The latter is based on certain assumptions regarding the average mass absorption coefficient of the organic and mineral matter contained in the lignite. Further experimental work is needed to investigate solutions for successful implementation of

  10. Understanding on-line community: the affordances of virtual space

    Directory of Open Access Journals (Sweden)

    Karen Ruhleder

    2002-01-01

    Full Text Available Increasing numbers of on-line venues for learning are emerging as virtual communities become more accessible and commonplace. This paper looks at one particular virtual community, an on-line degree programme at the University of Illinois, Urbana-Champaign, which offers an M.S. in Library and Information Science (called LEEP. It draws on a framework presented by Mynatt, et al. (1998, which provides a lens for talking about on-line community as a set of affordances. This framework is applied to illustrate the interactions, artefacts, and expectations that shape this community.

  11. An Approach to On-line Risk Assessment in NPP

    International Nuclear Information System (INIS)

    Simic, Z.; Mikulicic, V.; O'Brien, J.

    1996-01-01

    Probabilistic Risk Assessment (PRA) can provide safety status information for a plant during different configurations; additional effort is needed to do this in real time for on-line operation. This paper describes an approach to use PRA to achieve these goals. A Risk Assessment On-Line (RAOL) application was developed to monitor maintenance (on-line and planned) activities. RAOL is based on the results from a full-scope PRA, engineering/operational judgment and incorporates a user friendly program interface approach. Results from RAOL can be used by planners or operations to effectively manage the level of risk by controlling the actual plant configuration. (author)

  12. On-line spectroscopy with thermal atomic beams

    International Nuclear Information System (INIS)

    Thibault, C.; Guimbal, P.; Klapisch, R.; Saint Simon, M. de; Serre, J.M.; Touchard, F.; Duong, H.T.; Jacquinot, P.; Juncar, P.

    1981-01-01

    On-line high resolution laser spectroscopy experiments have been performed in which the light from a cw tunable dye laser interacts at right angles with a thermal atomic beam. sup(76-98)Rb, sup(118-145)Cs and sup(208-213)Fr have been studied using the ionic beam delivered by the ISOLDE on-line mass separator at CERN while sup(20-31)Na and sup(38-47)K have been studied by setting the apparaturs directly on-line with the PS 20 GeV proton beam. The principle of the method is briefly explained and some results concerning nuclear structure are given. (orig.)

  13. Comparison of On-Line Maintenance Support Tools

    International Nuclear Information System (INIS)

    Simic, Z.; Follen, S. M.; Mikulicic, V.

    1998-01-01

    Modeling approach to on-line risk monitoring is today in a rapid developing phase. For that reason number of different solutions are available. This paper will attempt to present existing approaches to address on-line risk modeling problem Starting with description of on-line risk monitoring issues in general, then following by presentation of existing software tools (EPRI's Safety Monitor, Equipment Out of Service Monitor, and ORAM-SENTINEL) the current state of the art in this area will be demonstrated. Finally, conclusions and ideas will be outlined. (author)

  14. Intelligent on-line fault tolerant control for unanticipated catastrophic failures.

    Science.gov (United States)

    Yen, Gary G; Ho, Liang-Wei

    2004-10-01

    As dynamic systems become increasingly complex, experience rapidly changing environments, and encounter a greater variety of unexpected component failures, solving the control problems of such systems is a grand challenge for control engineers. Traditional control design techniques are not adequate to cope with these systems, which may suffer from unanticipated dynamic failures. In this research work, we investigate the on-line fault tolerant control problem and propose an intelligent on-line control strategy to handle the desired trajectories tracking problem for systems suffering from various unanticipated catastrophic faults. Through theoretical analysis, the sufficient condition of system stability has been derived and two different on-line control laws have been developed. The approach of the proposed intelligent control strategy is to continuously monitor the system performance and identify what the system's current state is by using a fault detection method based upon our best knowledge of the nominal system and nominal controller. Once a fault is detected, the proposed intelligent controller will adjust its control signal to compensate for the unknown system failure dynamics by using an artificial neural network as an on-line estimator to approximate the unexpected and unknown failure dynamics. The first control law is derived directly from the Lyapunov stability theory, while the second control law is derived based upon the discrete-time sliding mode control technique. Both control laws have been implemented in a variety of failure scenarios to validate the proposed intelligent control scheme. The simulation results, including a three-tank benchmark problem, comply with theoretical analysis and demonstrate a significant improvement in trajectory following performance based upon the proposed intelligent control strategy.

  15. The development of the microcomputer controlling system for micro uranium on-line analyser

    CERN Document Server

    Ye Guo Qiang

    2002-01-01

    The author presents the microcomputer controlling system for micro uranium on-line analyser under Windows 3.2 system (Chinese). The user program is designed with Visual Basic 4.0, the program of controlling the hardware interface with Windows Dynamic Linking Library (DLL) which is programmed by Borland C sup + sup + 4.5, and the date processing is with Access 2.0 database

  16. On-line methanol sensor system development for recombinant ...

    African Journals Online (AJOL)

    On-line methanol sensor system development for recombinant human serum ... of the methanol sensor system was done in a medium environment with yeast cells ... induction at a low temperature and a pH where protease does not function.

  17. On-line control systems in power plants

    International Nuclear Information System (INIS)

    Freymeyer, P.

    1981-01-01

    This report is a review of on-line control systems as a complex system connected with all problems like, development, planning, degree of automation, economics, service, quality and documentation. (orig.) [de

  18. Why do People Stop Playing On-Line Games?

    DEFF Research Database (Denmark)

    Sudzina, Frantisek; Razmerita, Liana

    2012-01-01

    The recent initial public offering of shares of Zynga, probably the most important on-line game provider, drew interest of potential investors but also of general public to their business model. What the most interested people learned so far is that if Zynga had not changed their accounting...... practice, they would be in red numbers for several months already. This is most likely caused by people stopping to play their games. This paper provides an estimate of what proportion of people, who played on-line games, already stopped playing them. Additionally, it analyzed the reasons why people...... stopped playing on-line games. It also compares Facebook and other on-line games....

  19. A signal-flow-graph approach to on-line gradient calculation.

    Science.gov (United States)

    Campolucci, P; Uncini, A; Piazza, F

    2000-08-01

    A large class of nonlinear dynamic adaptive systems such as dynamic recurrent neural networks can be effectively represented by signal flow graphs (SFGs). By this method, complex systems are described as a general connection of many simple components, each of them implementing a simple one-input, one-output transformation, as in an electrical circuit. Even if graph representations are popular in the neural network community, they are often used for qualitative description rather than for rigorous representation and computational purposes. In this article, a method for both on-line and batch-backward gradient computation of a system output or cost function with respect to system parameters is derived by the SFG representation theory and its known properties. The system can be any causal, in general nonlinear and time-variant, dynamic system represented by an SFG, in particular any feedforward, time-delay, or recurrent neural network. In this work, we use discrete-time notation, but the same theory holds for the continuous-time case. The gradient is obtained in a straightforward way by the analysis of two SFGs, the original one and its adjoint (obtained from the first by simple transformations), without the complex chain rule expansions of derivatives usually employed. This method can be used for sensitivity analysis and for learning both off-line and on-line. On-line learning is particularly important since it is required by many real applications, such as digital signal processing, system identification and control, channel equalization, and predistortion.

  20. The Daresbury On-Line Isotope Separator (DOLIS)

    International Nuclear Information System (INIS)

    Grant, I.S.; Eastham, D.A.; Groves, J.; Tolfree, D.W.L.; Walker, P.M.; Green, V.R.; Rikovska, J.; Stone, N.J.; Hamilton, W.D.

    1987-01-01

    The isotope separator DOLIS, which is on-line to the Daresbury Laboratory's 20-MV tandem accelerator, is used to measure nuclear moments and decay schemes. Separated beams may be collected on a tape and transported to a counting station, implanted directly into a host lattice at on-line temperatures down to less than 10 mK, or allowed to interact with a collinear laser beam. The present status of DOLIS and its ancillary equipment is described

  1. The Daresbury on-line isotope separator (DOLIS)

    International Nuclear Information System (INIS)

    Grant, I.S.; Eastham, D.A.; Groves, J.; Tolfree, D.W.L.; Walker, P.M.; Green, V.R.; Rikovska, J.; Stone, N.J.; Hamilton, W.D.

    1987-01-01

    The isotope separator DOLIS, which is on-line to the Daresbury Laboratory's 20-MV tandem accelerator, is used to measure nuclear moments and decay schemes. Separated beams may be collected on a tape and transported to a counting station, implanted directly into a host lattice at on-line temperatures down to less than 10 mK, or allowed to interact with a collinear laser beam. The present status of DOLIS and its ancillary equipment is described. (orig.)

  2. On-line mixture-based alternative to logistic regression

    Czech Academy of Sciences Publication Activity Database

    Nagy, Ivan; Suzdaleva, Evgenia

    2016-01-01

    Roč. 26, č. 5 (2016), s. 417-437 ISSN 1210-0552 R&D Projects: GA ČR GA15-03564S Institutional support: RVO:67985556 Keywords : on-line modeling * on-line logistic regression * recursive mixture estimation * data dependent pointer Subject RIV: BB - Applied Statistics, Operational Research Impact factor: 0.394, year: 2016 http://library.utia.cas.cz/separaty/2016/ZS/suzdaleva-0464463.pdf

  3. A Comparison Between a Dynamic and Static Approach to Asset Management Using CAPM Models on the Australian Securities Market

    Directory of Open Access Journals (Sweden)

    Dionigi Gerace

    2015-06-01

    Full Text Available Despite the capital asset pricing model being one of the most influential mod¬els in modern portfolio theory, it has also been a victim of criticism in numerous academic papers. Its assumptions which seem to be rather unre¬alistic, have caused many academics to improve the model by relaxing some of its restrictive statements. In this journal article, we compare the performance of an optimal portfolio of securities in the Australian securities market by constructing two theoretical portfolios; one using the capital asset pricing model which uses a single beta throughout a static investment horizon; and another, which allows the op¬timal portfolio to be rebalanced each week with an adjusted beta. The performance of the two theoretical portfolios is compared to determine the superior model. Overall, findings showed that due to rebalancing of the portfolio, the multiple period model was the superior model based on before and after transaction cost returns.

  4. Political-Security, Economy, and Culture within the Dynamics of Geopolitics and Migration: On Philippine Territory and the Filipino People

    OpenAIRE

    John X. LAMBINO

    2015-01-01

    The paper considers the interaction of the dual elements of the nation-state: territory and people. Particularly, it discusses the interaction of geopolitics and migration, i.e. the non-mobile territory and the mobile people, from the perspectives of political-security, economy, and culture, and how the interactions influence government policy focusing on the case of the Philippines.The paper ferrets-out the major factors in the geopolitical transformation of the Philippine Is-lands into the ...

  5. On-line determination of operating limits incorporating constraint costs and reliability assessment

    International Nuclear Information System (INIS)

    Meisingset, M.; Lovas, G. G.

    1997-01-01

    Problems regarding power system operation following deregulation were discussed. The problems arise as a result of the increased power flow pattern created by deregulation and competitive power markets, resulting in power in excess of N-1, (the capacity of transmission lines available), which in turn creates bottlenecks. In a situation like this, constraint costs and security costs (i.e. the cost of supply interruptions) are incurred as the direct result of the deterministic criteria used in reliability assessment. This paper describes an on-line probabilistic method to determine operating limits based on a trade-off between constraint costs and security costs. The probability of the contingencies depend on the existing weather conditions, which therefore has significant impact on the calculated operating limit. In consequence, the proposed method allows power flow to exceed the N-1 limit during normal weather. Under adverse weather conditions the N-1 criteria should be maintained. 15 refs., 13 figs

  6. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  7. On Line Disaster Response Community: People as Sensors of High Magnitude Disasters Using Internet GIS

    Directory of Open Access Journals (Sweden)

    Kris Kodrich

    2008-05-01

    Full Text Available The Indian Ocean tsunami (2004 and Hurricane Katrina (2005 reveal the coming of age of the on-line disaster response community. Due to the integration of key geospatial technologies (remote sensing - RS, geographic information systems - GIS, global positioning systems – GPS and the Internet, on-line disaster response communities have grown. They include the traditional aspects of disaster preparedness, response, recovery, mitigation, and policy as facilitated by governmental agencies and relief response organizations. However, the contribution from the public via the Internet has changed significantly. The on-line disaster response community includes several key characteristics: the ability to donate money quickly and efficiently due to improved Internet security and reliable donation sites; a computer-savvy segment of the public that creates blogs, uploads pictures, and disseminates information – oftentimes faster than government agencies, and message boards to create interactive information exchange in seeking family members and identifying shelters. A critical and novel occurrence is the development of “people as sensors” - networks of government, NGOs, private companies, and the public - to build rapid response databases of the disaster area for various aspects of disaster relief and response using geospatial technologies. This paper examines these networks, their products, and their future potential.

  8. On-line vibration and loose parts monitoring of nuclear power stations as a preventive maintenance tool

    International Nuclear Information System (INIS)

    An equipment for on-line monitoring of vibrations and loose parts of nuclear power plants is described. The unit consists of piezoelectric transducers, preamplifiers, a data processor, and peripherals. It secures on-line measurement without interfering with the operation of the power plant. A diagram is given showing the monitor of vibrations and loose parts for pressurized water reactors and the Spectra-Scan equipment for the automatic recording and computer processing of noise signals is described. A survey is given of diagnostic methods for internal vibrations, noise and oscillations and procedures for the analysis of recordings are described. The experiences of Atomica International with the observation of vibrations in nuclear power plants are described and an economic assessment is presented of the efficiency of on-line monitoring of these vibrations. A cost-benefit analysis is made of such equipment which justifies their introduction. (B.S.)

  9. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  10. On-line maintenance PSA support at NPP Krsko

    International Nuclear Information System (INIS)

    Prosen, R.; Vrbanic, I.; Kastelan, M.

    2000-01-01

    In 1997 Krsko NPP initiated the on-line maintenance (OLM) practice. On-line maintenance constitutes of corrective activities, preventive activities, surveillance activities, tests and inspections, as well as calibrations and modifications, taking place during the normal power operations. The on-line maintenance is a multidisciplinary process consisting of activity specification, planning, and preparation and performing of the OLM activity of interest. The primary role of the PSA group is to assess from the r isk perspective , using the plant-specific NEK PSA model, system unavailability and the impact to the plant operational risk. The intent is to support planning of the on-line maintenance activities from the risk perspective. The risk evaluation of the OLM activities is based on the probability of core damage evaluation for the defined discrete plant configuration states, determined by the OLM activities. Within this application, the optimized, plant-specific PSA model is used on Risk Spectrum platform. To perform the risk assessment of the on-line maintenance activities, first the systems to be affected are defined based on the planned OLM activities. The next important step is the assessment of the planned work schedule. To define the final schedule, the co-ordination and optimizing the planned OLM activities needs activation of all participating departments, supported also from PSA group. The P3 (i.e. Primavera) planning tool system windows are defined for different systems and groups of systems, and the activities are sorted in particular weeks according to these windows. (author)

  11. OLDASS: On-line data acquisition system at SF cyclotron

    International Nuclear Information System (INIS)

    Omata, Kazuo; Yasue, Masaharu; Hamagaki, Hideki

    1982-01-01

    The on-line data acquisition system in the Institute for Nuclear Study, the University of Tokyo, is composed of 2 systems of Fujitsu mini-computer PFU-400 for data processing at the high energy synchrotron and one system of that computer for low energy cyclotron as terminals, the host computer being M 180 II AD of the same company. This system has been developed to have the features of being the on-line system capable of following the improvement of host computer performance, being capable of developing the on-line programmes of other experimenting groups in parallel with batch jobs or the operation of the on-line system, and capable of developing programmes using FORTRAN. The result of about 220 KB/s was obtained for the data transfer rate between the programmes of the host computer and terminals, and this fulfilled the aimed performance. The terminal system on the low energy side is provided with an ADC interface and a display interface specified particularly in addition to the miniature computer PFU400 and standard I/O devices of the manufacture. The accumulating type graphic display of the I/O devices can be switched to be connected to the host computer, and immediately displays the results transferred to the host computer and analyzed. Hard copy is also available. The above hardware and software are explained. The on-line system insures 80 K bytes of the total memory of 224 K bytes for data area. (Wakatsuki, Y.)

  12. Sport Management Taught On-Line: A Discussion

    Directory of Open Access Journals (Sweden)

    William F. Stier Jr

    2009-01-01

    Full Text Available An introduction to the world of on-line courses (distance education/learning is presented. In addition, the world of on-line learning, as it pertains to sport management, is examined within the framework of (a pedagogy, (b finances,(c assessment, and (d choosing to transition from the traditional classroom to on-line learning. Pertinent points relative to each of the four categories are presented from the literature. In an effort to stimulate thought and discussion to the subject of on-line learning for sport management programs/courses the authors provide their reactions to the literature points by presenting their comments/reactions from a sport management perspective. Sport management professors and administrators are encouraged to critically examine the feasibility of such on-line courses (distance education/learning within their own curricula while maintaining an appropriate framework revolving around sound theoretical instructional strategies, methods as well as appropriate use of instructional tools, including but not limited to, computersand the WWW.

  13. A reconfigurable on-line learning spiking neuromorphic processor comprising 256 neurons and 128K synapses.

    Science.gov (United States)

    Qiao, Ning; Mostafa, Hesham; Corradi, Federico; Osswald, Marc; Stefanini, Fabio; Sumislawska, Dora; Indiveri, Giacomo

    2015-01-01

    Implementing compact, low-power artificial neural processing systems with real-time on-line learning abilities is still an open challenge. In this paper we present a full-custom mixed-signal VLSI device with neuromorphic learning circuits that emulate the biophysics of real spiking neurons and dynamic synapses for exploring the properties of computational neuroscience models and for building brain-inspired computing systems. The proposed architecture allows the on-chip configuration of a wide range of network connectivities, including recurrent and deep networks, with short-term and long-term plasticity. The device comprises 128 K analog synapse and 256 neuron circuits with biologically plausible dynamics and bi-stable spike-based plasticity mechanisms that endow it with on-line learning abilities. In addition to the analog circuits, the device comprises also asynchronous digital logic circuits for setting different synapse and neuron properties as well as different network configurations. This prototype device, fabricated using a 180 nm 1P6M CMOS process, occupies an area of 51.4 mm(2), and consumes approximately 4 mW for typical experiments, for example involving attractor networks. Here we describe the details of the overall architecture and of the individual circuits and present experimental results that showcase its potential. By supporting a wide range of cortical-like computational modules comprising plasticity mechanisms, this device will enable the realization of intelligent autonomous systems with on-line learning capabilities.

  14. Object-Oriented Control System Design Using On-Line Training of Artificial Neural Networks

    Science.gov (United States)

    Rubaai, Ahmed

    1997-01-01

    This report deals with the object-oriented model development of a neuro-controller design for permanent magnet (PM) dc motor drives. The system under study is described as a collection of interacting objects. Each object module describes the object behaviors, called methods. The characteristics of the object are included in its variables. The knowledge of the object exists within its variables, and the performance is determined by its methods. This structure maps well to the real world objects that comprise the system being modeled. A dynamic learning architecture that possesses the capabilities of simultaneous on-line identification and control is incorporated to enforce constraints on connections and control the dynamics of the motor. The control action is implemented "on-line", in "real time" in such a way that the predicted trajectory follows a specified reference model. A design example of controlling a PM dc motor drive on-line shows the effectiveness of the design tool. This will therefore be very useful in aerospace applications. It is expected to provide an innovative and noval software model for the rocket engine numerical simulator executive.

  15. On Line Service Composition in the Integrated Clinical Environment for eHealth and Medical Systems.

    Science.gov (United States)

    García-Valls, Marisol; Touahria, Imad Eddine

    2017-06-08

    Medical and eHealth systems are progressively realized in the context of standardized architectures that support safety and ease the integration of the heterogeneous (and often proprietary) medical devices and sensors. The Integrated Clinical Environment (ICE) architecture appeared recently with the goal of becoming a common framework for defining the structure of the medical applications as concerns the safe integration of medical devices and sensors. ICE is simply a high level architecture that defines the functional blocks that should be part of a medical system to support interoperability. As a result, the underlying communication backbone is broadly undefined as concerns the enabling software technology (including the middleware) and associated algorithms that meet the ICE requirements of the flexible integration of medical devices and services. Supporting the on line composition of services in a medical system is also not part of ICE; however, supporting this behavior would enable flexible orchestration of functions (e.g., addition and/or removal of services and medical equipment) on the fly. iLandis one of the few software technologies that supports on line service composition and reconfiguration, ensuring time-bounded transitions across different service orchestrations; it supports the design, deployment and on line reconfiguration of applications, which this paper applies to service-based eHealth domains. This paper designs the integration between ICE architecture and iLand middleware to enhance the capabilities of ICE with on line service composition and the time-bounded reconfiguration of medical systems based on distributed services. A prototype implementation of a service-based eHealth system for the remote monitoring of patients is described; it validates the enhanced capacity of ICE to support dynamic reconfiguration of the application services. Results show that the temporal cost of the on line reconfiguration of the eHealth application is bounded

  16. Initiating Events Modeling for On-Line Risk Monitoring Application

    International Nuclear Information System (INIS)

    Simic, Z.; Mikulicic, V.

    1998-01-01

    In order to make on-line risk monitoring application of Probabilistic Risk Assessment more complete and realistic, a special attention need to be dedicated to initiating events modeling. Two different issues are of special importance: one is how to model initiating events frequency according to current plant configuration (equipment alignment and out of service status) and operating condition (weather and various activities), and the second is how to preserve dependencies between initiating events model and rest of PRA model. First, the paper will discuss how initiating events can be treated in on-line risk monitoring application. Second, practical example of initiating events modeling in EPRI's Equipment Out of Service on-line monitoring tool will be presented. Gains from application and possible improvements will be discussed in conclusion. (author)

  17. Strengthening weak ties through on-line gaming

    DEFF Research Database (Denmark)

    Sudzina, Frantisek; Razmerita, Liana Virginia; Kirchner, Kathrin

    On-line gaming became widespread in the last couple of years. The aim of the research presented in the paper is to figure out to what extent does game playing helps to strengthen weak ties and what additional factors influence this process. The approach is rather exploratory – some factors...... are grounded in theory, some are new. These factors are age, gender, place of origin, number of their Facebook connections (friends in Facebook terminology), the amount of time they are on Facebook, the amount of time they keep the Facebook site open, the amount of time they play on-line games, and the reasons...... for starting to play on-line games. Regarding the latter, we chose to focus only on escapist reasons....

  18. Thermographic Sensing For On-Line Industrial Control

    Science.gov (United States)

    Holmsten, Dag

    1986-10-01

    It is today's emergence of thermoelectrically cooled, highly accurate infrared linescanners and imaging systems that has definitely made on-line Infraread Thermography (IRT) possible. Specifically designed for continuous use, these scanners are equipped with dedicated software capable of monitoring and controlling highly complex thermodynamic situations. This paper will outline some possible implications of using IRT on-line by describing some uses of this technology in the steel-making (hot rolling) and automotive industries (machine-vision). A warning is also expressed that IRT technology not originally designed for automated applications e.g. high resolution, imaging systems, should not be directly applied to an on-line measurement situation without having its measurement resolution, accuracy and especially its repeatability, reliably proven. Some suitable testing procedures are briefly outlined at the end of the paper.

  19. An on-line monitoring system for navigation equipment

    Science.gov (United States)

    Wang, Bo; Yang, Ping; Liu, Jing; Yang, Zhengbo; Liang, Fei

    2017-10-01

    Civil air navigation equipment is the most important infrastructure of Civil Aviation, which is closely related to flight safety. In addition to regular flight inspection, navigation equipment's patrol measuring, maintenance measuring, running measuring under special weather conditions are the important means of ensuring aviation flight safety. According to the safety maintenance requirements of Civil Aviation Air Traffic Control navigation equipment, this paper developed one on-line monitoring system with independent intellectual property rights for navigation equipment, the system breakthroughs the key technologies of measuring navigation equipment on-line including Instrument Landing System (ILS) and VHF Omni-directional Range (VOR), which also meets the requirements of navigation equipment ground measurement set by the ICAO DOC 8071, it provides technical means of the ground on-line measurement for navigation equipment, improves the safety of navigation equipment operation, and reduces the impact of measuring navigation equipment on airport operation.

  20. On-line calculation of 3-D power distribution

    International Nuclear Information System (INIS)

    Park, Y. H.; In, W. K.; Park, J. R.; Lee, C. C.; Auh, G. S.

    1996-01-01

    The 3-D power distribution synthesis scheme was implemented in Totally Integrated Core Operation Monitoring System (TICOMS), which is under development as the next generation core monitoring system. The on-line 3-D core power distribution obtained from the measured fixed incore detector readings is used to construct the hot pin power as well as the core average axial power distribution. The core average axial power distribution and the hot pin power of TICOMS were compared with those of the current digital on-line core monitoring system, COLSS, which construct the core average axial power distribution and the pseudo hot pin power. The comparison shows that TICOMS results in the slightly more accurate core average axial power distribution and the less conservative hot pin power. Therefore, these results increased the core operating margins. In addition, the on-line 3-D power distribution is expected to be very useful for the core operation in the future

  1. Approaches for on-line coupling of extraction and chromatography

    Energy Technology Data Exchange (ETDEWEB)

    Hyoetylaeinen, Tuulia; Riekkola, Marja-Liisa [Laboratory of Analytical Chemistry, Department of Chemistry, University of Helsinki, P.O. Box 55, 00014, Helsinki (Finland)

    2004-04-01

    This review provides an overview of the approaches available in order to perform on-line coupling of various extraction techniques with liquid and gas chromatography, for the analysis of semivolatile and nonvolatile analytes in liquid and solid samples. The main focus is on the instrumental set-up of these techniques. Selected real applications are described by way of illustration. The extraction methods suitable for on-line coupling covered in this review are: liquid-liquid extraction, solid-phase extraction, membrane-based techniques, pressurised liquid extraction, supercritical fluid extraction, and microwave- and sonication-assisted extractions. The following systems are not covered in this review: on-line coupled solid-phase extraction-liquid chromatography, purge-and-trap-GC, and membrane extraction with a sorbent interface-GC. (orig.)

  2. UNISOR on-line nuclear orientation facility (UNISOR/NOF)

    International Nuclear Information System (INIS)

    Girit, I.C.; Alton, G.D.; Bingham, C.R.; Carter, H.K.; Simpson, M.L.; Cole, J.D.; Croft, W.L.; Hamilton, J.H.; Jones, E.F.; Gore, P.M.; Kormicki, J.; Xie, H.; Kern, B.D.; Krane, K.S.; Xu, Y.S.; Mantica, P.F. Jr.; Zimmermann, B.E.; Nettles, W.G.; Zganjar, E.F.; Kortelahti, M.O.; Newbolt, W.B.

    1988-01-01

    The UNISOR on-line nuclear orientation facility (UNISOR/NOF) consists of a 3 He- 4 He dilution refrigerator on line to the isotope separator. Nuclei are implanted directly into a target foil which is soldered to the bottom accessed cold finger of the refrigerator. A 1.5 T superconducting magnet polarizes the ferromagnetic target foils and determines the axis of symmetry. Up to eight gamma detectors can be positioned around the refrigerator, each 9 cm from the target. A unique feature of this system is that the k=4 term in the directional distribution function can be directly and unambigously deduced so that a single solution for the mixing ratio can be found. The first on-line experiment at this facility reported here was a study of the decay of the 191 Hg and 193 Hg isotopes. (orig.)

  3. Making the most of on-line recruiting.

    Science.gov (United States)

    Cappelli, P

    2001-03-01

    Ninety percent of large U.S. companies are already recruiting via the Internet. By simply logging on to the Web, company recruiters can locate vast numbers of qualified candidates for jobs at every level, screen them in minutes, and contact the most promising ones immediately. The payoffs can be enormous: it costs substantially less to hire someone on-line, and the time saved is equally great. In this article, Peter Cappelli examines some of the emerging service providers and technologies--matchmakers, job boards, hiring management systems software, and applicant-screening mechanisms that test skills and record interests. He also looks at some of the strategies companies are adopting as they enter on-line labor markets. Recruiting needs to be refashioned to resemble marketing, he stresses. Accordingly, smart companies are designing Web pages, and even product ads, with potential recruits in mind. They're giving line managers authority to hire so that candidates in cyberspace aren't lost. They're building internal on-line job networks to retain talent. Integrating recruiting efforts with overall marketing campaigns, especially through coordination and identification with the company's brand, is the most important thing companies can do to ensure success in on-line hiring. Along the way, Cappelli sounds two cautionary notes. First, a human touch, not electronic contact, is vital in the last steps of a successful hiring process. Second, companies must make sure that on-line testing and hiring criteria do not discriminate against women, disabled people, workers over 40, or members of minority groups. When competition for talent is fierce, companies that master the art and science of on-line recruiting will be the ones that attract and keep the best people.

  4. Radiation source states on-line supervision system design and implementation based on RFID technology

    International Nuclear Information System (INIS)

    Yang Binhua; Ling Qiu; Yin Guoli; Yang Kun; Wan Xueping; Wang Kan

    2011-01-01

    It puts forward radiation source states on-line monitoring resolution based on RFID technology. Firstly, the system uses RFID in real-time transmission of the radiation dose rate, and monitors the radiation source states and dose rate of the surrounding environment on-line. Then it adopts regional wireless networking mode to construct enterprise level monitoring network, which resolves long-distance wiring problems. And then it uses GPRS wireless to transport the real-time data to the monitoring center and the government supervision department, By adopting randomly dynamic cording in display update every day, it strengthens the supervision of the radiation source. At last this system has been successful applied to a thickness gauge project, which verifies the feasibility and practicality is good. (authors)

  5. On-Line Tracking Controller for Brushless DC Motor Drives Using Artificial Neural Networks

    Science.gov (United States)

    Rubaai, Ahmed

    1996-01-01

    A real-time control architecture is developed for time-varying nonlinear brushless dc motors operating in a high performance drives environment. The developed control architecture possesses the capabilities of simultaneous on-line identification and control. The dynamics of the motor are modeled on-line and controlled using an artificial neural network, as the system runs. The control architecture combines the experience and dependability of adaptive tracking systems with potential and promise of the neural computing technology. The sensitivity of real-time controller to parametric changes that occur during training is investigated. Such changes are usually manifested by rapid changes in the load of the brushless motor drives. This sudden change in the external load is simulated for the sigmoidal and sinusoidal reference tracks. The ability of the neuro-controller to maintain reasonable tracking accuracy in the presence of external noise is also verified for a number of desired reference trajectories.

  6. Modeling a multivariable reactor and on-line model predictive control.

    Science.gov (United States)

    Yu, D W; Yu, D L

    2005-10-01

    A nonlinear first principle model is developed for a laboratory-scaled multivariable chemical reactor rig in this paper and the on-line model predictive control (MPC) is implemented to the rig. The reactor has three variables-temperature, pH, and dissolved oxygen with nonlinear dynamics-and is therefore used as a pilot system for the biochemical industry. A nonlinear discrete-time model is derived for each of the three output variables and their model parameters are estimated from the real data using an adaptive optimization method. The developed model is used in a nonlinear MPC scheme. An accurate multistep-ahead prediction is obtained for MPC, where the extended Kalman filter is used to estimate system unknown states. The on-line control is implemented and a satisfactory tracking performance is achieved. The MPC is compared with three decentralized PID controllers and the advantage of the nonlinear MPC over the PID is clearly shown.

  7. The User-friendly On-Line Diffusion Chamber

    CERN Document Server

    Aviles Acosta, Jaime

    2015-01-01

    The On-Line Diffusion Chamber is a stand-alone apparatus built to carry out short-live radiotracer diffusion studies. The availability of the on-demand production of isotopes in the ISOLDE facility, and the design of the apparatus to streamline the implantation process, annealing treatment, ion gun ablation with a tape transport system, and radiation intensity measurement with a Ge gamma detector all in the same apparatus, gives the On-Line Diffusion Chamber a unique ability to studies with short-lived radioisotopes or isomer states that are not possible in any other facility in the world.

  8. The rationalization of desulfurization by on-line analysis

    Energy Technology Data Exchange (ETDEWEB)

    Murakami, Y; Kohmura, S; Taketomi, H; Matsumura, S; Sasaki, Y

    1986-01-01

    Nippon Kokan uses the Takahax and Sulfiban processes for the desulfurization of coke oven gas. The authors outline the Sulfiban Process and describe a recently developed system for the on-line determination of H/sub 2/S in coke oven gas, and of CO/sub 2/ and monoethanolamine (MEA) in the wash oil. This new on-line analysis system has proved effective in rationalizing the Sulfiban Process via lower MEA production costs and decreased power consumption. The introduction of a computerized control system is now being studied. 7 figs., 4 tabs.

  9. 5th Computer Science On-line Conference

    CERN Document Server

    Senkerik, Roman; Oplatkova, Zuzana; Silhavy, Petr; Prokopova, Zdenka

    2016-01-01

    This volume is based on the research papers presented in the 5th Computer Science On-line Conference. The volume Artificial Intelligence Perspectives in Intelligent Systems presents modern trends and methods to real-world problems, and in particular, exploratory research that describes novel approaches in the field of artificial intelligence. New algorithms in a variety of fields are also presented. The Computer Science On-line Conference (CSOC 2016) is intended to provide an international forum for discussions on the latest research results in all areas related to Computer Science. The addressed topics are the theoretical aspects and applications of Computer Science, Artificial Intelligences, Cybernetics, Automation Control Theory and Software Engineering.

  10. An on-line adaptive core monitoring system

    International Nuclear Information System (INIS)

    Verspeek, J.A.; Bruggink, J.C.; Karuza, J.

    1997-01-01

    An on-line core monitoring system has been in operation for three years in the Dodewaard Nuclear Power Plant. The core monitor uses the on-line measured reactor data as an input for a power distribution calculation. The measurements are frequently performed. The system is used for monitoring as well as for predicting purposes. The limiting thermal hydraulic parameters are monitored as well as the pellet-clad interaction limits. The data are added to a history file used for cycle burn-up calculations and trending of parameters. The reactor states are presented through a convenient graphical user interface. (authors)

  11. On-Line Generation of 3D-Waves

    DEFF Research Database (Denmark)

    Frigaard, Peter

    1992-01-01

    The paper describes the technique of filtering white noise for on-line generation of 3D-waves on a small computer in the laboratory. The wave generation package is implemented and tested in the 3D-wave basin at the University of Aalborg.......The paper describes the technique of filtering white noise for on-line generation of 3D-waves on a small computer in the laboratory. The wave generation package is implemented and tested in the 3D-wave basin at the University of Aalborg....

  12. Nonparametric modeling of US interest rate term structure dynamics and implications on the prices of derivative securities

    NARCIS (Netherlands)

    Jiang, GJ

    1998-01-01

    This paper develops a nonparametric model of interest rate term structure dynamics based an a spot rate process that permits only positive interest rates and a market price of interest rate risk that precludes arbitrage opportunities. Both the spot rate process and the market price of interest rate

  13. Adaptive control based on an on-line parameter estimation of an upper limb exoskeleton.

    Science.gov (United States)

    Riani, Akram; Madani, Tarek; Hadri, Abdelhafid El; Benallegue, Abdelaziz

    2017-07-01

    This paper presents an adaptive control strategy for an upper-limb exoskeleton based on an on-line dynamic parameter estimator. The objective is to improve the control performance of this system that plays a critical role in assisting patients for shoulder, elbow and wrist joint movements. In general, the dynamic parameters of the human limb are unknown and differ from a person to another, which degrade the performances of the exoskeleton-human control system. For this reason, the proposed control scheme contains a supplementary loop based on a new efficient on-line estimator of the dynamic parameters. Indeed, the latter is acting upon the parameter adaptation of the controller to ensure the performances of the system in the presence of parameter uncertainties and perturbations. The exoskeleton used in this work is presented and a physical model of the exoskeleton interacting with a 7 Degree of Freedom (DoF) upper limb model is generated using the SimMechanics library of MatLab/Simulink. To illustrate the effectiveness of the proposed approach, an example of passive rehabilitation movements is performed using multi-body dynamic simulation. The aims is to maneuver the exoskeleton that drive the upper limb to track desired trajectories in the case of the passive arm movements.

  14. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  15. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  16. Integrated sensor array for on-line monitoring micro bioreactors

    NARCIS (Netherlands)

    Krommenhoek, E.E.

    2007-01-01

    The “Fed��?batch on a chip��?��?project, which was carried out in close cooperation with the Technical University of Delft, aims to miniaturize and parallelize micro bioreactors suitable for on-line screening of micro-organisms. This thesis describes an electrochemical sensor array which has been

  17. On-Line Pesticide Training with Narrated Powerpoint Presentations

    Science.gov (United States)

    Johnson, Steven B.

    2015-01-01

    UMaine Cooperative Extension is the primary educational delivery organization for pesticide recertification credits in Maine. Shrinking budgets and staff numbers are making traditional face-to-face delivery increasingly difficult to maintain. To address this issue, on-line pesticide applicator recertification training credits were developed. The…

  18. Personality Interactions and Scaffolding in On-Line Discussions

    Science.gov (United States)

    Nussbaum, E. Michael; Hartley, Kendall; Sinatra, Gale M.; Reynolds, Ralph E.; Bendixen, Lisa D.

    2004-01-01

    The potential of on-line discussions to prompt greater reflection of course material is often stymied by a tendency of students to agree with one another rather than to formulate counter-arguments. This article describes an experiment using note starters and elaborated cases to encourage counter-argumentation and examines interactions with…

  19. A new electrostatic on-line collection-system

    International Nuclear Information System (INIS)

    Dufour, J.P.; Del Moral, R.; Fleury, A.; Hubert, F.; Llabador, Y.; Mauhourat, M.B.; Bimbot, R.; Gardes, D.; Rivet, M.F.

    1981-01-01

    The working conditions of a new on-line electrostatic collection system are presented. The main characteristics are high efficiency (reaching 20%) and short delay time (down to the millisecond). The salient features of specific devices for measurements of absolute cross sections, recoil range distributions and angular distributions are given. (orig.)

  20. Specialization processes in on-line unsupervised learning

    NARCIS (Netherlands)

    Biehl, M.; Freking, A.; Reents, G.; Schlösser, E.

    1998-01-01

    From the recent analysis of supervised learning by on-line gradient descent in multilayered neural networks it is known that the necessary process of student specialization can be delayed significantly. We demonstrate that this phenomenon also occurs in various models of unsupervised learning. A

  1. A simulation of the SDC on-line processing farm

    International Nuclear Information System (INIS)

    Wang, C.; Chen, Y.; Dorenbosch, J.; Lee, J.; Sayle, R.

    1993-10-01

    In the Solenoidal Detector Collaboration (SDC) data acquisition system (DAQ), an enormous amount of data flows into a processor farm for extraction of interesting physics events. To design an efficient on-line filter, the operations in the farm must be carefully modeled. The authors present a simulation model developed at the Superconducting Super Collider Laboratory which efficiently allocates physics events to the farm

  2. On-Line Synthesis and Analysis by Mass Spectrometry

    Science.gov (United States)

    Bain, Ryan M.; Pulliam, Christopher J.; Raab, Shannon A.; Cooks, R. Graham

    2015-01-01

    In this laboratory experiment, students learn how to use ESI to accelerate chemical synthesis and to couple it with on-line mass spectrometry for structural analysis. The Hantzsch synthesis of symmetric 1,4-dihydropyridines is a classic example of a one-pot reaction in which multiple intermediates can serve to indicate the progress of the reaction…

  3. An optimal algorithm for preemptive on-line scheduling

    NARCIS (Netherlands)

    Chen, B.; Vliet, van A.; Woeginger, G.J.

    1995-01-01

    We investigate the problem of on-line scheduling jobs on m identical parallel machines where preemption is allowed. The goal is to minimize the makespan. We derive an approximation algorithm with worst-case guarantee mm/(mm - (m - 1)m) for every m 2, which increasingly tends to e/(e - 1) ˜ 1.58 as m

  4. Comparison between constant methanol feed and on-line ...

    African Journals Online (AJOL)

    Two methanol feeding methods, namely constant methanol feed and on-line monitoring feed control by methanol sensor were investigated to improve the production of recombinant human growth hormone (rhGH) in high cell density cultivation of Pichia pastoris KM71 in 2 L bioreactor. The yeast utilized glycerol as a carbon ...

  5. Children's On-Line Processing of Scrambling in Japanese

    Science.gov (United States)

    Suzuki, Takaaki

    2013-01-01

    This study investigates the on-line processing of scrambled sentences in Japanese by preschool children and adults using a combination of self-paced listening and speeded picture selection tasks. The effects of a filler-gap dependency, reversibility, and case markers were examined. The results show that both children and adults had difficulty in…

  6. AAEC INIS - a large, new, on-line information source

    International Nuclear Information System (INIS)

    Rugg, T.J.; Wong, S.C.

    1984-01-01

    The Australian Atomic Energy Commission's INIS database is available for on-line searching by non-AAEC personnel from all parts of Australia. An introduction to the International Nuclear Information System is followed by information on searching AAEC INIS, AAEC INIS retrieval software and accessing AAEC INIS

  7. ORION-the Omega Remote Interactive On-line System

    CERN Document Server

    Russell, R D; Levratt, B; Lipps, H; Sparrman, P

    1974-01-01

    ORION is a system which permits the manipulation of files, records and characters, remote job submittal and retrieval of output files including the direct loading of remote on-line computers. The system uses the computer hardware of the OMEGA project at CERN and is designed to assist researchers in development and debugging of their programs. (10 refs).

  8. ORION - the OMEGA Remote Interactive On-line System

    CERN Document Server

    Russell, R D; Krieger, M

    1973-01-01

    ORION is a system which permits the manipulation of files, records and characters, remote job submittal and retrieval of output files including the direct loading of remote on-line computers. The system uses the computer hardware of the OMEGA project at CERN, and is designed to assist researchers in development and debugging of their programs.

  9. Booth Library On-Line Circulation System (BLOC

    Directory of Open Access Journals (Sweden)

    Paladugu V. Rao

    1971-06-01

    Full Text Available An on-line circulation system developed at a relatively small university library demonstrates that academic libraries with limited funds can develop automated systems utilizing parent institution's computer facilities in a time-sharing mode. In operation since September 1968, using an IBM 360/50 computer and associated peripheral equipment, it provides control over all stack books.

  10. On-line learning from clustered input examples

    NARCIS (Netherlands)

    Riegler, Peter; Biehl, Michael; Solla, Sara A.; Marangi, Carmela; Marinaro, Maria; Tagliaferri, Roberto

    1996-01-01

    We analyse on-line learning of a linearly separable rule with a simple perceptron. Example inputs are taken from two overlapping clusters of data and the rule is defined through a teacher vector which is in general not aligned with the connection line of the cluster centers. We find that the Hebb

  11. Investigating on-line pornography at the University of Johannesburg

    Directory of Open Access Journals (Sweden)

    P. Laughton

    2008-01-01

    Full Text Available The on-line user of today has access to a vast collection of information resources. In addition, the developments in Internet and Web technologies have made it even easier for surfers to anonymously get access to on-line pornography. The purpose of this research was to investigate the extent to which access to on-line pornography at the University of Johannesburg can be managed. For the empirical part of this research 1037 questionnaires were proportionally distributed to and completed by students on all five campuses of the university. The questionnaire consisted of four sections: biographical information; university computer facility usage; university acceptable use policy; and personal experience with university computer facilities. The gender distribution for the sample was almost even, with a total of 49,4% male participants and 50,6% female, with the largest grouping of respondents (61,6% aged between 19 years and 21 years. Of the respondents, 36,7% indicated that exposure to unsolicited pornography did not bother them. When asked to what extent students should have access to pornography, 60,5% stated 'None' while 32,6% believed that 'Restricted' access should be granted for research purposes and 6,9% believed that students should be granted 'Total' access to pornography. Results from the research will be used to manage access to on-line resources at the University of Johannesburg better.

  12. On-line sample treatment - Capillary gas chromatography

    NARCIS (Netherlands)

    Goosens, EC; de Jong, D; de Jong, GJ; Brinkman, UAT

    Sample pretreatment is often the bottleneck of a trace level analytical procedure. In order to increase performance, increasing attention is therefore being devoted to combining sample pretreatment on-line with the separation technique that has to be used. In the present review, a variety of

  13. A new electrostatic on-line collection-system

    International Nuclear Information System (INIS)

    Dufour, J.P.; Del Moral, R.; Fleury, A.

    1981-06-01

    The working conditions of a new on-line electrostatic collection system are presented. The main charactersitics are high efficiency (reaching 20%) and short delay time (down to the millisecond). The salient features of specific devices for measurements of absolute cross sections, recoil range distributions and angular distributions are given

  14. Summary remarks and prospects for on-line nuclear orientation

    International Nuclear Information System (INIS)

    Krane, K.S.; Hamilton, J.H.

    1984-01-01

    This paper reviews the use of on-line nuclear orientations as a method for determining hyperfine structure. Historical developments and future prospects for the technique are presented. The role that this technique can play in nuclear spectroscopy and the study of nuclei far from the beta stability are outlined

  15. WMI2, the Student's On-Line Symbolic Calculator

    Science.gov (United States)

    Kovacs, Zoltan

    2011-01-01

    Student activities focused on discovering mathematics play an important role in the teaching and learning process. WebMathematics Interactive (WMI2) was developed to offer a fast and user-friendly on-line web interface to enhance the quality of both theoretical and applied mathematics courses. For the teacher, in the classroom, it provides…

  16. ADAPTIVE CONTEXT PROCESSING IN ON-LINE HANDWRITTEN CHARACTER RECOGNITION

    NARCIS (Netherlands)

    Iwayama, N.; Ishigaki, K.

    2004-01-01

    We propose a new approach to context processing in on-line handwritten character recognition (OLCR). Based on the observation that writers often repeat the strings that they input, we take the approach of adaptive context processing. (ACP). In ACP, the strings input by a writer are automatically

  17. Microcomputers as on-line catalogs in special libraries.

    Science.gov (United States)

    Faust, J B

    1986-01-01

    This article discusses the rationale for the conversion of a card catalog to an on-line system in a special library owning approximately 4000 titles. Equipment, software, and procedures are described. Pros and cons of the use of a microcomputer for such a project, as well as costs and personnel needs, are outlined.

  18. The on-line asymmetric traveling salesman problem

    NARCIS (Netherlands)

    Ausiello, G.; Bonifaci, V.; Laura, L.

    2008-01-01

    We consider two on-line versions of the asymmetric traveling salesman problem with triangle inequality. For the homing version, in which the salesman is required to return in the city where it started from, we give a -competitive algorithm and prove that this is best possible. For the nomadic

  19. Facing regulatory challenges of on-line hemodiafiltration.

    Science.gov (United States)

    Kümmerle, Wolfgang

    2011-01-01

    On-line hemodiafiltration (on-line HDF) is the result of a vision that triggered multifarious changes in very different areas. Driven by the idea to offer better medical treatment for renal patients, technological innovations were developed and established that also constituted new challenges in the field of regulatory affairs. The existing regulations predominantly addressed the quality and safety of those products needed to perform dialysis treatment which were supplied by industrial manufacturers. However, the complexity of treatment system required for the provision of on-line fluids demanded a holistic approach encompassing all components involved. Hence, focus was placed not only on single products, but much more on their interfacing, and the clinical infrastructure, in particular, had to undergo substantial changes. The overall understanding of the interaction between such factors, quite different in their nature, was crucial to overcome the arising regulatory obstacles. This essay describes the evolution of the on-line HDF procedure from the regulatory point of view. A simplified diagram demonstrates the path taken from the former regulatory understanding to the realization of necessary changes. That achievement was only possible through 'management of preview' and consequent promotion of technical and medical innovations as well as regulatory re-evaluations. Copyright © 2011 S. Karger AG, Basel.

  20. Project development and commercialization of on-line analysis systems

    International Nuclear Information System (INIS)

    Watt, J.S.

    1997-01-01

    A project team first in the Australian Atomic Energy Commission (AAEC) and since 1982 in CSIRO has developed many on-line analysis systems for the mineral and energy industries. The development of these projects has followed a common pattern of laboratory R and D, field trials, commercialisation and technology transfer. This successful pattern is illustrated using examples of the development of systems for the on-line analysis of mineral slurries, for determination of the ash content of coal on conveyors, and for determination of the flow rates of oil, water and gas in pipelines. The first two systems are licensed to Australian companies, Amdel Ltd and Mineral Control Instrumentation Ltd. Both systems are used by industry worldwide, and are the market leaders for radioisotope gauges in their application field. The third system, the multiphase flow meter, was licensed in 1997 to Kvaerner FSSL Ltd of Aberdeen. This meter has even greater potential than the other two systems for economic benefit from its used and for numbers of installations. The on-line analysis systems have been developed to increase the productivity of the Australian mineral and energy industries, and to provide economic benefit to Australia. The economic benefit sought is predominantly improved process control based on use of the instrument, rather than from its sale. Sales of instruments are significant, however, with about A$80 million from the analysis systems and their derivatives since the 1970s. Some of the issues associated with the development of the on-line analysis system are outlined

  1. Problems of demographic security through the prism of an assessment of dynamics of natural and migration processes in Russia

    Directory of Open Access Journals (Sweden)

    O. A. Mahova

    2016-01-01

    Full Text Available Article retractedCurrently, the literature special attention is given to various adverse factors of sustainable demographic development of modern Russia, especially in the context of problem solving in the field of elimination of threats prejudicial to the country’s national interests. In this regard great scientific and practical interest is attracted by the comprehensive analysis of the barriers and barriers arising on a solution of these tasks. Among a set of threats of a national security special place rightfully occupy a specific demographic threat, including population reproduction and migration, which are of serious concern and generate a broad spectrum of the most diverse social and economic problems, the solution of which is objectively impossible without a complete and comprehensive information on the development of demographic phenomena and processes. This proves the necessity of carrying out the complex analysis of the natural and migratory movement of the population as priority factors of demographic safety that is the goal of this study.In article proved the importance of the demographic factor as a priority in ensuring national interests. The article presents characteristics of the modern demographic situation in Russia and identified the main threats of demographic security of the country. Special attention is paid to issues of population ageing and the replacement of reproductive generations. The characteristics of gender differences in the levels of demographic replacement and their consequences. It was revealed that the future reduction in the number of people of reproductive age is a significant obstacle to a stable demographic development. Against this background, is defined the necessity of arrival of migrants into the country. The paper presents a detailed statistical analysis of current migration situation and the main problems related to migration. In article are defined trends in arrival of

  2. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  3. IOOS Data Portals and Uniform On-line Browse Capabilities

    Science.gov (United States)

    Howard, M.; Currier, R. D.; Kobara, S.; Gayanilo, F.

    2015-12-01

    The Gulf of Mexico Coastal Ocean Observing System Regional Association (GCOOS-RA) is one of eleven Regional Associations organized under the NOAA-led U.S. Integrated Ocean Observing System (IOOS) Program Office. Each of the RAs operate standards-based regional data portals designed to aggregate near real-time and historical observed data and modeled outputs from distributed providers and to offer these and derived products in standardized ways to a diverse set of users. The RA's portals are based on the IOOS Data and Communications Plan which describes the functional elements needed for an interoperable system. One of these elements is called "Uniform On-line Browse" which is an informational service designed primarily to visualize the inventory of a portal. An on-line browse service supports the end user's need to discover what parameters are available, to learn the spatial and temporal extend of the holdings, and to examine the character of the data (e.g, variability, gappiness, etc). These pieces of information help the end user decide if the data are fit for his/her purpose and to construct valid data requests. Note that on-line browse is a distinctly different activity than data analysis because it seeks to yield knowledge about the inventory and not about what the data mean. "Uniform" on-line browse is a service that takes advantage of the standardization of the data portal's data access points. Most portals represent station locations on a map. This is a view of the data inventory but these plots are rarely generated by pulling data through the standards-based services offered to the end users but through methods only available to the portal programmers. This work will present results of Uniform On-line browse tools developed within GCOOS-RA and their applicability to other RA portals.

  4. Mentoring Narratives ON-LINE:Teaching the Principalship

    Directory of Open Access Journals (Sweden)

    Allison I. Griffith

    2002-05-01

    Full Text Available The need to develop new models for preparation of school administrators has been a prominent concern in educational discourse in the last decade. Having been criticized for the inadequate preparation of the school leadership cadre, academic departments responsible for training future school administrators have had to revisit their approaches and to reframe their teaching philosophies to ensure the readiness of their graduates for the challenges and complexities of school leadership. This article reports on the new model of principals' training that has been used in York University's Principals' Qualification Program (PQP from the late 1990s onward. One component of the program brings traditional case methodology into a computer-mediated/on-line environment. The on-line cases are narratives from the everyday lives of the Ontario school administrators who serve as mentors in the on-line environment. Situating our discussion within the context of the rapidly changing educational landscape of Ontario, we focus on the PQP model to explore experientially generated case narratives as one method for teaching and learning the work of the local school administrator. We focus particularly on the teaching and learning embedded in computer-mediated or on-line case narratives used in training teachers for school leadership. We argue that the complexities of school leadership—the social, cultural, relational, ethical and moral context of school leadership—can be taught effectively through the reflective processes of on-line case narratives. We seek to contribute to the ongoing dialogue on the potential of new pedagogies and new technologies to help prepare the competent and responsible leaders for tomorrow's schools.

  5. Introduction to network security

    CERN Document Server

    Jacobson, Douglas

    2008-01-01

    … Students can easily understand how things work thanks to the different figures/definitions … students can see the different steps taken to build a secure environment and avoid most of the usual mistakes. … A website (http://www.dougj.net/textbook) is provided to support the book, where the reader can find additional content, like instructor materials, slides to support the book, on-line tutorials, help to start the programming parts. It is not mandatory at all to understand the book, but it is a really nice addition. … the book is really well written, and easily understandable without lackin

  6. On-line analysis of water contamination by organic compounds; On-line-Analytik der Wasserverschmutzung durch organische Substanzen

    Energy Technology Data Exchange (ETDEWEB)

    Wagt, R. van der; Vos, F. de [Skalar Analytical (Netherlands); Babichenko, S.; Poryvkina, L. [Institute of Ecology, Tallinn (Estonia)

    1999-08-01

    In many environmental applications decomposing the mixture of substances in the water into its various chemical ingredients, for subsequent analysis, is a very complicated task. The most productive approach to on-line diagnosis is to treat the object as an integral spectroscopic sample, characterized by certain specific Spectral Fluorescent Signatures (SFS). The SFS are recorded as a matrix of fluorescent intensity of organic compounds in water, in co-ordinates of excitation and emission spectra, providing a three-dimensional spectrum. Spectral windows of SFS are defined by fluorescent characteristics of basic groups of organic substances in the water sample. The novel Skalar Fluo Imager, based on this principle, is intended for the analysis of organic compounds in natural, domestic, and technological waters in an on-line mode. (orig.) [German] In vielen Umweltschutzanwendungen stellt die Auftrennung eines Substanzgemisches zum Zweck der Analyse eine sehr komplizierte Aufgabe dar. Ein erfolgversprechender Ansatz fuer eine on-line-Diagnostik besteht darin, das Objekt als integrale Spektroskopieprobe zu betrachten, die durch bestimmte spezifische Spektral-Fluoreszenz-Signaturen (SFS) charakterisiert wird. Diese werden als Fluoreszenz-Intensitaets-Matrix organischer Verbindungen in Wasser dargestellt, mit Anregungs- und Emissionsspektren als weiteren Koordinaten, wodurch ein dreidimensionales Spektrum entsteht. Spektrale Fenster der SFS sind definiert als Fluoreszenzcharakteristika von Funktionsgruppen organischer Substanzen in der Wasserprobe. Der auf diesem Prinzip basierende Skalar Fluo Imager ist fuer die on-line-Analyse organischer Bestandteile in natuerlichen, Haus- und technischen Waessern gedacht. (orig.)

  7. Automatic Delineation of On-Line Head-And-Neck Computed Tomography Images: Toward On-Line Adaptive Radiotherapy

    International Nuclear Information System (INIS)

    Zhang Tiezhi; Chi Yuwei; Meldolesi, Elisa; Yan Di

    2007-01-01

    Purpose: To develop and validate a fully automatic region-of-interest (ROI) delineation method for on-line adaptive radiotherapy. Methods and Materials: On-line adaptive radiotherapy requires a robust and automatic image segmentation method to delineate ROIs in on-line volumetric images. We have implemented an atlas-based image segmentation method to automatically delineate ROIs of head-and-neck helical computed tomography images. A total of 32 daily computed tomography images from 7 head-and-neck patients were delineated using this automatic image segmentation method. Manually drawn contours on the daily images were used as references in the evaluation of automatically delineated ROIs. Two methods were used in quantitative validation: (1) the dice similarity coefficient index, which indicates the overlapping ratio between the manually and automatically delineated ROIs; and (2) the distance transformation, which yields the distances between the manually and automatically delineated ROI surfaces. Results: Automatic segmentation showed agreement with manual contouring. For most ROIs, the dice similarity coefficient indexes were approximately 0.8. Similarly, the distance transformation evaluation results showed that the distances between the manually and automatically delineated ROI surfaces were mostly within 3 mm. The distances between two surfaces had a mean of 1 mm and standard deviation of <2 mm in most ROIs. Conclusion: With atlas-based image segmentation, it is feasible to automatically delineate ROIs on the head-and-neck helical computed tomography images in on-line adaptive treatments

  8. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  9. Transmission grid security

    CERN Document Server

    Haarla, Liisa; Hirvonen, Ritva; Labeau, Pierre-Etienne

    2011-01-01

    In response to the growing importance of power system security and reliability, ""Transmission Grid Security"" proposes a systematic and probabilistic approach for transmission grid security analysis. The analysis presented uses probabilistic safety assessment (PSA) and takes into account the power system dynamics after severe faults. In the method shown in this book the power system states (stable, not stable, system breakdown, etc.) are connected with the substation reliability model. In this way it is possible to: estimate the system-wide consequences of grid faults; identify a chain of eve

  10. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  11. On line performance monitoring for predictive maintenance [Paper No.: VIA - 2

    International Nuclear Information System (INIS)

    Gupta, R.K.; Chandra, Rajesh

    1981-01-01

    There will always be progressive deterioration in the performance of dynamic equipment due to normal inevitable wear, malfunctions, failures and other reasons. In most cases it is possible to monitor some parameters of a system which would get progressively affected with the deterioration in the health of the system. By on-line monitoring of such predetermined parameters, compared with preset base data generated for a healthy system earlier, would prove very helpful in avoiding breakdowns and in proper planning of preventive and predictive maintenance. With increasing use of on-line computerised controls the generation of design base data and also the in-built self checking feature of monitoring the equipment health can be achieved by incorporating suitable software. This type of system will be helpful in: (a) predicting the life of component, (b) prewarning the operator about impending malfunctions, (c) establishing a maintenance schedule and spare inventory, and (d) analysing the failures. This type of centralised predictive maintenance is increasingly becoming important where: (a) the number of equipments are large, (b) the operation of equipment is critical from safety criteria, and (c) the minimum safety margin in the performance of the component is to be maintained. Keeping this in mind, the Fuel Handling System of Narora Atomic Power Project and the future power plants having computerised controls will have facility for on-line performance monitoring for predictive maintenance. The paper also describes methodology of the technique in detail, with a few representative cases. (author)

  12. The security system analyzer: An application of the Prolog language

    International Nuclear Information System (INIS)

    Zimmerman, B.D.; Seeman, S.E.

    1986-01-01

    The Prolog programming language and entity-relationship modeling techniques were used to demonstrate a methodology for security system applications. A knowledge base was built that consists of statements modeling a generic building and surrounding area, including security fences and intrusion detectors (sensors and TV cameras). Declarative Prolog statements have the capability to use the knowledge base information in a routine manner to provide descriptive information about sensors, to dynamically update the knowledge base to provide on-line recording of changes in detector status or maintenance history, and to analyze the configuration of the building, surrounding area, and intrusion detector layout and current operability status in order to determine all the pathways from one specified point to another specified point which result in the detection probability being less than some specified value (i.e., find the ''weakest paths''). This ''search'' capability, which is the heart of the SECURITY program, allows the program to perform a CAD (computer aided design) function, and to provide a real-time security degradation analysis if intrusion detectors become inoperable. 2 refs., 3 figs

  13. Projections of 21st Century African Climate: Implications for African Savanna Fire Dynamics, Human Health and Food Security

    Science.gov (United States)

    Adegoke, J. O.

    2015-12-01

    Fire is a key agent of change in the African savannas, which are shaped through the complex interactions between trees, C4 grasses, rainfall, temperature, CO2 and fire. These fires and their emitted smoke can have numerous direct and indirect effects on the environment, water resources, air quality, and climate. For instance, veld fires in southern Africa cause large financial losses to agriculture, livestock production and forestry on an annual basis. This study contributes to our understanding of the implications of projected surface temperature evolution in Africa for fire risk, human health and agriculture over the coming decades. We use an ensemble of high-resolution regional climate model simulations of African climate for the 21st century. Regional dowscalings and recent global circulation model projections obtained for Africa indicate that African temperatures are likely to rise at 1.5 times the global rate of temperature increase in the tropics, and at almost twice the global rate of increase in the subtropics. Warming is projected to occur during the 21st century, with increases of 4-6 °C over the subtropics and 3-5 °C over the tropics plausible by the end of the century relative to present-day climate under the A2 (low mitigation) scenario. We explore the significance of the projected warming by documenting increases in projected high fire danger days and heat-wave days. General drying is projected across the continent, even for areas (e.g. tropical Africa) where an increase in rainfall is plausible. This is due to the drastic increases in temperature that are projected, which leads to drier soils (through enhanced evaporation) despite the rainfall increases. This will likely impact negatively on crop yield, particularly on the maize crop that is of crucial importance in terms of African food security.

  14. On-line analysis of bulk materials using pulsed neutron interrogation

    International Nuclear Information System (INIS)

    Lebrun, P.; Tourneur, P. Le; Poumarede, B.; Bach, P.; Moeller, H.

    1999-01-01

    On the basis of our joint experience in neutronics for SODERN and in cement plant engineering for KRUPP POLYSIUS, we have developed a new on-line bulk materials analyser for the cement industry. This equipment includes a pulsed neutron generator GENIE 16, some gamma ray and neutron detectors, specially designed electronics with high counting rate, software delivering the mean elemental composition of raw material, and adequate shielding. This material is transported through the equipment on a conveyor belt, the size of which is adapted to the requirements. This paper briefly describes the equipment and some results, as obtained in dynamic test from a demonstrator installed in Germany

  15. On-line analysis of bulk materials using pulsed neutron interrogation

    Science.gov (United States)

    Lebrun, P.; Tourneur, P. Le; Poumarede, B.; Möller, H.; Bach, P.

    1999-06-01

    On the basis of our joint experience in neutronics for SODERN and in cement plant engineering for KRUPP POLYSIUS, we have developed a new on-line bulk materials analyser for the cement industry. This equipment includes a pulsed neutron generator GENIE 16, some gamma ray and neutron detectors, specially designed electronics with high counting rate, software delivering the mean elemental composition of raw material, and adequate shielding. This material is transported through the equipment on a conveyor belt, the size of which is adapted to the requirements. This paper briefly describes the equipment and some results, as obtained in dynamic test from a demonstrator installed in Germany.

  16. On-line soft sensing in upstream bioprocessing.

    Science.gov (United States)

    Randek, Judit; Mandenius, Carl-Fredrik

    2018-02-01

    This review provides an overview and a critical discussion of novel possibilities of applying soft sensors for on-line monitoring and control of industrial bioprocesses. Focus is on bio-product formation in the upstream process but also the integration with other parts of the process is addressed. The term soft sensor is used for the combination of analytical hardware data (from sensors, analytical devices, instruments and actuators) with mathematical models that create new real-time information about the process. In particular, the review assesses these possibilities from an industrial perspective, including sensor performance, information value and production economy. The capabilities of existing analytical on-line techniques are scrutinized in view of their usefulness in soft sensor setups and in relation to typical needs in bioprocessing in general. The review concludes with specific recommendations for further development of soft sensors for the monitoring and control of upstream bioprocessing.

  17. On-line corrosion monitoring in district heating systems

    DEFF Research Database (Denmark)

    Richter, Sonja; Thorarinsdottir, R.I.; Hilbert, Lisbeth Rischel

    2004-01-01

    ), Electrochemical Noise (EN) and Zero Resistance Ammetry (ZRA). Electrochemical Resistance (ER) has also been used to measure corrosion. The method traditionally only measures corrosion off-line but with newly developed high-sensitive ER technique developed by MetriCorr in Denmark, on-line monitoring is possible...... complicates the chemistry of the environment. Hydrogen sulphide is present in geothermal systems and can be formed as a by-product of sulphate-reducing-bacteria (SRB). The application of electrochemical methods makes on-line monitoring possible. These methods include: Linear Polarization Resistance (LPR....... In order to assess both general corrosion and localized corrosion, it is necessary to apply more than one monitoring technique simultaneously, ZRA or EN for measuring localized corrosion and LPR or ER for measuring general corrosion rate. The advantage of monitoring localized corrosion is indisputable...

  18. On-line sources of toxicological information in Canada

    International Nuclear Information System (INIS)

    Racz, William J.; Ecobichon, Donald J.; Baril, Marc

    2003-01-01

    This paper will provide an overview of the on-line resources available in toxicology in Canada. It will describe a brief history of The Society of Toxicology of Canada, with reference to other societies and also provide information on education, research and other resources related to toxicology. Toxicology in Canada emerged as a distinct and vibrant discipline following the thalidomide tragedy of the 1960s. In the pharmaceutical industry and government, toxicology was readily established as an essential component of drug development and safety, and as the need for toxicologists expanded, training programs were established, usually in collaboration with departments of pharmacology. In the last two to three decades other disciplines, environmental biology, analytical chemistry and epidemiology joined the ranks of toxicology. The on-line sources of toxicology information are rapidly expanding. This article describes those sources considered by the authors to be important from a national and international perspective. The majority of these sources are professional organizations and government agencies

  19. On-line chemistry monitoring for the secondary side

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    Babcock and Wilcox (B and W) has developed a computerized water chemistry data acquisition and management system for nuclear plant secondary coolant systems. The Integrated Water Chemistry Monitoring System (IWCMS) provides on-line monitoring of conditions and rapid trend analysis of sampled data. So far it has been installed at GPU Three Mile Island unit 1 and at Toledo Edison Davis-Besse. The IWCMS meets the following utility needs for monitoring power plant chemistry: control of chemistry conditions to minimize corrosion and extend component/system life; continuous analysis of data from on-line detectors and grab samples; expediting of transient recovery actions with trend, alarm and evaluation capability; provision for rapid sharing of useful operational chemistry information; concentration of attention on evaluation instead of data manipulation. The system is composed of three functional parts: data acquisition hardware; PC-based computer system and customised system software. (author)

  20. On-line application of the PANTHER advanced nodal code

    International Nuclear Information System (INIS)

    Hutt, P.K.; Knight, M.P.

    1992-01-01

    Over the last few years, Nuclear Electric has developed an integrated core performance code package for both light water reactors (LWRs) and advanced gas-cooled reactors (AGRs) that can perform a comprehensive range of calculations for fuel cycle design, safety analysis, and on-line operational support for such plants. The package consists of the following codes: WIMS for lattice physics, PANTHER whole reactor nodal flux and AGR thermal hydraulics, VIPRE for LWR thermal hydraulics, and ENIGMA for fuel performance. These codes are integrated within a UNIX-based interactive system called the Reactor Physics Workbench (RPW), which provides an interactive graphic user interface and quality assurance records/data management. The RPW can also control calculational sequences and data flows. The package has been designed to run both off-line and on-line accessing plant data through the RPW

  1. UniFlex - Collaborative on-line learning environment tool

    Directory of Open Access Journals (Sweden)

    Ole Borch

    2004-05-01

    Full Text Available

    Første gang publiceret i UNEV nr. 2: E-læringsplatforme - muligheder og potentialer, januar - marts 2004, red. Tom Nyvand og Michael Pedersen. ISSN 1603-5518.

    Increasing demands for remote on-line education are changing the way teaching and learning is performed. New behavior in using pedagogy and supporting technology is needed to drive the learning process. To facilitate the use of services for selected activities to participants in distance education, a web site named UniFlex (University Flexible learning has been developed and brought into use. The site is a comprehensive set of bookmarks including course taking, upload/download, and - of special significance - collaborative on-line project work. UniFlex has been developed to meet the requirement for a simple and cheap personalized interactive site, supporting problem oriented and project organized study form, which has characterized Aalborg University for more than 27 years.

  2. UniFlex - Collaborative on-line learning environment tool

    Directory of Open Access Journals (Sweden)

    Ole Borch

    2004-03-01

    Full Text Available Første gang publiceret i UNEV nr. 2: E-læringsplatforme - muligheder og potentialer, januar - marts 2004, red. Tom Nyvand og Michael Pedersen. ISSN 1603-5518. Increasing demands for remote on-line education are changing the way teaching and learning is performed. New behavior in using pedagogy and supporting technology is needed to drive the learning process. To facilitate the use of services for selected activities to participants in distance education, a web site named UniFlex (University Flexible learning has been developed and brought into use. The site is a comprehensive set of bookmarks including course taking, upload/download, and - of special significance - collaborative on-line project work. UniFlex has been developed to meet the requirement for a simple and cheap personalized interactive site, supporting problem oriented and project organized study form, which has characterized Aalborg University for more than 27 years.

  3. On-line analyzers to distributed control system linking

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, S.F.; Buchanan, B.R.; Sanders, M.A.

    1990-01-01

    The Analytical Development Section (ADS) of the Savannah River Laboratory is developing on-line analyzers to monitor various site processes. Data from some of the on-line analyzers (OLA's) will be used for process control by distributed control systems (DCS's) such as the Fisher PRoVOX. A problem in the past has been an efficient and cost effective way to get analyzer data onto the DCS data highway. ADS is developing a system to accomplish the linking of OLA's to PRoVOX DCS's. The system will be described, and results of operation in a research and development environment given. Plans for the installation in the production environment will be discussed.

  4. On-line Ramsey Numbers for Paths and Stars

    Directory of Open Access Journals (Sweden)

    Jaroslaw Grytczuk

    2008-08-01

    Full Text Available We study on-line version of size-Ramsey numbers of graphs defined via a game played between Builder and Painter: in one round Builder joins two vertices by an edge and Painter paints it red or blue. The goal of Builder is to force Painter to create a monochromatic copy of a fixed graph H in as few rounds as possible. The minimum number of rounds (assuming both players play perfectly is the on-line Ramsey number r(H of the graph H. We determine exact values of r(H for a few short paths and obtain a general upper bound r(Pn ≤ 4n-7. We also study asymmetric version of this parameter when one of the target graphs is a star Sn with n edges. We prove that r(Sn,H≤n ·e(H when H is any tree, cycle or clique.

  5. Laser systems for on-line laser ion sources

    International Nuclear Information System (INIS)

    Geppert, Christopher

    2008-01-01

    Since its initiation in the middle of the 1980s, the resonant ionization laser ion source has been established as a reliable and efficient on-line ion source for radioactive ion beams. In comparison to other on-line ion sources it comprises the advantages of high versatility for the elements to be ionized and of high selectivity and purity for the ion beam generated by resonant laser radiation. Dye laser systems have been the predominant and pioneering working horses for laser ion source applications up to recently, but the development of all-solid-state titanium:sapphire laser systems has nowadays initiated a significant evolution within this field. In this paper an overview of the ongoing developments will be given, which have contributed to the establishment of a number of new laser ion source facilities worldwide during the last five years.

  6. On-Line Metrology with Conoscopic Holography: Beyond Triangulation

    Directory of Open Access Journals (Sweden)

    Ignacio Álvarez

    2009-09-01

    Full Text Available On-line non-contact surface inspection with high precision is still an open problem. Laser triangulation techniques are the most common solution for this kind of systems, but there exist fundamental limitations to their applicability when high precisions, long standoffs or large apertures are needed, and when there are difficult operating conditions. Other methods are, in general, not applicable in hostile environments or inadequate for on-line measurement. In this paper we review the latest research in Conoscopic Holography, an interferometric technique that has been applied successfully in this kind of applications, ranging from submicrometric roughness measurements, to long standoff sensors for surface defect detection in steel at high temperatures.

  7. A Comparison of Multiscale Permutation Entropy Measures in On-Line Depth of Anesthesia Monitoring.

    Science.gov (United States)

    Su, Cui; Liang, Zhenhu; Li, Xiaoli; Li, Duan; Li, Yongwang; Ursino, Mauro

    2016-01-01

    Multiscale permutation entropy (MSPE) is becoming an interesting tool to explore neurophysiological mechanisms in recent years. In this study, six MSPE measures were proposed for on-line depth of anesthesia (DoA) monitoring to quantify the anesthetic effect on the real-time EEG recordings. The performance of these measures in describing the transient characters of simulated neural populations and clinical anesthesia EEG were evaluated and compared. Six MSPE algorithms-derived from Shannon permutation entropy (SPE), Renyi permutation entropy (RPE) and Tsallis permutation entropy (TPE) combined with the decomposition procedures of coarse-graining (CG) method and moving average (MA) analysis-were studied. A thalamo-cortical neural mass model (TCNMM) was used to generate noise-free EEG under anesthesia to quantitatively assess the robustness of each MSPE measure against noise. Then, the clinical anesthesia EEG recordings from 20 patients were analyzed with these measures. To validate their effectiveness, the ability of six measures were compared in terms of tracking the dynamical changes in EEG data and the performance in state discrimination. The Pearson correlation coefficient (R) was used to assess the relationship among MSPE measures. CG-based MSPEs failed in on-line DoA monitoring at multiscale analysis. In on-line EEG analysis, the MA-based MSPE measures at 5 decomposed scales could track the transient changes of EEG recordings and statistically distinguish the awake state, unconsciousness and recovery of consciousness (RoC) state significantly. Compared to single-scale SPE and RPE, MSPEs had better anti-noise ability and MA-RPE at scale 5 performed best in this aspect. MA-TPE outperformed other measures with faster tracking speed of the loss of unconsciousness. MA-based multiscale permutation entropies have the potential for on-line anesthesia EEG analysis with its simple computation and sensitivity to drug effect changes. CG-based multiscale permutation

  8. Diagnostics of the Enterprise Economic Security and the Role of Information and Communication in the Context of Sustainability of Dynamical Equilibrium, Operation and Development

    Directory of Open Access Journals (Sweden)

    Skrynkovskyy Ruslan M.

    2015-03-01

    Full Text Available In the scientific article a system for diagnostics of the enterprise economic security is developed. It has been determined that the main business indicators for diagnostics of the enterprise economic security are: the level of the enterprise financial stability (contains the indicator for the enterprise provision with its own funds, rate of independence, financial stability indicator, current assets to equity ratio, liquid ratio, absolute liquidity ratio, current liquidity ratio; level of the enterprise production activity (calculated on the output-capital ratio, capital-labor ratio, index of workforce productivity, quality indicators of fixed assets, production potential indicator, production profitability ratio, input-output coefficient; level of organizational and administrative activities of the enterprise (takes into account the ratio of administrative expenses to the rate of increase in production volume, rate of saving of the managerial apparatus, rate of information processing; level of employee loyalty to the enterprise (calculated on the rate of personnel turnover, rate of personnel continuity, indicator of employee satisfaction, personnel development indicator, education level of employees; level of scientific and technical and innovative activity of the enterprise (including index of profitability of innovations, profitability of expenditures on research and development works; level of investment activity of the enterprise (includes index of investment profitability, rate of investment activity, rate of return on investments, rate of investment in production; level of market reliability (calculated on index of return on sales, index of return on net assets, index of marketability, level of market research. It has been identified that an important role in the context of sustainability of dynamical equilibrium, operation and development of enterprises is played by information and communication.

  9. Recovery Strategies in On-Line Service Failure

    OpenAIRE

    Ozuem, Wilson; Lancaster, Geoff

    2013-01-01

    Despite a proliferation of a number of studies on service failures and recovery in e-service settings, there is a paucity of knowledge of ways in which service failures and recovery practices are implemented in the fashion industry. Drawing on constructivist perspective, this study offers a new perspective on an effective relational mechanism that would bridge the rupture between consumers and companies particularly in the on-line fashion sector. The analysis adds to studies on service failur...

  10. Understanding Cognitive Load Using On-line Dictionaries

    OpenAIRE

    Robert F. , Dilenschneider

    2017-01-01

    Cognitive Load Theory may useful for language instructors to understand how the look up conditions ofusing an on-line dictionary might influence learning. This paper first reviews previous studies that haveinvestigated dictionary use for vocabulary acquisition and reading comprehension Second, it explainsthe various elements of Cognitive Load Theory. Third, it describes how Cognitive Load Theory appliesto language learners' to learn unknown words and comprehend texts Last, it discusses the pe...

  11. On-line diagnostics for a real time system

    International Nuclear Information System (INIS)

    Sreenivasan, P.

    1976-01-01

    The purpose of an on-line diagnostics is to infuse the ability of self diagnosing in an online computer to enhance its dependability in a real time system. Such a diagnostics evolved for the CDPS of the Fast Breeder Test Reactor at Kalpakkam is reported. The two phases of the diagnostics, i.e., the malfunction detection and post detection action are described in some detail. (A.K.)

  12. Isocele I, the Orsay synchrocyclotron on-line separator

    International Nuclear Information System (INIS)

    Caruette, A.; Ferro, A.; Foucher, R.

    1976-01-01

    The main characteristics of the isotope separator Isocele 1 are described. This medium current separator was on line with the Orsay synchrocyclotron (155 MeV p, or 210 MeV 3 He) from March 1974 up to May 1975. Results obtained with different targets (Au, Bi, Er, Pt, Sn, Th) are summarized. They confirm the efficiency of medium current separators of this type [fr

  13. A decision support system for on-line leakage localization

    OpenAIRE

    Meseguer, Jordi; Mirats-Tur, Josep M.; Cembrano, Gabriela; Puig, Vicenç; Quevedo, Joseba; Pérez, Ramon; Sanz, Gerard; Ibarra, David

    2014-01-01

    This paper describes a model-driven decision-support system (software tool) implementing a model-based methodology for on-line leakage detection and localization which is useful for a large class of water distribution networks. Since these methods present a certain degree of complexity which limits their use to experts, the proposed software tool focuses on the integration of a method emphasizing its use by water network managers as a decision support system. The proposed software tool integr...

  14. On-line production of [11C]cyanogen bromide

    International Nuclear Information System (INIS)

    Westerberg, G.; Laangstroem, B.

    1997-01-01

    The electrophilic labelling precursor [ 11 C]cyanogen bromide was produced in 95% radiochemical yield (decay-corrected) from hydrogen [ 11 C]cyanide within 3 min from the end of bombardment using a simple and convenient solid-phase on-line procedure. The [ 11 C]cyanogen bromide has been used in the synthesis of a number of labelled compounds for use in positron emission tomography. (author)

  15. On-line Monitoring System for Power Transformers

    Directory of Open Access Journals (Sweden)

    Alexandru HOTEA

    2016-12-01

    Full Text Available Power transformers are the most important and expensive equipment from the electricity transmission system, so it is very important to know the real state of health of such equipment in every moment. De-energizing the power transformer accidentally due to internal defects can generate high costs. Annual maintenance proved to be ineffective in many cases to determine the internal condition of the equipment degradation due to faults rapidly evolving. An On-line Monitoring System for Power Transformers help real-time condition assessment and to detect errors early enough to take action to eliminate or minimize them. After abnormality detected, it is still important to perform full diagnostic tests to determine the exact condition of the equipment. On-line monitoring systems can help increase the level of availability and reliability of power transformers and lower costs of accidental interruption. This paper presents cases studies on several power transformers equipped with on-line monitoring systems from Transelectrica substation.

  16. Characterizing chemical systems with on-line computers and graphics

    International Nuclear Information System (INIS)

    Frazer, J.W.; Rigdon, L.P.; Brand, H.R.; Pomernacki, C.L.

    1979-01-01

    Incorporating computers and graphics on-line to chemical experiments and processes opens up new opportunities for the study and control of complex systems. Systems having many variables can be characterized even when the variable interactions are nonlinear, and the system cannot a priori be represented by numerical methods and models. That is, large sets of accurate data can be rapidly acquired, then modeling and graphic techniques can be used to obtain partial interpretation plus design of further experimentation. The experimenter can thus comparatively quickly iterate between experimentation and modeling to obtain a final solution. We have designed and characterized a versatile computer-controlled apparatus for chemical research, which incorporates on-line instrumentation and graphics. It can be used to determine the mechanism of enzyme-induced reactions or to optimize analytical methods. The apparatus can also be operated as a pilot plant to design control strategies. On-line graphics were used to display conventional plots used by biochemists and three-dimensional response-surface plots

  17. On-Line Fringe Tracking and Prediction at IOTA

    Science.gov (United States)

    Wilson, Edward; Mah, Robert; Lau, Sonie (Technical Monitor)

    1999-01-01

    The Infrared/Optical Telescope Array (IOTA) is a multi-aperture Michelson interferometer located on Mt. Hopkins near Tucson, Arizona. To enable viewing of fainter targets, an on-line fringe tracking system is presently under development at NASA Ames Research Center. The system has been developed off-line using actual data from IOTA, and is presently undergoing on-line implementation at IOTA. The system has two parts: (1) a fringe tracking system that identifies the center of a fringe packet by fitting a parametric model to the data; and (2) a fringe packet motion prediction system that uses characteristics of past fringe packets to predict fringe packet motion. Combined, this information will be used to optimize on-line the scanning trajectory, resulting in improved visibility of faint targets. Fringe packet identification is highly accurate and robust (99% of the 4000 fringe packets were identified correctly, the remaining 1% were either out of the scan range or too noisy to be seen) and is performed in 30-90 milliseconds on a Pentium II-based computer. Fringe packet prediction, currently performed using an adaptive linear predictor, delivers a 10% improvement over the baseline of predicting no motion.

  18. Review of trigger and on-line processors at SLAC

    International Nuclear Information System (INIS)

    Lankford, A.J.

    1984-07-01

    The role of trigger and on-line processors in reducing data rates to manageable proportions in e + e - physics experiments is defined not by high physics or background rates, but by the large event sizes of the general-purpose detectors employed. The rate of e + e - annihilation is low, and backgrounds are not high; yet the number of physics processes which can be studied is vast and varied. This paper begins by briefly describing the role of trigger processors in the e + e - context. The usual flow of the trigger decision process is illustrated with selected examples of SLAC trigger processing. The features are mentioned of triggering at the SLC and the trigger processing plans of the two SLC detectors: The Mark II and the SLD. The most common on-line processors at SLAC, the BADC, the SLAC Scanner Processor, the SLAC FASTBUS Controller, and the VAX CAMAC Channel, are discussed. Uses of the 168/E, 3081/E, and FASTBUS VAX processors are mentioned. The manner in which these processors are interfaced and the function they serve on line is described. Finally, the accelerator control system for the SLC is outlined. This paper is a survey in nature, and hence, relies heavily upon references to previous publications for detailed description of work mentioned here. 27 references, 9 figures, 1 table

  19. On-line plant-wide monitoring using neural networks

    International Nuclear Information System (INIS)

    Turkcan, E.; Ciftcioglu, O.; Eryurek, E.; Upadhyaya, B.R.

    1992-06-01

    The on-line signal analysis system designed for a multi-level mode operation using neural networks is described. The system is capable of monitoring the plant states by tracking different number of signals up to 32 simultaneously. The data used for this study were acquired from the Borssele Nuclear Power Plant (PWR type), and using the on-line monitoring system. An on-line plant-wide monitoring study using a multilayer neural network model is discussed in this paper. The back-propagation neural network algorithm is used for training the network. The technique assumes that each physical state of the power plant can be represented by a unique pattern of instrument readings which can be related to the condition of the plant. When disturbance occurs, the sensor readings undergo a transient, and form a different set of patterns which represent the new operational status. Diagnosing these patterns can be helpful in identifying this new state of the power plant. To this end, plant-wide monitoring with neutral networks is one of the new techniques in real-time applications. (author). 9 refs.; 5 figs

  20. Designing effective on-line continuing medical education.

    Science.gov (United States)

    Zimitat, Craig

    2001-03-01

    The Internet, and new information and communication technologies available through the Internet, provides medical educators with an opportunity to develop unique on-line learning environments with real potential to improve physicians' knowledge and effect change in their clinical practice. There are approximately 100 websites offering on-line CME courses in the USA alone. However, few of these CME courses appear to be based on sound educational principles or CME research and may have little chance of achieving the broader goals of CME. The majority of these courses closely resemble their traditional counterparts (e.g. paper-based books are now electronic books) and appear to be mere substitutions for old-technology CME resources. Whilst some CME providers add unique features of the Internet to enrich their websites, they do not employ strategies to optimize the learning opportunities afforded by this new technology. The adoption of adult learning principles, reflective practice and problem-based approaches can be used as a foundation for sound CME course design. In addition, knowledge of Internet technology and the learning opportunities it affords, together with strategies to maintain participation and new assessment paradigms, are all needed for developing online CME. We argue for an evidence-based and strategic approach to the development of on-line CME courses designed to enhance physician learning and facilitate change in clinical behaviour.

  1. On-line radiation teaching materials using IT technology

    International Nuclear Information System (INIS)

    Inoue, Hiroyoshi

    2005-01-01

    We developed the on-line radiation teaching materials using the Internet, in order to provide the teaching support materials of atomic power and radiation educations in on-school study, as well as to create the complementary study system in off-school study. The themes of teaching materials were selected from requests by teachers. In the case of an elementary school, the teaching material 'an environmental problem and atomic power' was created as the aggregate of each content for study without boundary between subjects. The teaching material 'medical treatment and radiation' was created for junior high school students to raise the individual knowledge. In the case of a high school, the teaching material nucleus and radiation' was prepared to supplement the physical study of students. The on-line teaching materials were tried to 300 junior high school and high school students, 68% of students answered that the teaching material is effective to understand atomic power and radiation, though 17% answered they were not effective. Although there are problems to prepare IT learning equipments and learning follow-up system in the material, it is suggested that the on-line teaching materials will provide the novel learning system including debates for the study. This method has no limitation of time and place. (author)

  2. On-line fouling monitor for heat exchangers

    International Nuclear Information System (INIS)

    Tsou, J.L.

    1995-01-01

    Biological and/or chemical fouling in utility service water system heat exchangers adversely affects operation and maintenance costs, and reduced heat transfer capability can force a power deaerating or even a plant shut down. In addition, service water heat exchanger performance is a safety issue for nuclear power plants, and the issue was highlighted by NRC in Generic Letter 89-13. Heat transfer losses due to fouling are difficult to measure and, usually, quantitative assessment of the impact of fouling is impossible. Plant operators typically measure inlet and outlet water temperatures and flow rates and then perform complex calculations for heat exchanger fouling resistance or ''cleanliness''. These direct estimates are often imprecise due to inadequate instrumentation. Electric Power Research Institute developed and patented an on-line condenser fouling monitor. This monitor may be installed in any location within the condenser; does not interfere with routine plant operations, including on-line mechanical and chemical treatment methods; and provides continuous, real-time readings of the heat transfer efficiency of the instrumented tube. This instrument can be modified to perform on-line monitoring of service water heat exchangers. This paper discusses the design, construction of the new monitor, and algorithm used to calculate service water heat exchanger fouling

  3. Denmark's on - line early warning radiation monitoring network

    International Nuclear Information System (INIS)

    Walmod-Larsen, O.; Lippert, J.

    1990-01-01

    In Denmark an emergency response coordination committee was set up to cope with the problems after the Chernobyl accident with participation of all relevant authorities. For help in an emergency situation the ARGOS (Accident Reporting and Guiding Operational System), system will be put into use. The ARGOS emergency evaluation computer system, which has been developed in cooperation with the Danish Environmental Protection Agency, is in operation in connection with the emergency planning for the east region of Denmark with regard to the Swedish nuclear power plant operating at Barseback. Inputs of measurement data are on-line available on data screens for evaluation in the emergency coordination centers, presented on suitable geographical maps, showing iso-contours calculated from the input. In case of an alert situation other systems can be put in operation, f.ex. mobile measuring units from the CDEPA's local, operational emergency centers. Their readings can then be put into the computing system parallel to the on-line stations and be presented by the ARGOS-system for evaluation in the emergency command centers. If another national authority in an alert situation requests a transfer of measurement data, and if this is agreed upon by the competent Danish authority, then the transfer can be arranged from the ARGOS-system, through agreed transmission channels. At present the ARGOS system is being improved and expanded by RNL to cover the whole Danish region and to present measurements from the on-line warning system

  4. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  5. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  6. On-line transient stability assessment of large-scale power systems by using ball vector machines

    International Nuclear Information System (INIS)

    Mohammadi, M.; Gharehpetian, G.B.

    2010-01-01

    In this paper ball vector machine (BVM) has been used for on-line transient stability assessment of large-scale power systems. To classify the system transient security status, a BVM has been trained for all contingencies. The proposed BVM based security assessment algorithm has very small training time and space in comparison with artificial neural networks (ANN), support vector machines (SVM) and other machine learning based algorithms. In addition, the proposed algorithm has less support vectors (SV) and therefore is faster than existing algorithms for on-line applications. One of the main points, to apply a machine learning method is feature selection. In this paper, a new Decision Tree (DT) based feature selection technique has been presented. The proposed BVM based algorithm has been applied to New England 39-bus power system. The simulation results show the effectiveness and the stability of the proposed method for on-line transient stability assessment procedure of large-scale power system. The proposed feature selection algorithm has been compared with different feature selection algorithms. The simulation results demonstrate the effectiveness of the proposed feature algorithm.

  7. ASLan++ — A Formal Security Specification Language for Distributed Systems

    DEFF Research Database (Denmark)

    Von Oheimb, David; Mödersheim, Sebastian Alexander

    2010-01-01

    This paper introduces ASLan++, the AVANTSSAR Specification Language. ASLan++ has been designed for formally specifying dynamically composed security-sensitive web services and service-oriented architectures, their associated security policies, as well as their security properties, at both communi...

  8. Expert System Development on On-line Measurement of Sewage Treatment Based Process

    Directory of Open Access Journals (Sweden)

    Jianjun QIN

    2014-02-01

    Full Text Available This article puts forward a solution in which an instrument on-line automatic measurement and expert system process are optimized according to the complexity and great process dynamics of sewage treatment process. Firstly modeling has been set up with configuration sewage treatment process in which the process has been integrated into the computer software environment. Secondly certain number of water quality automatic monitoring instruments and sensor probes are set in the reaction tanks according to the needs of process changes and management. The data information acquired can be displayed and recorded at the real time. A human-machine integration expert system featuring computer automation management is developed for the base by one-off method thus to realize the intelligent and unmanned management. The advantages brought about from it can fill up the inexperience of the on-site management personnel and solve the contradiction between the water quality dynamics and difficulty in the process adjustment.

  9. In the Jungle of Astronomical On--line Data Services

    Science.gov (United States)

    Egret, D.

    The author tried to survive in the jungle of astronomical on--line data services. In order to find efficient answers to common scientific data retrieval requests, he had to collect many pieces of information, in order to formulate typical user scenarios, and try them against a number of different data bases, catalogue services, or information systems. He discovered soon how frustrating treasure coffers may be when their keys are not available, but he realized also that nice widgets and gadgets are of no help when the information is not there. And, before long, he knew he would have to navigate through several systems because no one was yet offering a general answer to all his questions. I will present examples of common user scenarios and show how they were tested against a number of services. I will propose some elements of classification which should help the end-user to evaluate how adequate the different services may be for providing satisfying answers to specific queries. For that, many aspects of the user interaction will be considered: documentation, access, query formulation, functionalities, qualification of the data, overall efficiency, etc. I will also suggest possible improvements to the present situation: the first of them being to encourage system managers to increase collaboration between one another, for the benefit of the whole astronomical community. The subjective review I will present, is based on publicly available astronomical on--line services from the U.S. and from Europe, most of which (excepting the newcomers) were described in ``Databases and On-Line Data in Astronomy", (Albrecht & Egret, eds, 1991): this includes databases (such as NED and Simbad ), catalog services ( StarCat , DIRA , XCatScan , etc.), and information systems ( ADS and ESIS ).

  10. On-line implant reconstruction in HDR brachytherapy

    International Nuclear Information System (INIS)

    Kolkman-Deurloo, Inger-Karine K.; Kruijf, Wilhelmus J.M. de; Levendag, Peter C.

    2006-01-01

    Background and purpose: To evaluate the accuracy of on-line planning in an Integrated Brachytherapy Unit (IBU) using dedicated image distortion correction algorithms, correcting the geometric distortion and magnetic distortion separately, and to determine the effect of the reconstruction accuracy on clinical treatment plans in terms of deviations in treatment time and dose. Patients and methods: The reconstruction accuracy has been measured using 20 markers, positioned at well known locations in a QA phantom. Treatment plans of two phantoms representing clinical implant geometries, have been compared with reference plans to determine the effect of the reconstruction accuracy on the treatment plan. Before clinical introduction, treatment plans of three representative patients, based on on-line reconstruction, have been compared with reference plans. Results: The average reconstruction error for 10 in. images reduces from -0.6 mm (range -2.6 to +1.0 mm) to -0.2 mm (range -1.2 to +0.6 mm) after image distortion correction and for 15 in. images from 0.8 mm (range -0.5 to +3.0 mm) to 0.0 mm (range -0.8 to +0.8 mm). The error in case of eccentric positioning of the phantom, i.e. 0.8 mm (range -1.0 to +3.3 mm), reduces to 0.1 mm (range -0.5 to +0.9 mm). Correction of the image distortions reduces the deviation in the calculated treatment time of maximally 2.7% to less than 0.8% in case of eccentrically positioned clinical phantoms. The deviation in the treatment time or reference dose in the plans based on on-line reconstruction with image distortion correction of the three patient examples is smaller than 0.3%. Conclusions: Accurate on-line implant reconstruction using the IBU localiser and dedicated correction algorithms separating the geometric distortion and the magnetic distortion is possible. The results fulfill the minimum requirements as imposed by the Netherlands Commission on Radiation Dosimetry (NCS) without limitations regarding the usable range of the field

  11. On-line data processing for scintillation camera

    International Nuclear Information System (INIS)

    Ueyanagi, Hideo

    1974-01-01

    To process on-line the information from scintillation cameras, the computing/processing device of wired program type, with a specialized mini-computer for the processing, is generally used; and by this method, the data processing is done by the users of scintillation cameras. In the device with a mini-computer with processing programming by software, the almost all items in processing can be executed; but the operation requires some skill. With mini-computer operation, on the other hand, there are the problems of data-point number, process-time reduction, and image storage for both long and short terms. (Mori, K.)

  12. Robust Control Methods for On-Line Statistical Learning

    Directory of Open Access Journals (Sweden)

    Capobianco Enrico

    2001-01-01

    Full Text Available The issue of controlling that data processing in an experiment results not affected by the presence of outliers is relevant for statistical control and learning studies. Learning schemes should thus be tested for their capacity of handling outliers in the observed training set so to achieve reliable estimates with respect to the crucial bias and variance aspects. We describe possible ways of endowing neural networks with statistically robust properties by defining feasible error criteria. It is convenient to cast neural nets in state space representations and apply both Kalman filter and stochastic approximation procedures in order to suggest statistically robustified solutions for on-line learning.

  13. Development of an on-line radon monitoring system

    International Nuclear Information System (INIS)

    Guo Huiping; Shang Aiguo; Liu Junfeng; Zhou Chunlin; Di Yuming

    2004-01-01

    Of the actual demand by the strategic missile troops, the author has successfully developed a specially designed passive diffusion collecting chamber to collect the decay products of radon by high voltage static electricity, and using the single-chip microcomputer to reckon the radon concentration in air, which is actually a portable, continuous and automatic on-line monitoring instrument. It was made into a four-slot standard plug-in board of a NIM, and it functions as auto data memory, data process, display, over-threshold alarming and so on. (authors)

  14. Integrated on-line accelerator modeling at CEBAF

    International Nuclear Information System (INIS)

    Bowling, B.A.; Shoaee, H.; Van Zeijts, J.; Witherspoon, S.; Watson, W.

    1995-01-01

    An on-line accelerator modeling facility is currently under development at CEBAF. The model server, which is integrated with the EPICS control system, provides coupled and 2nd-order matrices for the entire accelerator, and forms the foundation for automated model- based control and diagnostic applications. Four types of machine models are provided, including design, golden or certified, live, and scratch or simulated model. Provisions are also made for the use of multiple lattice modeling programs such as DIMAD, PARMELA, and TLIE. Design and implementation details are discussed. 2 refs., 4 figs

  15. Enhancing Learner Autonomy in an On-line Editing Programme

    Directory of Open Access Journals (Sweden)

    Hebe Wong

    2011-09-01

    Full Text Available Little (1999 argues that in formal educational contexts, “the basis of learner autonomy is acceptance of responsibility for one’s own learning” (p.11. An autonomous learner takes responsibility for various aspects of learning (Benson & Voller, 1997; Holec, 1981. This study examines how learner autonomy opportunities were provided at various stages of writing in an on-line editing programme for a group of electronic engineering students and how the students took charge of their language learning when receiving feedback on their technical writing. The impact on their own learning effectiveness of the decisions students made is also discussed.

  16. Investigating on-line pornography at the University of Johannesburg

    Directory of Open Access Journals (Sweden)

    P. Laughton

    2007-12-01

    (61,6% aged between 19 years and 21 years. Of the respondents, 36,7% indicated that exposure to unsolicited pornography did not bother them. When asked to what extent students should have access to pornography, 60,5% stated 'None' while 32,6% believed that 'Restricted' access should be granted for research purposes and 6,9% believed that students should be granted 'Total' access to pornography. Results from the research will be used to manage access to on-line resources at the University of Johannesburg better.

  17. On-line core monitoring with CORE MASTER / PRESTO

    International Nuclear Information System (INIS)

    Lindahl, S.O.; Borresen, S.; Ovrum, S.

    1986-01-01

    Advanced calculational tools are instrumental in improving reactor plant capacity factors and fuel utilization. The computer code package CORE MASTER is an integrated system designed to achieve this objective. The system covers all main activities in the area of in-core fuel management for boiling water reactors; design, operation support, and on-line core monitoring. CORE MASTER operates on a common data base, which defines the reactor and documents the operating history of the core and of all fuel bundles ever used

  18. Core on-line monitoring and computerized procedures systems

    International Nuclear Information System (INIS)

    Gangloff, W.C.

    1986-01-01

    The availability of operating nuclear power plants has been affected significantly by the difficulty people have in coping with the complexity of the plants and the operating procedures. Two ways to use modern computer technology to ease the burden of coping are discussed in this paper, an on-line core monitoring system with predictive capability and a computerized procedures system using live plant data. These systems reduce human errors by presenting information rather than simply data, using the computer to manipulate the data, but leaving the decisions to the plant operator

  19. Lower Bounds and Semi On-line Multiprocessor Scheduling

    Directory of Open Access Journals (Sweden)

    T.C. Edwin Cheng

    2003-10-01

    Full Text Available We are given a set of identical machines and a sequence of jobs from which we know the sum of the job weights in advance. The jobs have to be assigned on-line to one of the machines and the objective is to minimize the makespan. An algorithm with performance ratio 1.6 and a lower bound of 1.5 is presented. This improves recent results by Azar and Regev who published an algorithm with performance ratio 1.625 for the less general problem that the optimal makespan is known in advance.

  20. Adaptive calibration method with on-line growing complexity

    Directory of Open Access Journals (Sweden)

    Šika Z.

    2011-12-01

    Full Text Available This paper describes a modified variant of a kinematical calibration algorithm. In the beginning, a brief review of the calibration algorithm and its simple modification are described. As the described calibration modification uses some ideas used by the Lolimot algorithm, the algorithm is described and explained. Main topic of this paper is a description of a synthesis of the Lolimot-based calibration that leads to an adaptive algorithm with an on-line growing complexity. The paper contains a comparison of simple examples results and a discussion. A note about future research topics is also included.

  1. The development of an on-line gold analyser

    International Nuclear Information System (INIS)

    Robert, R.V.D.; Ormrod, G.T.W.

    1982-01-01

    An on-line analyser to monitor the gold in solutions from the carbon-in-pulp process is described. The automatic system is based on the delivery of filtered samples of the solutions to a distribution valve for measurement by flameless atomic-absorption spectrophotometry. The samples is introduced by the aerosol-deposition method. Operation of the analyser on a pilot plant and on a full-scale carbon-in-pulp plant has shown that the system is economically feasible and capable of providing a continuous indication of the efficiency of the extraction process

  2. NNDC [National Nuclear Data Center] on-line services documentation

    International Nuclear Information System (INIS)

    Dunford, C.L.; Burrows, T.W.; Tuli, J.K.

    1987-01-01

    This document summarizes and describes how to access the on-line services available from the National Nuclear Data Center (NNDC) located at Brookhaven National Laboratory. The services are available free of cost to US Department of Energy, its contractors and others who support the NNDC or supply data to the NNDC. Four of the center's data bases are now accessible to non-NNDC scientists via remote connection to the center's VAX 11/780. To use this service, you must have a terminal with access by either a telephone line or the PHYSNET network. A VT100 terminal or a terminal with VT-100 emulation is recommended but not required

  3. On-line fatigue monitoring and margins probabilistic assessment

    International Nuclear Information System (INIS)

    Fournier, I.; Morilhat, P.

    1993-01-01

    An on-line computer aided system has been developed by Electricite de France, the French utility, for a fatigue monitoring of critical locations in the nuclear steam supply system. This tool, called fatiguemeter, includes as input data only existing plant parameters and is based on some conservative assumptions at several steps of the damage assessment (thermal boundary conditions, stress computation...). This paper presents recent developments performed toward a better assessing of margins involved in the complete analysis. The methodology is enlightened with an example showing the influence of plant parameters incertitude on the final stress computed at a PWR 900 MW unit pressurizer surge line nozzle. (author)

  4. On-line system for investigation of atomic structure

    International Nuclear Information System (INIS)

    Amus'ya, M.Ya.; Chernysheva, L.V.

    1983-01-01

    A description of the on-line ATOM system is presented that enables to investigate the structure of atomic electron shells and their interactions with different scattering particles-electrons, positronse photons, mesons - with the use of computerized numerical solutions. The problem is stated along with mathematical description of atomic properties including theoretical and numerical models for each investigated physical process. The ATOM system structure is considered. The Hartree-Fock method is used to determine the wave functions of the ground and excited atomic states. The programs are written in the ALGOL langauge. Different atomic characteristics were possible to be calculated for the first time with an accuracy exceeding an experimental one

  5. ELT-MELAS analyzer and its on-line programs

    International Nuclear Information System (INIS)

    Anikeev, V.B.; Berezhnoj, V.A.; Glupova

    1976-01-01

    ELT-MELAS device constructed for an automatic analysis of pictures from big bubble chambers is described. It is controlled by a medium-size ICL-1903A computer and has two measuring modes: analysis of the ''agreement'' signal and digitation of slice-scans. Main features of the hardware and of on-line controlling and diagnostic software are presented. The test results of the MELAS complex as well as preliminary results of the scan-slice measurements of pictures from 15sup(') chamber are given

  6. Communications and Information: Emission Security

    National Research Council Canada - National Science Library

    1998-01-01

    The Air Force EMSEC process has experienced many changes. Although these changes were attempts to meet the variances of a dynamic world, they require security protection measures far beyond the needs of the average user...

  7. On-Line Core Thermal-Hydraulic Model Improvement

    International Nuclear Information System (INIS)

    In, Wang Kee; Chun, Tae Hyun; Oh, Dong Seok; Shin, Chang Hwan; Hwang, Dae Hyun; Seo, Kyung Won

    2007-02-01

    The objective of this project is to implement a fast-running 4-channel based code CETOP-D in an advanced reactor core protection calculator system(RCOPS). The part required for the on-line calculation of DNBR were extracted from the source of the CETOP-D code based on analysis of the CETOP-D code. The CETOP-D code was revised to maintain the input and output variables which are the same as in CPC DNBR module. Since the DNBR module performs a complex calculation, it is divided into sub-modules per major calculation step. The functional design requirements for the DNBR module is documented and the values of the database(DB) constants were decided. This project also developed a Fortran module(BEST) of the RCOPS Fortran Simulator and a computer code RCOPS-SDNBR to independently calculate DNBR. A test was also conducted to verify the functional design and DB of thermal-hydraulic model which is necessary to calculate the DNBR on-line in RCOPS. The DNBR margin is expected to increase by 2%-3% once the CETOP-D code is used to calculate the RCOPS DNBR. It should be noted that the final DNBR margin improvement could be determined in the future based on overall uncertainty analysis of the RCOPS

  8. Utilities enticing customers to come on-line

    International Nuclear Information System (INIS)

    Anon

    2000-01-01

    The first tentative steps by electric utilities to offer customer services on-line is reported. While most of the on-line communications to date has been merely to present information about products and services, at least a few utilities, -- Newfoundland Power being one of them -- are now offering customers the opportunity to check on their account status, to make inquiries, and on a voluntary basis employees of the utility can receive their bills on the web. BC Hydro is even more advanced; it has offered a similar service since 1997. The option to pay bills at the BC Hydro website is coming shortly. U. S. utility companies are reported to be far more advanced in the use of the Internet; according to a study by Deloitte Consulting, U.S. utilities are advancing to the next stage wherein Web intermediaries will be offering 'shop bots' that do comparison shopping on behalf of a customer, including bidding for power on a customer's behalf at energy auctions, reverse auctions, where sellers are bidding for customers' services, and buyers clubs where customers join together to take advantage of volume buying power

  9. On-line monitoring and inservice inspection in codes

    International Nuclear Information System (INIS)

    Bartonicek, J.; Zaiss, W.; Bath, H.R.

    1999-01-01

    The relevant regulatory codes determine the ISI tasks and the time intervals for recurrent components testing for evaluation of operation-induced damaging or ageing in order to ensure component integrity on the basis of the last available quality data. In-service quality monitoring is carried out through on-line monitoring and recurrent testing. The requirements defined by the engineering codes elaborated by various institutions are comparable, with the KTA nuclear engineering and safety codes being the most complete provisions for quality evaluation and assurance after different, defined service periods. German conventional codes for assuring component integrity provide exclusively for recurrent inspection regimes (mainly pressure tests and optical testing). The requirements defined in the KTA codes however always demanded more specific inspections relying on recurrent testing as well as on-line monitoring. Foreign codes for ensuring component integrity concentrate on NDE tasks at regular time intervals, with time intervals scope of testing activities being defined on the basis of the ASME code, section XI. (orig./CB) [de

  10. Polar On-Line Acquisition Relay and Transmission System (POLARATS)

    Energy Technology Data Exchange (ETDEWEB)

    Yuracko, K.

    2004-07-15

    POLARATS (Polar On-Line Acquisition Relay And Transmission System) is being developed by YAHSGS LLC (YAHSGS) and Oak Ridge National Laboratory (ORNL) to provide remote, unattended monitoring of environmental parameters under harsh environmental conditions. In particular, instrumental design and engineering is oriented towards protection of human health in the Arctic, and with the additional goal of advancing Arctic education and research. POLARATS will obtain and transmit environmental data from hardened monitoring devices deployed in locations important to understanding atmospheric and aquatic pollutant migration as it is biomagnified in Arctic food chains. An Internet- and personal computer (PC)-based educational module will provide real time sensor data, on-line educational content, and will be integrated with workbooks and textbooks for use in middle and high school science programs. The educational elements of POLARATS include an Internet-based educational module that will instruct students in the use of the data and how those data fit into changing Arctic environments and food chains. POLARATS will: (1) Enable students, members of the community, and scientific researchers to monitor local environmental conditions in real time over the Internet; and (2) Provide additional educational benefits through integration with middle- and high-school science curricula. Information will be relayed from POLARATS devices to classrooms and libraries along with custom-designed POLARATS teaching materials that will be integrated into existing curricula to enhance the educational benefits realized from the information obtained.

  11. Aria Sardinia: the on line community joining tradition and innovatiom

    Directory of Open Access Journals (Sweden)

    Fabrizio Lao

    2005-12-01

    Full Text Available The "ARIA Sardinia" project (Network Actions for Italians Abroad has been especially designed to integrate and give value to the network of relationships between public administrations, local socio-economic stakeholders and Italian communities abroad, this goal to be pursued with the support of new technologies and learning approaches emerging within the context of on line interest communities. The general objective of the project is the development of competencies and knowledge, intended to combine specific technical skills with local "territorial knowledge", in a process where the strengthening and the dissemination of these forms of culture come from the prompt use of innovative tools. The main activities of the project are the actions intended to guide and assist entrepreneurs, associations, development projects' partners or promoters in the path of acquisition and dissemination of the competencies which are necessary to the involvement of Italians abroad into the internationalization process of Sardinian economy. ARIA Sardinia was funded by the Italian Foreign Affairs Ministry and the European Social Fund (FSE, within the framework of the National Operational Program for Technical Assistance and System Action (PON ATAS aimed at specific promotion initiatives and fostering of permanent links between Southern Italy economy and Italians living abroad. Keywords: on line community, networking, Italians abroad, Sardinian economy, Sardinia, culture.

  12. On-Line Core Thermal-Hydraulic Model Improvement

    Energy Technology Data Exchange (ETDEWEB)

    In, Wang Kee; Chun, Tae Hyun; Oh, Dong Seok; Shin, Chang Hwan; Hwang, Dae Hyun; Seo, Kyung Won

    2007-02-15

    The objective of this project is to implement a fast-running 4-channel based code CETOP-D in an advanced reactor core protection calculator system(RCOPS). The part required for the on-line calculation of DNBR were extracted from the source of the CETOP-D code based on analysis of the CETOP-D code. The CETOP-D code was revised to maintain the input and output variables which are the same as in CPC DNBR module. Since the DNBR module performs a complex calculation, it is divided into sub-modules per major calculation step. The functional design requirements for the DNBR module is documented and the values of the database(DB) constants were decided. This project also developed a Fortran module(BEST) of the RCOPS Fortran Simulator and a computer code RCOPS-SDNBR to independently calculate DNBR. A test was also conducted to verify the functional design and DB of thermal-hydraulic model which is necessary to calculate the DNBR on-line in RCOPS. The DNBR margin is expected to increase by 2%-3% once the CETOP-D code is used to calculate the RCOPS DNBR. It should be noted that the final DNBR margin improvement could be determined in the future based on overall uncertainty analysis of the RCOPS.

  13. The Automated Threaded Fastening Based on On-line Identification

    Directory of Open Access Journals (Sweden)

    Nicolas Ivan Giannoccaro

    2008-11-01

    Full Text Available The principle of the thread fastenings have been known and used for decades with the purpose of joining one component to another. Threaded fastenings are popular because they permit easy disassembly for maintenance, repair, relocation and recycling. Screw insertions are typically carried out manually. It is a difficult problem to automat. As a result there is very little published research on automating threaded fastenings, and most research on automated assembly focus on the peg-in-hole assembly problem. This paper investigates the problem of automated monitoring of the screw insertion process. The monitoring problem deals with predicting integrity of a threaded insertion, based on the torque vs. insertion depth curve generated during the insertions. The authors have developed an analytical model to predict the torque signature signals during self-tapping screw insertions. However, the model requires parameters on the screw dimensions and plate material properties are difficult to measure. This paper presents a study on on-line identification during screw fastenings. An identification methodology for two unknown parameter estimation during a self-tapping screw insertion process is presented. It is shown that friction and screw properties required by the model can be reliably estimated on-line. Experimental results are presented to validate the identification procedure.

  14. Calibration through on-line monitoring of instruments channels

    International Nuclear Information System (INIS)

    James, R.W.

    1996-01-01

    Plant technical specifications require periodic calibration of instrument channels, and this has traditionally meant calibration at fixed time intervals for nearly all instruments. Experience has shown that unnecessarily frequent calibrations reduce channel availability and reliability, impact outage durations, and increase maintenance costs. An alternative approach to satisfying existing requirements for periodic calibration consists of on-line monitoring and quantitative comparison of instrument channels during operation to identify instrument degradation and failure. A Utility Working Group has been formed by EPRI to support the technical activities necessary to achieve generic NRC acceptance of on-line monitoring of redundant instrument channels as a basis for determining when to perform calibrations. A topical report proposing NRC acceptance of this approach was submitted in August 1995, and the Working Group is currently resolving NRC technical questions. This paper describes the proposed approach and the current status of the topical report with regard to NRC review. While these activities will not preclude utilities from continuing to use existing calibration approaches, successful acceptance of this performance-based approach will allow utilities to substantially reduce the number of calibrations which are performed. Concurrent benefits will include reduced I ampersand C impact on outage durations and improved sensitivity to instrument channel performance

  15. On-line optimal control improves gas processing

    International Nuclear Information System (INIS)

    Berkowitz, P.N.; Papadopoulos, M.N.

    1992-01-01

    This paper reports that the authors' companies jointly funded the first phase of a gas processing liquids optimization project that has the specific purposes to: Improve the return of processing natural gas liquids, Develop sets of control algorithms, Make available a low-cost solution suitable for small to medium-sized gas processing plants, Test and demonstrate the feasibility of line control. The ARCO Willard CO 2 gas recovery processing plant was chosen as the initial test site to demonstrate the application of multivariable on-line optimal control. One objective of this project is to support an R ampersand D effort to provide a standardized solution to the various types of gas processing plants in the U.S. Processes involved in these gas plants include cryogenic separations, demethanization, lean oil absorption, fractionation and gas treating. Next, the proposed solutions had to be simple yet comprehensive enough to allow an operator to maintain product specifications while operating over a wide range of gas input flow and composition. This had to be a supervisors system that remained on-line more than 95% of the time, and achieved reduced plant operating variability and improved variable cost control. It took more than a year to study various gas processes and to develop a control approach before a real application was finally exercised. An initial process for C 2 and CO 2 recoveries was chosen

  16. Amdel on-line analyser at Rooiberg Tin Limited

    International Nuclear Information System (INIS)

    Owen, T.V.

    1987-01-01

    An Amdel on line analysis system was installed on the 'A' mine tin flotation plant at Rooiberg in April 1984. The motivation for the installation was made on account of the large variations in the feed grade to the plant and the resulting need for rapid operational adjustments to control concentrate grades thereby maximising the financial returns. An 'on-line' analyser system presented itself as a suitable alternative to the existing control method of smaller laboratory x-ray fluorescence analysers. On the system as installed at Rooiberg, two probes were fitted in each analysis zone, viz a density probe using high energy gamma radiation from a Cesium 127 source and a specific element absorption probe using low energy gamma radiation from a Americium 241 source. The signals as received from the probes are fed to a line receiver unit in the control room where a micro computer is doing the processing and prints out the information as required. Several advantages of this type of installation were gained at Rooiberg Tin Limited

  17. Project development and commercialisation of on-line analysis systems

    International Nuclear Information System (INIS)

    Watt, J.S.

    2000-01-01

    A project team first in the Australian Atomic Energy Commission (AAEC) and since 1982 in CSIRO has developed many on-line analysis systems for the mineral and energy industries. The development of these projects, usually lasting 7-10 years, has followed a common pattern of laboratory R and D, field trials, commercialisation and technology transfer. This successful pattern is illustrated using examples of the development of systems for the on-line analysis of mineral slurries, for determination of the ash content of coal on conveyors, and for determination of the flow rates of oil, water and gas in pipelines. The first two systems, licensed to Australian companies, are used world-wide. They are now the market leaders for radioisotope gauges in their application field. The third, the multiphase flow meter, was licensed in 1997 to an international company. This meter has even greater potential than the other two systems for economic benefit from its use and for numbers of installations. (author)

  18. Increased Cortical Thickness in Professional On-Line Gamers

    Science.gov (United States)

    Hyun, Gi Jung; Shin, Yong Wook; Kim, Bung-Nyun; Cheong, Jae Hoon; Jin, Seong Nam

    2013-01-01

    Objective The bulk of recent studies have tested whether video games change the brain in terms of activity and cortical volume. However, such studies are limited by several factors including cross-sectional comparisons, co-morbidity, and short-term follow-up periods. In the present study, we hypothesized that cognitive flexibility and the volume of brain cortex would be correlated with the career length of on-line pro-gamers. Methods High-resolution magnetic resonance scans were acquired in twenty-three pro-gamers recruited from StarCraft pro-game teams. We measured cortical thickness in each individual using FreeSurfer and the cortical thickness was correlated with the career length and the performance of the pro-gamers. Results Career length was positively correlated with cortical thickness in three brain regions: right superior frontal gyrus, right superior parietal gyrus, and right precentral gyrus. Additionally, increased cortical thickness in the prefrontal cortex was correlated with winning rates of the pro-game league. Increased cortical thickness in the prefrontal and parietal cortices was also associated with higher performance of Wisconsin Card Sorting Test. Conclusion Our results suggest that in individuals without pathologic conditions, regular, long-term playing of on-line games is associated with volume changes in the prefrontal and parietal cortices, which are associated with cognitive flexibility. PMID:24474988

  19. BOOK REVIEW: ON-LINE EDUCATION: AN EMANCIPATING VISION

    Directory of Open Access Journals (Sweden)

    Reviewed by Dr. Abdullah KUZU

    2006-04-01

    courses. The courses are presented as educational projects in which several methodological strategies are considered, such as: brainstorming, work groups, group dynamics, questionnaires, and direct interviews in on-line time. While making a presentation of the structure of this type of course, a permanent participation of the people involved in the educational process should be encouraged. This interaction will allow the establishing of a foundation for other types of instruments that enrich the project, meaning that it will suggest a permanent systematization of the performed work, during and afterwards, thus outlining the collective work. During the creation process of WEB courses, it has to be considered that these are "oriented by popular education principles, the rhizome, by participation design, by ultiple subjects and by pedagogical mediations. According to our view, it involves a concrete exercise of the participants, a subject treatment of both the learning and the form. In the same way, it implies a socio-historical situation of the constituents of the project, an organization according to the methodologies that was constructed by them". With regard to the actual use of the proposition, it could be said that because of the moment and the conjuncture we are living in, it demands an educational situation of permanent innovation that provides new meaning with respect to the education of the teacher and, for that, the pedagogical mediation processes and the participation programs of web courses have to be acknowledged as relevant. Here it is also worth noting that this proposal does not only include a epistemological dimension but also presents in an outstanding way the 'how, why and for what' of long distance education by exposing several important points of the LDE–Long Distance Education, utilizing an emancipating vision that joins a series of pertinent ideas to a different model for the development of courses, to their processes, as well as to the more

  20. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  1. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  2. An integrated on-line irradiation and in situ live cell imaging system

    Energy Technology Data Exchange (ETDEWEB)

    Liang, Ying; Fu, Qibin; Wang, Weikang; Liu, Yu; Liu, Feng; Yang, Gen, E-mail: gen.yang@pku.edu.cn; Wang, Yugang

    2015-09-01

    Ionizing radiation poses a threat to genome integrity by introducing DNA damages, particularly DNA double-strand breaks (DSB) in cells. Understanding how cells react to DSB and maintain genome integrity is of major importance, since increasing evidences indicate the links of DSB with genome instability and cancer predispositions. However, tracking the dynamics of DNA damages and repair response to ionizing radiation in individual cell is difficult. Here we describe the development of an on-line irradiation and in situ live cell imaging system based on isotopic sources at Institute of Heavy Ion Physics, Peking University. The system was designed to irradiate cells and in situ observe the cellular responses to ionizing radiation in real time. On-line irradiation was achieved by mounting a metal framework that hold an isotopic γ source above the cell culture dish for γ irradiation; or by integrating an isotopic α source to an objective lens under the specialized cell culture dish for α irradiation. Live cell imaging was performed on a confocal microscope with an environmental chamber installed on the microscope stage. Culture conditions in the environment chamber such as CO{sub 2}, O{sub 2} concentration as well as temperature are adjustable, which further extends the capacity of the system and allows more flexible experimental design. We demonstrate the use of this system by tracking the DSB foci formation and disappearance in individual cells after exposure to irradiation. On-line irradiation together with in situ live cell imaging in adjustable culture conditions, the system overall provides a powerful tool for investigation of cellular and subcellular response to ionizing radiation under different physiological conditions such as hyperthermia or hypoxia.

  3. On-line validation of feedwater flow rate in nuclear power plants using neural networks

    International Nuclear Information System (INIS)

    Khadem, M.; Ipakchi, A.; Alexandro, F.J.; Colley, R.W.

    1994-01-01

    On-line calibration of feedwater flow rate measurement in nuclear power plants provides a continuous realistic value of feedwater flow rate. It also reduces the manpower required for periodic calibration needed due to the fouling and defouling of the venturi meter surface condition. This paper presents a method for on-line validation of feedwater flow rate in nuclear power plants. The method is an improvement of the previously developed method which is based on the use of a set of process variables dynamically related to the feedwater flow rate. The online measurements of this set of variables are used as inputs to a neural network to obtain an estimate of the feedwater flow rate reading. The difference between the on-line feedwater flow rate reading, and the neural network estimate establishes whether there is a need to apply a correction factor to the feedwater flow rate measurement for calculation of the actual reactor power. The method was applied to the feedwater flow meters in the two feedwater flow loops of the TMI-1 nuclear power plant. The venturi meters used for flow measurements are susceptible to frequent fouling that degrades their measurement accuracy. The fouling effects can cause an inaccuracy of up to 3% relative error in feedwater flow rate reading. A neural network, whose inputs were the readings of a set of reference instruments, was designed to predict both feedwater flow rates simultaneously. A multi-layer feedforward neural network employing the backpropagation algorithm was used. A number of neural network training tests were performed to obtain an optimum filtering technique of the input/output data of the neural networks. The result of the selection of the filtering technique was confirmed by numerous Fast Fourier Transform (FFT) tests. Training and testing were done on data from TMI-1 nuclear power plant. The results show that the neural network can predict the correct flow rates with an absolute relative error of less than 2%

  4. An integrated on-line irradiation and in situ live cell imaging system

    International Nuclear Information System (INIS)

    Liang, Ying; Fu, Qibin; Wang, Weikang; Liu, Yu; Liu, Feng; Yang, Gen; Wang, Yugang

    2015-01-01

    Ionizing radiation poses a threat to genome integrity by introducing DNA damages, particularly DNA double-strand breaks (DSB) in cells. Understanding how cells react to DSB and maintain genome integrity is of major importance, since increasing evidences indicate the links of DSB with genome instability and cancer predispositions. However, tracking the dynamics of DNA damages and repair response to ionizing radiation in individual cell is difficult. Here we describe the development of an on-line irradiation and in situ live cell imaging system based on isotopic sources at Institute of Heavy Ion Physics, Peking University. The system was designed to irradiate cells and in situ observe the cellular responses to ionizing radiation in real time. On-line irradiation was achieved by mounting a metal framework that hold an isotopic γ source above the cell culture dish for γ irradiation; or by integrating an isotopic α source to an objective lens under the specialized cell culture dish for α irradiation. Live cell imaging was performed on a confocal microscope with an environmental chamber installed on the microscope stage. Culture conditions in the environment chamber such as CO 2 , O 2 concentration as well as temperature are adjustable, which further extends the capacity of the system and allows more flexible experimental design. We demonstrate the use of this system by tracking the DSB foci formation and disappearance in individual cells after exposure to irradiation. On-line irradiation together with in situ live cell imaging in adjustable culture conditions, the system overall provides a powerful tool for investigation of cellular and subcellular response to ionizing radiation under different physiological conditions such as hyperthermia or hypoxia

  5. An integrated on-line irradiation and in situ live cell imaging system

    Science.gov (United States)

    Liang, Ying; Fu, Qibin; Wang, Weikang; Liu, Yu; Liu, Feng; Yang, Gen; Wang, Yugang

    2015-09-01

    Ionizing radiation poses a threat to genome integrity by introducing DNA damages, particularly DNA double-strand breaks (DSB) in cells. Understanding how cells react to DSB and maintain genome integrity is of major importance, since increasing evidences indicate the links of DSB with genome instability and cancer predispositions. However, tracking the dynamics of DNA damages and repair response to ionizing radiation in individual cell is difficult. Here we describe the development of an on-line irradiation and in situ live cell imaging system based on isotopic sources at Institute of Heavy Ion Physics, Peking University. The system was designed to irradiate cells and in situ observe the cellular responses to ionizing radiation in real time. On-line irradiation was achieved by mounting a metal framework that hold an isotopic γ source above the cell culture dish for γ irradiation; or by integrating an isotopic α source to an objective lens under the specialized cell culture dish for α irradiation. Live cell imaging was performed on a confocal microscope with an environmental chamber installed on the microscope stage. Culture conditions in the environment chamber such as CO2, O2 concentration as well as temperature are adjustable, which further extends the capacity of the system and allows more flexible experimental design. We demonstrate the use of this system by tracking the DSB foci formation and disappearance in individual cells after exposure to irradiation. On-line irradiation together with in situ live cell imaging in adjustable culture conditions, the system overall provides a powerful tool for investigation of cellular and subcellular response to ionizing radiation under different physiological conditions such as hyperthermia or hypoxia.

  6. On-line determination of moisture in coal and coke

    International Nuclear Information System (INIS)

    Cutmore, N.G.; Sowerby, B.D.

    1987-01-01

    The CSIRO Division of Mineral Engineering is developing various techniques for the on-line determination of moisture in coal and coke, and some instruments are now commercially available. These techniques permit accurate and rapid determination of moisture in materials directly on conveyor belts or in bins. The most promising techniques for direct on-belt measurement of moisture in coal are capacitance and microwave transmission. A non-contacting under-belt capacitance and gamma-ray backscatter technique has determined moisture in coal to better than 0.5 wt% in field tests. CSIRO is developing a fast neutron and gamma-ray transmission technique, which is proving very accurate in laboratory tests. This technique overcomes many of the limitations of thermal neutrons moisture gauges

  7. On-line monitoring system for utility boiler diagnostics

    International Nuclear Information System (INIS)

    Radovanovic, P.M.; Afgan, N.H.; Caralho, M.G.

    1997-01-01

    The paper deals with the new developed modular type Monitoring System for Utility Boiler Diagnostics. Each module is intended to assess the specific process and can be used as a stand alone application. Four modules are developed, namely: LTC - module for the on-line monitoring of parameters related to the life-time consumption of selected boiler components; TRD - module for the tube rupture detection by the position and working fluid Ieakage quantity; FAM - module for the boiler surfaces fouling (slagging) assessment and FLAP - module for visualization of the boiler furnace flame position. All four modules are tested on respective pilot plants built oil the 200 and 300 MWe utility boilers. Monitoring System is commercially available and can be realized in any combination of its modules depending on demands induced by the operational problems of specific boiler. Further development of Monitoring System is performed in accordance with the respective EU project on development of Boiler Expert System. (Author)

  8. On-line Certification for All: The PINVOX Algorithm

    Directory of Open Access Journals (Sweden)

    E Canessa

    2012-09-01

    Full Text Available A protoype algorithm: PINVOX (“Personal Identification Number by Voice" for on-line certification is introduced to guarantee that scholars have followed, i.e., listened and watched, a complete recorded lecture with the option of earning a certificate or diploma of completion after remotely attending courses. It is based on the injection of unique, randomly selected and pre-recorded integer numbers (or single letters or words within the audio trace of a video stream at places where silence is automatically detected. The certificate of completion or “virtual attendance” is generated on-the-fly after the successful identification of the embedded PINVOX code by a video viewer student.

  9. On-line monitoring system for I-131 manufacturing labs

    International Nuclear Information System (INIS)

    Osovizky, A.; Malamud, Y.; Paran, Y.; Tal, N.; Turgeman, S.; Weinstein, M.

    1997-01-01

    An on-line monitoring and safety system has been installed in a lab for manufacturing 1-131 capsules for nuclear medicine use. Production of up to 100mCi batches is performed in shielded glove boxes. The safety system is based on a unique, 'Medi SMARTS' system (Medical Survey Mapping Automatic Radiation Tracing System), that collects continuously the radiation measurements for processing, display, and storage for future retrieval. Radiation is measured by GM tubes, data is transferred to a data processing unit, and then via a RS-485 communication line to a computer. In addition to the operational advantages and radiation levels storage, the system is being evaluated for the purpose of identifying risky stages in the process. (authors)

  10. Issues for Bringing Electron Beam Irradiators On-Line

    International Nuclear Information System (INIS)

    Kaye, R.J.; Turman, B.N.

    1999-01-01

    Irradiation of red meat and poultry has been approved by the U.S. FDA, and the U.S. Department of Agriculture's rule for processing red meat is out for comment. Looking beyond the current issues of packaging materials, labeling, and consumer acceptance, this paper reviews the next step of implementation and how to remove, or at least reduce, the barriers to utilization. Polls of the user community identified their requirements for electron beam or x-ray processing of meat or poultry and their concerns about implementation for on-line processing. These needs and issues are compared to the capabilities of the accelerator industry. The critical issues of beam utilization and dose uniformity, factors affecting floor space requirements, and treatment costs are examined

  11. On-line fatigue monitoring system for reactor pressure vessel

    International Nuclear Information System (INIS)

    Tokunaga, K.; Sakai, A.; Aoki, T.; Ranganath, S.; Stevens, G.L.

    1994-01-01

    A workstation-based, on-line fatigue monitoring system for tracking fatigue usage applied to an operating boiling water reactor (BWR), Tsuruga Unit-1, is described. The system uses the influence function approach and determines component stresses using temperature, pressure, and flow rate data that are made available via signal taps from previously existing plant sensors. Using plant unique influence functions developed specifically for the feedwater nozzle location, the system calculates stresses as a function of time and computed fatigue usage. The analysis method used to compute fatigue usage complies with MITI Code Notification No.501. Fatigue usage results for an entire fuel cycle are presented and compared to assumed design basis events to confirm that actual plant thermal duty is significantly less severe than originally estimated in the design basis stress report. As a result, the system provides the technical basis to more accurately evaluate actual reactor conditions as well as the justification for plant life extension. (author)

  12. On-line fatigue monitoring and probabilistic assessment of margins

    Energy Technology Data Exchange (ETDEWEB)

    Fournier, I. [Electricite de France, 93 - Saint-Denis (France). Direction des Etudes et Recherches; Morilhat, P. [Electricite de France, 93 - Saint-Denis (France). Direction des Etudes et Recherches

    1995-01-01

    An on-line computer-aided system has been developed by Electricite de France, the French utility, for fatigue monitoring of critical locations in the nuclear steam supply system. This tool, called a fatigue meter, includes as input data plant parameters and is based on some conservative assumptions at several steps of the damage assessment (thermal boundary conditions, stress computation,..). In this paper we present recent developments performed towards a better assessment of margins involved in the complete analysis. The methodology is illustrated with an example showing the influence of uncertainty in plant parameters on the final stress computed at a pressurized water reactor 900MW unit pressurizer surge line nozzle. A second example is shown to illustrate the possibility of defining some transient archetypes. ((orig.)).

  13. On-line Monitoring of Instrumentation in Research Reactors

    International Nuclear Information System (INIS)

    2017-12-01

    This publication is the result of a benchmarking effort undertaken under the IAEA coordinated research project on improved instrumentation and control (I&C) maintenance techniques for research reactors. It lays the foundation for implementation of on-line monitoring (OLM) techniques and establishment of the validity of those for improved maintenance practices in research reactors for a number of applications such as change to condition based calibration, performance monitoring of process instrumentation systems, detection of process anomalies and to distinguish between process problems/effects and instrumentation/sensor issues. The techniques and guidance embodied in this publication will serve the research reactor community in providing the technical foundation for implementation of OLM techniques. It is intended to be used by Member States to implement I&C maintenance and to improve performance of research reactors.

  14. The Task Manager for the LHCb On-Line Farm

    CERN Document Server

    Bonifazi, F; Carbone, A; Galli, D; Gregori, D; Marconi, U; Peco, G; Vagnoni, V

    2004-01-01

    The Task Manager is a utility to start, stop and list processes on the on-line farm. Each process started by the Task Manager has a string environment variable set, named UTGID (User defined unique Thread Group Identifier) which allows to identify the process. The Task Manager uses the UTGID to list the running processes and to identify the processes to be stopped. It has also the ability to start a process using a particular user name and to set the scheduler type and the priority for the process itself. The Task Manager package includes a Linux DIM server (tmSrv), four Linux command line DIM clients (tmStart, tmLs, tmKill and tmStop) and a JCOP (Joint Control Project) PVSS client.

  15. On-line Corrosion Monitoring in District Heating Systems

    DEFF Research Database (Denmark)

    Richter, Sonja; Thorarinsdottir, R.I.; Hilbert, Lisbeth Rischel

    2005-01-01

    The corrosion control in district heating systems is today performed primarily with control of the water quality. The corrosion rate is kept low by assuring low dissolved oxygen concentration, high pH and low conductivity. Corrosion failures can occur, e.g. as a result of unknown oxygen ingress, ......, precipitation of deposits or crevices. The authors describe methods used for on-line monitoring of corrosion, cover the complications and the main results of a Nordic project.......The corrosion control in district heating systems is today performed primarily with control of the water quality. The corrosion rate is kept low by assuring low dissolved oxygen concentration, high pH and low conductivity. Corrosion failures can occur, e.g. as a result of unknown oxygen ingress...

  16. NOASYS, a system for on-line noise analysis

    International Nuclear Information System (INIS)

    Massier, H.

    1978-07-01

    This report describes NOASYS, a versatile NOise Analysis SYStem for digital on-line signal processing. The system based on a minicomputer, was originally developed for the analysis of noise signals from nuclear reactors. NOASYS computes various statistical functions e.g. cross- und auto-correlation functions and power spectral densities resp., which may be used for reactor diagnosis and malfunction detection. The system processes up to 16 analog signals with a maximum sampling frequency of 100 kcps (1 channel). The processing of the sampled data is done by a number of software tasks, which may be called from a teletype or linked together for specific measuring programs. The standard configuration contains the often used processing routines e.g. Fast Fourier Transform, complex multiplication, summation etc. In addition NOASYS may be extended by users own tasks (in Assembler or Fortran) to fit for specific applications. (orig.) 891 HP [de

  17. On-line efficiency optimization of a synchronous reluctance motor

    Energy Technology Data Exchange (ETDEWEB)

    Lubin, Thierry; Razik, Hubert; Rezzoug, Abderrezak [Groupe de Recherche en Electrotechnique et Electronique de Nancy, GREEN, CNRS-UMR 7037, Universite Henri Poincare, BP 239, 54506 Vandoeuvre-les-Nancy Cedex (France)

    2007-04-15

    This paper deals with an on-line optimum-efficiency control of a synchronous reluctance motor drive. The input power minimization control is implemented with a search controller using Fibonacci search algorithm. It searches the optimal reference value of the d-axis stator current for which the input power is minimum. The input power is calculated from the measured dc-bus current and dc-bus voltage of the inverter. A rotor-oriented vector control of the synchronous reluctance machine with the optimization efficiency controller is achieved with a DSP board (TMS302C31). Experimental results are presented to validate the proposed control methods. It is shown that stability problems can appear during the search process. (author)

  18. Development of on-line monitoring system using smart material

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jin Kyung; Lee, Sang Pill; Park, Yi Hyun [Dongeui Univ., Busan (Korea, Republic of); Park, Young Chul [Donga Univ., Busan (Korea, Republic of)

    2003-07-01

    A hot press method was used to create the optimal fabrication condition for a Shape Memory Alloy(SMA) composite. The bonding strength between the matrix and the reinforcement within the SMA composite by the hot press method was more increased by cold rolling. In this study, the objective was to develop an on-line monitoring system in order to prevent the crack initiation and propagation by shape memory effect in SMA composite. Shape memory effect was used to prevent the SMA composite from crack propagation. For this system an optimal AE parameter should be determined according to the degree of damage and crack initiation. When the SMA composite was heated by the plate heater attached at the composite, the propagating cracks could be controlled by the compressive force of SMA.

  19. Development of on-line monitoring system using smart material

    International Nuclear Information System (INIS)

    Lee, Jin Kyung; Lee, Sang Pill; Park, Yi Hyun; Park, Young Chul

    2003-01-01

    A hot press method was used to create the optimal fabrication condition for a Shape Memory Alloy(SMA) composite. The bonding strength between the matrix and the reinforcement within the SMA composite by the hot press method was more increased by cold rolling. In this study, the objective was to develop an on-line monitoring system in order to prevent the crack initiation and propagation by shape memory effect in SMA composite. Shape memory effect was used to prevent the SMA composite from crack propagation. For this system an optimal AE parameter should be determined according to the degree of damage and crack initiation. When the SMA composite was heated by the plate heater attached at the composite, the propagating cracks could be controlled by the compressive force of SMA

  20. Issues for Bringing Electron Beam Irradiators On-Line

    Energy Technology Data Exchange (ETDEWEB)

    Kaye, R.J.; Turman, B.N.

    1999-04-20

    Irradiation of red meat and poultry has been approved by the U.S. FDA, and the U.S. Department of Agriculture's rule for processing red meat is out for comment. Looking beyond the current issues of packaging materials, labeling, and consumer acceptance, this paper reviews the next step of implementation and how to remove, or at least reduce, the barriers to utilization. Polls of the user community identified their requirements for electron beam or x-ray processing of meat or poultry and their concerns about implementation for on-line processing. These needs and issues are compared to the capabilities of the accelerator industry. The critical issues of beam utilization and dose uniformity, factors affecting floor space requirements, and treatment costs are examined.

  1. Escapist Motives for Playing On-Line Games

    DEFF Research Database (Denmark)

    Sudzina, Frantisek; Razmerita, Liana

    2012-01-01

    Social games have become popular along with the tremendous growth of social networking sites, esp. Facebook. There is a gap in literature on what motivates people to play Facebook games. This paper studies social games usage behavior of students. We focus on escapist reasons, based on Warmelink...... of escapist motives for playing Facebook and other on-line games, we investigate how they are linked to demographic data such as: age, gender, place of origin, along with other social interactions patterns and social network usage behavior, current gaming status and an estimate of gaming time. According...... to our study, only 10% of respondents, who have started to play Facebook games, continued to play them. The most important motives for playing games is mundane breaking, the second reason is pleasure seeking, the third is stress relieving, and the least important is imagination conjuring....

  2. Configuration Database for BaBar On-line

    International Nuclear Information System (INIS)

    Salnikov, Andrei

    2003-01-01

    The configuration database is one of the vital systems in the BaBar on-line system. It provides services for the different parts of the data acquisition system and control system, which require run-time parameters. The original design and implementation of the configuration database played a significant role in the successful BaBar operations since the beginning of experiment. Recent additions to the design of the configuration database provide better means for the management of data and add new tools to simplify main configuration tasks. We describe the design of the configuration database, its implementation with the Objectivity/DB object-oriented database, and our experience collected during the years of operation

  3. 3rd Computer Science On-line Conference

    CERN Document Server

    Senkerik, Roman; Oplatkova, Zuzana; Silhavy, Petr; Prokopova, Zdenka

    2014-01-01

    This book is based on the research papers presented in the 3rd Computer Science On-line Conference 2014 (CSOC 2014).   The conference is intended to provide an international forum for discussions on the latest high-quality research results in all areas related to Computer Science. The topics addressed are the theoretical aspects and applications of Artificial Intelligences, Computer Science, Informatics and Software Engineering.   The authors provide new approaches and methods to real-world problems, and in particular, exploratory research that describes novel approaches in their field. Particular emphasis is laid on modern trends in selected fields of interest. New algorithms or methods in a variety of fields are also presented.   This book is divided into three sections and covers topics including Artificial Intelligence, Computer Science and Software Engineering. Each section consists of new theoretical contributions and applications which can be used for the further development of knowledge of everybod...

  4. On-line defected fuel monitoring using GFP data

    International Nuclear Information System (INIS)

    Livingstone, S.; Lewis, B.J.

    2008-01-01

    This paper describes the initial development of an on-line defected fuel diagnostic tool. The tool is based on coolant activity, and uses a quantitative and qualitative approach from existing mechanistic fission product release models, and also empirical rules based on commercial and experimental experience. The model departs from the usual methodology of analyzing steady-state fission product coolant activities, and instead uses steady-state fission product release rates calculated from the transient coolant activity data. An example of real-time defected fuel analysis work is presented using a prototype of this tool with station data. The model is in an early developmental stage, and this paper demonstrates the promising potential of this technique. (author)

  5. An on-line advanced plant simulator (OLAPS)

    International Nuclear Information System (INIS)

    Samuels, J.W.

    1989-01-01

    A PC based on-line advanced plant simulator (OLAPS) for high quality simulations of Portland General Electric's Trojan Nuclear Facility is presented. OLAPS is designed to simulate the thermal-hydraulics of the primary system including core, steam generators, pumps, piping and pressurizer. The simulations are based on a five equation model that has two mass equations, two energy equations, two energy equations, and one momentum equation with a drift flux model to provide closure. A regionwise point reactor kinetics model is used to model the neutron kinetics in the core. The conservation equations, constitutive models and the numerical methods used to solve them are described. OLAPS results are compared with data from chapter 15 of the Trojan Nuclear Facility's final safety analysis report

  6. The Monitor System for the LHCb on-line farm

    CERN Document Server

    Bonifazi, F; Carbone, A; Galli, D; Gregori, D; Marconi, U; Peco, G; Vagnoni, V

    2005-01-01

    The aim of the LHCb on-line farm Monitor System is to keep under control all the working indicators which are relevant for the farm operation, and to set the appropriate alarms whenever an error or a critical condition comes up. Since the most stressing tasks of the farm are the data transfer and processing, relevant indicators includes the CPU and the memory load of the system, the network interface and the TCP/IP stack parameters, the rates of the interrupts raised by the network interface card and the detailed status of the running processes. The monitoring of computers’ physical conditions (temperatures, fan speeds and motherboard voltages) are the subject of a separate technical note, since they are accessed in a different way, by using the IPMI protocol.

  7. PHEBUS on-line aerosol monitor development test program

    International Nuclear Information System (INIS)

    Sprenger, M.H.; Pentecost, C.G.

    1992-03-01

    EG ampersand G Idaho, Inc. developed an on-line aerosol monitor (OLAM) for the French PHEBUS Fission Product Project. Part of the development was to manufacture and test an OLAM prototype. This report presents the results of the testing which determined the mechanical integrity of the monitor at operating temperature and pressure and performed a preliminary test of the optical system. A series of twenty different tests was conducted during the prototype testing sequence. Since no leaks were detected, the OLAM demonstrated that it could provide a pressure boundary at required test conditions. The optical and electrical system also proved its integrity by exceeding the design requirement of less than 105 optical signal drift during an actual two-hour test sequence

  8. On line isotopic separator test benches at GANIL

    International Nuclear Information System (INIS)

    Anne, R.; Bru, B.; Joubert, A.; Leroy, R.; Obert, J.; Putaux, J.C.; Liang, C.F.; Paris, P.; Orr, N.; Steckmeyer, J.C.

    1993-01-01

    A first version of isotopic separator on line test bench has been built in order to test the feasibility of the production of radioactive species from 96 MeV/u of 20 Ne impinging a thick target of MgO. This test bench was equipped with a very compact ECR ion source (Nanogan) entirely made from permanent magnets and operating at 10 Ghz. 18 Ne 2,4+ ; 19N e 1,2,3,4+ and 23,24 Ne 1+ has been produced and ionized. A new more performing separator (SIRa) allowing the use of different types of ion sources will be completed by the end of 1993. (author) 4 refs., 4 figs., 1 tab

  9. Semi-continuous on-line uranium ore analyzer

    International Nuclear Information System (INIS)

    Campbell, P.; Gurdy, E.M.; Hatchowski, L.

    1984-01-01

    The efficient process control of a uranium mill and its associated mining operation requires a nearly continuous knowledge of the uranium concentration in the ore. Generally, the approach is to use laboratory assays of grab samples from the mill feed belt. In some cases, elaborate and expensive systems have been used to ensure random sampling, but even with these systems, mass-balance discrepancies still exist. There is a requirement for an on-line instrument that can give a prompt, accurate analysis of a large portion of the feed stock. The authors have recently evaluated a laboratory system that achieves these goals using neutron activation and delayed neutron counting. The development of the on-line uranium ore analyzer is a consequence of previous work done at the Whiteshell Nuclear Research Establishment (WNRE) (Campbell et al., 1978 and 1981), and is based on the emission of delayed neutrons after the neutron irradiation of fissionable materials. The mechanism of delayed neutron emission has been described (Keepin, 1965), but briefly is as follows. The fission fragments resulting from irradiation are in an excited state. Certain of these delayed fission products, precursors, decay to a more stable state by the emission of a delayed neutron. The delayed neutrons can be divided into six groups with effective half-lives ranging from 0.2-55 sec. It is important to note that more than 50% of the delayed neutrons are emitted within the first 6 sec after irradiation; this has an influence on the design of the analysis instrument

  10. PHENIX On-Line Distributed Computing System Architecture

    International Nuclear Information System (INIS)

    Desmond, Edmond; Haggerty, John; Kehayias, Hyon Joo; Purschke, Martin L.; Witzig, Chris; Kozlowski, Thomas

    1997-01-01

    PHENIX is one of the two large experiments at the Relativistic Heavy Ion Collider (RHIC) currently under construction at Brookhaven National Laboratory. The detector consists of 11 sub-detectors, that are further subdivided into 29 units (''granules'') that can be operated independently, which includes simultaneous data taking with independent data streams and independent triggers. The detector has 250,000 channels and is read out by front end modules, where the data is buffered in a pipeline while awaiting the level trigger decision. Zero suppression and calibration is done after the level accept in custom built data collection modules (DCMs) with DSPs before the data is sent to an event builder (design throughput of 2 Gb/sec) and higher level triggers. The On-line Computing Systems Group (ONCS) has two responsibilities. Firstly it is responsible for receiving the data from the event builder, routing it through a network of workstations to consumer processes and archiving it at a data rate of 20 MB/sec. Secondly it is also responsible for the overall configuration, control and operation of the detector and data acquisition chain, which comprises the software integration for several thousand custom built hardware modules. The software must furthermore support the independent operation of the above mentioned granules, which includes the coordination of processes that run in 60-100 VME processors and workstations. ONOS has adapted the Shlaer- Mellor Object Oriented Methodology for the design of the top layer software. CORBA is used as communication layer between the distributed objects, which are implemented as asynchronous finite state machines. We will give an overview of the PHENIX online system with the main focus on the system architecture, software components and integration tasks of the On-line Computing group ONCS and report on the status of the current prototypes

  11. Progress and performance of on-line analyzers of coal

    International Nuclear Information System (INIS)

    Spencer, C.M.; Brown, D.R.; Gozani, T.; Bozorgmanesh, H.; Bernatowicz, H.; Tassicker, O.J.; Karlson, F.

    1982-01-01

    This paper describes the past year's progress in the laboratory testing of the most comprehensive Nucoalyzer, the CONAC, and the performance of a Nucoalyzer-Sulfurmeter in special field tests. Previous papers and presentations provide more detailed background information. The near real-time analysis provided by a Nucoalyzer can be used in a variety of strategies to optimize efficiency of coal use. Nucoalyzers can be used to monitor coal deliveries and achieve uniformity in coal storage and recovery. In a coal cleaning plant, on-line analysis with a Nucoalyzer can lead to optimum Btu recovery while meeting specifications for the washed coal. A Nucoalyzer can monitor the blending of different coals to maintain a key cosntituent such as sulfur below a specified level, or can predict sulfur dioxide emissions, allowing feed-forward control to gas scrubbers and precipitators. Variability in coal feed to the boiler can lead to gross changes in thermodynamic efficiency in combustion. In addition, fouling and slagging incidents due to poor coal quality cause costly boiler shutdowns and maintenance. Nucoalyzer monitoring of key constituents and Btu in the coal feed allows operators to adjust boiler parameters for increased efficiency. To summarize, the primary advantages of Nucoalyzers relate to their ability to quickly identify changes in coal composition so that adjustments can be made in a timely manner to accommodate these changes in the process being monitored. Nucoalyzers are the only instruments available that can monitor the coal (for ash, Btu, sulfur, etc.) on-line and provide real-time continuous results. One Nucoalyzer is already working in the field, and by the time of the next Symposium we will have had performance reports on two more

  12. On-line chemical sensors for applications in fast reactors

    International Nuclear Information System (INIS)

    Jayaraman, V.

    2015-01-01

    Hydrogen sensors are essential components of fast reactor sodium circuits. These sensors are needed in fast reactors for the immediate detection of any steam leak into sodium during reactor operation which can lead to failure of steam generator. Depending on the operating power of the reactor, sodium-water reaction results in either an increase in dissolved hydrogen level in sodium or an increase in hydrogen content of argon cover gas used above sodium coolant. Hence, on-line monitoring of hydrogen continuously in sodium and cover circuits helps in detection of any steam leak. In the event of accidental leak of high temperature sodium, it reacts with oxygen and moisture in air leading to sodium fires. These fires produce sodium aerosol containing oxides of sodium (Na 2 O and Na 2 O 2 ) and NaOH. For early detection of sodium fires, sensor systems based on sodium ionization detector, pH measurement and modulation of conductivity of graphite films are known in the literature. This presentation deals with the development of on-line sensors for these two applications. A diffusion based sensor using a thin walled nickel coil at 773 K and a sensitive thermal conductivity detector (TCD) has been developed for monitoring hydrogen levels in argon cover gas. This sensor has a lower detection limit of 30 ppm of hydrogen in argon. To extend the detection limit of the sensor, a surface conductivity based sensor has been developed which makes use of a thin film of semi-conducting tin oxide. Integration of this sensor with the TCD, can extend the lower detection limit to 2 ppm of hydrogen in cover gas. Electrochemical sensor based on sodium-beta-alumina has been designed, fabricated and its performance in laboratory and industrial environment was evaluated. This paper presents the logical development of these sensors highlighting their merits and limitations

  13. Review of Worcestershire On-line Fabric Type Series website

    Directory of Open Access Journals (Sweden)

    Beverley Nenk

    2003-06-01

    Full Text Available The study of archaeological ceramics is advanced through the creation and development of regional and national pottery type-series, which contain samples of each type of pottery identified from a particular area or region. Pottery researchers working in any period, from prehistoric to post-medieval, require access to such type-series, and to their associated data, in order to be able to advance the identification of all types of pottery, not only those types produced in the local area, but those produced in surrounding regions, as well as those imported from abroad. The publication of such type-series, as well as their accessibility to researchers, is essential if the information they contain is to be disseminated. The development of the Worcestershire On-Line Fabric Type Series is the first stage in a remarkable project designed to make the complete fabric and form type series for Worcestershire ceramics accessible on the internet. As part of the Historic Environment Record for Worcestershire, formerly the Sites and Monuments Record, it is designed to improve access to finds and environmental data, with the aim of encouraging and facilitating research. Funded by Worcestershire County Council as part of its commitment to e-government, it is being developed by Worcestershire County Council Archaeology Service with OxfordArchDigital. It is one of a proposed series of on-line specialist resources (to include, for example, clay pipes, environmental archaeology, flint tools, historic buildings, which are also designed to stand alone as research tools. The ceramics website is the first part of Pottery in Perspective, a web-based project to provide information on the pottery used and made in Worcestershire from prehistory to c. 1900AD.

  14. Complex networks: Dynamics and security

    Indian Academy of Sciences (India)

    a theory and numerical support to place the cascading phenomenon in the context .... for a given degree distribution, and self- and repeated links are forbidden. ..... Now we present numerical verification of our main result concerning the effect ...

  15. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  16. On line surveillance of large systems: applications to nuclear and chemical plant

    International Nuclear Information System (INIS)

    Zwingelstein, G.

    1978-01-01

    An on line surveillance method for large scale and distributed parameter systems is achieved by comparing in real time the internal physical parameter values to the reference values. It is shown that the following steps are necessary: modeling, model validation using dynamic testing and on line estimation of parameters. For large scale systems where only few outputs are measurable, an estimation algorithm was developed, selecting the measurable output giving the minimum variance of the physical parameters. This estimation scheme uses a quasilinearization technique associated to the sensitivity equation and the recursive least squares techniques. For large scale systems of order greater than 100, two versions of the estimation scheme are proposed to decrease the computation time. An application to a nuclear reactor core (state variable model of order 29) is proposed and used real data. For distributed systems the estimation scheme was developed with either measurements at fixed time or at fixed space. The estimation algorithm selects the set of measurements that gives the minimum variance of the estimates. An application to a liquid-liquid extraction column, modelized by a set of four coupled partial differential equations, demonstrates the efficiency of the method

  17. An adaptive observer for on-line tool wear estimation in turning, Part I: Theory

    Science.gov (United States)

    Danai, Kourosh; Ulsoy, A. Galip

    1987-04-01

    On-line sensing of tool wear has been a long-standing goal of the manufacturing engineering community. In the absence of any reliable on-line tool wear sensors, a new model-based approach for tool wear estimation has been proposed. This approach is an adaptive observer, based on force measurement, which uses both parameter and state estimation techniques. The design of the adaptive observer is based upon a dynamic state model of tool wear in turning. This paper (Part I) presents the model, and explains its use as the basis for the adaptive observer design. This model uses flank wear and crater wear as state variables, feed as the input, and the cutting force as the output. The suitability of the model as the basis for adaptive observation is also verified. The implementation of the adaptive observer requires the design of a state observer and a parameter estimator. To obtain the model parameters for tuning the adaptive observer procedures for linearisation of the non-linear model are specified. The implementation of the adaptive observer in turning and experimental results are presented in a companion paper (Part II).

  18. Structural damage diagnosis based on on-line recursive stochastic subspace identification

    International Nuclear Information System (INIS)

    Loh, Chin-Hsiung; Weng, Jian-Huang; Liu, Yi-Cheng; Lin, Pei-Yang; Huang, Shieh-Kung

    2011-01-01

    This paper presents a recursive stochastic subspace identification (RSSI) technique for on-line and almost real-time structural damage diagnosis using output-only measurements. Through RSSI the time-varying natural frequencies of a system can be identified. To reduce the computation time in conducting LQ decomposition in RSSI, the Givens rotation as well as the matrix operation appending a new data set are derived. The relationship between the size of the Hankel matrix and the data length in each shifting moving window is examined so as to extract the time-varying features of the system without loss of generality and to establish on-line and almost real-time system identification. The result from the RSSI technique can also be applied to structural damage diagnosis. Off-line data-driven stochastic subspace identification was used first to establish the system matrix from the measurements of an undamaged (reference) case. Then the RSSI technique incorporating a Kalman estimator is used to extract the dynamic characteristics of the system through continuous monitoring data. The predicted residual error is defined as a damage feature and through the outlier statistics provides an indicator of damage. Verification of the proposed identification algorithm by using the bridge scouring test data and white noise response data of a reinforced concrete frame structure is conducted

  19. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  20. Simulation and experimental research on line throwing rocket with flight

    Directory of Open Access Journals (Sweden)

    Wen-bin Gu

    2014-06-01

    Full Text Available The finite segment method is used to model the line throwing rocket system. A dynamic model of line throwing rocket with flight motion based on Kane's method is presented by the kinematics description of the system and the consideration of the forces acting on the system. The experiment designed according to the parameters of the dynamic model is made. The simulation and experiment results, such as range, velocity and flight time, are compared and analyzed. The simulation results are basically agreed with the test data, which shows that the flight motion of the line throwing rocket can be predicted by the dynamic model. A theoretical model and guide for the further research on the disturbance of rope and the guidance, flight control of line throwing rocket are provided by the dynamic modeling.

  1. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  2. On the security flaws in ID-based password authentication schemes for telecare medical information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-01-01

    Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.

  3. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  4. Simulation and experimental research on line throwing rocket with flight

    OpenAIRE

    Wen-bin Gu; Ming Lu; Jian-qing Liu; Qin-xing Dong; Zhen-xiong Wang; Jiang-hai Chen

    2014-01-01

    The finite segment method is used to model the line throwing rocket system. A dynamic model of line throwing rocket with flight motion based on Kane's method is presented by the kinematics description of the system and the consideration of the forces acting on the system. The experiment designed according to the parameters of the dynamic model is made. The simulation and experiment results, such as range, velocity and flight time, are compared and analyzed. The simulation results are basicall...

  5. Determination of anions with an on-line capillary electrophoresis method; Anionien on-line maeaeritys kapillaarielektroforeesilla - MPKT 10

    Energy Technology Data Exchange (ETDEWEB)

    Siren, H; Saerme, T; Kotiaho, T; Hiissa, T; Savolahti, P; Komppa, V [VTT Chemical Technology, Espoo (Finland)

    1999-12-31

    The aim of the study was to set-up an on-line capillary electrophoresis method for determination of anions in process waters of pulp and paper industry with exporting the results to the process control system of the mill. The quantification is important, since it will give information about the possible causes of precipitation. In recent years, the capillary electrophoresis (CE) due to its high separation efficiency has been shown as a method to take into consideration when analyzing chemical species ranging from small inorganic anions to different macromolecules. Many compounds are not easily detected in their native state, why analysis methods must be developed to improve their detection. Especially, small inorganic and organic anions which do not have chromophores are not sensitive enough for direct-UV detection. In such analyses the anions are mostly detected with indirect-UV technique. Capillary electrophoresis instruments are used to analyze samples in off-line, which seldom represent the situation in process. Therefore, on-line instrument technology with autoanalyzing settings will be needed in quality control. The development of a fully automatic capillary electrophoresis system is underway in co-operation with KCL (The Finnish Pulp and Paper Research Institute). In our research, we have first concentrated on the determination of sulphate in waters of paper industry. The method used for detection of sulphate is based on indirect-UV detection with CE, where the background electrolyte (BGE) is an absorbing mixture of secondary amines. The whole procedure for quantification of sulphate is performed within 15 minutes, after which a new sample is analyzed automatically. The only sample pretreatment is filtration, which is necessary before analysis. The concentrations of sulphate in process waters tested were between 300 and 800 ppm. Our tests show that a simultaneous determination of chloride, sulphate, nitrate, nitrite, sulphite, carbonate and oxalate is also

  6. Determination of anions with an on-line capillary electrophoresis method; Anionien on-line maeaeritys kapillaarielektroforeesilla - MPKT 10

    Energy Technology Data Exchange (ETDEWEB)

    Siren, H.; Saerme, T.; Kotiaho, T.; Hiissa, T.; Savolahti, P.; Komppa, V. [VTT Chemical Technology, Espoo (Finland)

    1998-12-31

    The aim of the study was to set-up an on-line capillary electrophoresis method for determination of anions in process waters of pulp and paper industry with exporting the results to the process control system of the mill. The quantification is important, since it will give information about the possible causes of precipitation. In recent years, the capillary electrophoresis (CE) due to its high separation efficiency has been shown as a method to take into consideration when analyzing chemical species ranging from small inorganic anions to different macromolecules. Many compounds are not easily detected in their native state, why analysis methods must be developed to improve their detection. Especially, small inorganic and organic anions which do not have chromophores are not sensitive enough for direct-UV detection. In such analyses the anions are mostly detected with indirect-UV technique. Capillary electrophoresis instruments are used to analyze samples in off-line, which seldom represent the situation in process. Therefore, on-line instrument technology with autoanalyzing settings will be needed in quality control. The development of a fully automatic capillary electrophoresis system is underway in co-operation with KCL (The Finnish Pulp and Paper Research Institute). In our research, we have first concentrated on the determination of sulphate in waters of paper industry. The method used for detection of sulphate is based on indirect-UV detection with CE, where the background electrolyte (BGE) is an absorbing mixture of secondary amines. The whole procedure for quantification of sulphate is performed within 15 minutes, after which a new sample is analyzed automatically. The only sample pretreatment is filtration, which is necessary before analysis. The concentrations of sulphate in process waters tested were between 300 and 800 ppm. Our tests show that a simultaneous determination of chloride, sulphate, nitrate, nitrite, sulphite, carbonate and oxalate is also

  7. The Decoration Operator: A Foundation for On-Line Dimensional Data Integration

    DEFF Research Database (Denmark)

    Pedersen, Dennis; Pedersen, Torben Bach; Riis, Karsten

    2004-01-01

    The changing data requirements of today's dynamic business environments are not handled well by current On-Line Analytical Processing (OLAP) systems. Physically integrating unexpected, external data into OLAP cubes, i.e., the data warehousing approach, is a long and time-consuming process, making...... logical, on-the-fly, integration the better choice in many situations. However, OLAP systems have no operations for integrating existing multidimensional cube data with external data. In this paper we present a novel multidimensional algebra operator, the decoration operator, which allows external data...... to be integrated in OLAP cubes as new dimensions, i.e., the cube is ``decorated'' with new dimensions which can subsequently be used just as the regular dimensions. We formally specify the semantics of the decoration operator, ensuring that semantic problems do not occur in the data integration process. We also...

  8. On-Line Optimizing Control of a Simulated Continuous Yeast Fermentation

    DEFF Research Database (Denmark)

    Andersen, Maria Y.; Asferg, L.; Brabrand, H.

    1989-01-01

    On-line optimizing control of a simulated fermentation is investigated using a non-segregated dynamic model of aerobic glucose limited growth of saccharomyces cerevisiae. The optimization procedure is carried out with an underlying adaptive regulator to stabilize the culture. This stabilization...... is especially important during the setpoint changes specified by the optimizing routine. A linear ARMAX model structure is used for the fermentation process with dilution rate as input and biomass as output variable. The parameters of the linear model structure are estimated using a pseudo linear regression...... method with bandpass filtering of in- and output variables in order to ensure low frequency validity of the estimated model. An LQ-regulator is used with iterative solution of the Riccati equation. Simulation results illustrate the tuning of the underlying regulator, and the effect of perturbing...

  9. On-line prediction of BWR transients in support of plant operation and safety analyses

    International Nuclear Information System (INIS)

    Wulff, W.; Cheng, H.S.; Lekach, S.V.; Mallen, A.N.

    1983-01-01

    A combination of advanced modeling techniques and modern, special-purpose peripheral minicomputer technology is presented which affords realistic predictions of plant transient and severe off-normal events in LWR power plants through on-line simulations at a speed ten times greater than actual process speeds. Results are shown for a BWR plant simulation. The mathematical models account for nonequilibrium, nonhomogeneous two-phase flow effects in the coolant, for acoustical effects in the steam line and for the dynamics of the recirculation loop and feed-water train. Point kinetics incorporate reactivity feedback for void fraction, for fuel temperature, and for coolant temperature. Control systems and trip logic are simulated for the nuclear steam supply system

  10. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  11. 20 CFR 423.1 - Suits against the Social Security Administration and its employees in their official capacities.

    Science.gov (United States)

    2010-04-01

    ... Federal Register, and are available on-line at the Social Security Administration's Internet site, http... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Suits against the Social Security... SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its...

  12. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  13. The Underbelly of Global Security

    DEFF Research Database (Denmark)

    Mynster Christensen, Maya

    2015-01-01

    -militias, facilitated by a British security company and the Sierra Leone government. In doing so, the article contributes to the ongoing scholarly debate on the privatization of security by offering a “local” ethnographically informed perspective on the micro-dynamics of “global” security. It is argued that the supply......In the aftermath of the Sierra Leone civil war, demobilized militia soldiers have become an attractive resource to private security companies. Based on extensive ethnographic fieldwork, this article traces the outsourcing of security at American military bases in Iraq to Sierra Leonean ex...... of global security depends on a form of local immobility: on a population that is “stuck”, yet constantly on the move to seize opportunities for survival and recognition. Structured by a chronological account of the recruitment, deployment, and deportation of Sierra Leonean ex-militias, the article...

  14. Optimization of airport security process

    Science.gov (United States)

    Wei, Jianan

    2017-05-01

    In order to facilitate passenger travel, on the basis of ensuring public safety, the airport security process and scheduling to optimize. The stochastic Petri net is used to simulate the single channel security process, draw the reachable graph, construct the homogeneous Markov chain to realize the performance analysis of the security process network, and find the bottleneck to limit the passenger throughput. Curve changes in the flow of passengers to open a security channel for the initial state. When the passenger arrives at a rate that exceeds the processing capacity of the security channel, it is queued. The passenger reaches the acceptable threshold of the queuing time as the time to open or close the next channel, simulate the number of dynamic security channel scheduling to reduce the passenger queuing time.

  15. On-Line Generation and Arming of System Protection Schemes

    DEFF Research Database (Denmark)

    Pedersen, Andreas Søndergaard; Blanke, Mogens; Møller, Jakob Glarbo

    2016-01-01

    This paper presents a new method to automatically generate system protection schemes in real-time, where contingencies are filtered using a method providing N– 1 system snapshots. With future power systems consisting largely of renewable distributed generation with time-varying production, highly....... The method is based on a recently proposed method of calculating post-contingency Thevenin equivalents, which are used to assess the security of the post-contingency condition. The contingencies that violate the emergency limits are contained by pre-determining event-based remedial actions. The instability...

  16. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  17. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  18. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  19. Fuel supply security

    International Nuclear Information System (INIS)

    Wakabayashi, Hiroaki

    1987-01-01

    Stable fuel supply is a prerequisite for any nuclear power program including ISER-PIUS. It encompasses procurement of uranium ore, enriched uranium and fuel elements. Uranium is different from oil in that it can be stockpiled for more than a decade besides the fact that the core residence time is as long as six years, for example in the case of ISER-PIUS. These basic fuel characteristics are favoring nuclear fuel over others in terms of supply security. The central concern will be a gradual increase in prices of uranium and enrichment. Under the present glut situation with the worldwide prevalence of LWRs, fuel supply security seems ensured for the time being till the middle of 21st century. It is estimated that by the turn of the century, the free world will have roughly 450 GWe capacity of nuclear power. If 10 % is supplied for ISER-PIUS, more than 200 modules of 200 MWe ISER-PIUS may be deployed all over the world probably starting around 2000. As part of the fuel supply security consideration, heavy water reactor (HWR) may seem interesting to such a country as Indonesia where there is uranium resources but no enrichment capability. But it needs heavy water instead and the operation is not so easy as of LWR, because of the positive void coefficient as was seen at the Chernobyl-4. Safeguarding of the fuel is also difficult, because it lends itself to on line refueling. The current and future situation of the fuel supply security for LWR seem well founded and established long into the future. (Nogami, K.)

  20. On-line milk spectrometry: analysis of bovine milk composition

    Science.gov (United States)

    Spitzer, Kyle; Kuennemeyer, Rainer; Woolford, Murray; Claycomb, Rod

    2005-04-01

    We present partial least squares (PLS) regressions to predict the composition of raw, unhomogenised milk using visible to near infrared spectroscopy. A total of 370 milk samples from individual quarters were collected and analysed on-line by two low cost spectrometers in the wavelength ranges 380-1100 nm and 900-1700 nm. Samples were collected from 22 Friesian, 17 Jersey, 2 Ayrshire and 3 Friesian-Jersey crossbred cows over a period of 7 consecutive days. Transmission spectra were recorded in an inline flowcell through a 0.5 mm thick milk sample. PLS models, where wavelength selection was performed using iterative PLS, were developed for fat, protein, lactose, and somatic cell content. The root mean square error of prediction (and correlation coefficient) for the nir and visible spectrometers respectively were 0.70%(0.93) and 0.91%(0.91) for fat, 0.65%(0.5) and 0.47%(0.79) for protein, 0.36%(0.49) and 0.45%(0.43) for lactose, and 0.50(0.54) and 0.48(0.51) for log10 somatic cells.

  1. On-line electrochemical monitoring of microbially influenced corrosion

    International Nuclear Information System (INIS)

    Dowling, N.J.E.; Stansbury, E.E.; White, D.C.; Borenstein, S.W.; Danko, J.C.

    1989-01-01

    Newly emerging electrochemical measurement techniques can provide on-line, non-destructive monitoring of the average corrosion rate and indications of localized pitting corrosion together with insight into fundamental electrochemical mechanisms responsible for the corrosion process. This information is relevant to evaluating, monitoring, understanding and controlling microbially influenced corrosion (MIC). MIC of coupons exposed in sidestream devices on site or in laboratory-based experiments, where the corrosion response is accelerated by exposure to active consortia of microbes recovered from specific sites, can be utilized to evaluate mitigation strategies. The average corrosion rates can be determined by small amplitude cyclic voltametry (SACV), and AC impedance spectroscopy (EIS). EIS can also give insight into the mechanisms of the MIC and indications of localized corrosion. Pitting corrosion can be detected non-destructively with open circuit potential monitoring (OCP). OCP also responds to bacterial biofilm activities such as oxygen depletion and other electrochemical activities. Utilizing these methods, accelerated tests can be designed to direct the selection of materials, surface treatments of materials, and welding filler materials, as well as the optimization of chemical and mechanical countermeasures with the microbial consortia recovered and characterized from the specific sites of interest

  2. On-line monitoring of low-level plutonium concentrations

    International Nuclear Information System (INIS)

    Hofstetter, K.J.; Huff, G.A.; Rebagay, T.V.

    1979-10-01

    An on-line monitor has been developed to assay plutonium in nitric acid solutions. The performance of the monitor has been assessed by a laboratory experimentation program using solutions with plutonium concentrations from 0.1 to 10 g/l. These conditions are typical of the plutonium solutions in an input stream to a plutonium-purification cycle in a reprocessing plant following uranium/plutonium partitioning. The monitoring system can be fully automated and shows great promise for detecting and quantifying plutonium in situ, thus minimizing the reliance on traditional sampling and laboratory-analysis techniques. The total concentration and isotopic abundance of plutonium are determined by measuring the absolute intensities of the low-energy gamma rays characteristics of 238 Pu, 239 Pu, and 240 Pu nuclides by direct gamma-ray spectroscopy and computer analysis of the spectral data. The addition of a monitoring system of this type to the input stream of a plutonium-purification cycle along with other suitable monitors on the waste streams and on the product stream provides the basis for a near real-time materials control and inventory system. Results of the laboratory-evaluation program employing plutonium in solutions with isotopic compositions typical of those involved in processing light water reactor fuels are presented. The detailed design of a monitoring cell and detection system is given. The precision and accuracy of the results relative to those measured by mass spectrometry and controlled potential coulometry are also summarized

  3. Virtual laboratories: Collaborative environments and facilities-on-line

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, C.E. Jr. [Oak Ridge National Lab., TN (United States). I and C Div.; Cavallini, J.S.; Seweryniak, G.R.; Kitchens, T.A.; Hitchcock, D.A.; Scott, M.A.; Welch, L.C. [Dept. of Energy, Germantown, MD (United States). Mathematical Information, and Computational Sciences Div.; Aiken, R.J. [Dept. of Energy, Germantown, MD (United States). Mathematical Information, and Computational Sciences Div.]|[Lawrence Livermore National Lab., CA (United States); Stevens, R.L. [Argonne National Lab., IL (United States). Mathematics and Computer Sciences Div.

    1995-07-01

    The Department of Energy (DOE) has major research laboratories in a number of locations in the US, typically co-located with large research instruments or research facilities valued at tens of millions to even billions of dollars. Present budget exigencies facing the entire nation are felt very deeply at DOE, just as elsewhere. Advances over the last few years in networking and computing technologies make virtual collaborative environments and conduct of experiments over the internetwork structure a possibility. The authors believe that development of these collaborative environments and facilities-on-line could lead to a ``virtual laboratory`` with tremendous potential for decreasing the costs of research and increasing the productivity of their capital investment in research facilities. The majority of these cost savings would be due to increased productivity of their research efforts, better utilization of resources and facilities, and avoiding duplication of expensive facilities. A vision of how this might all fit together and a discussion of the infrastructure necessary to enable these developments is presented.

  4. The on-line low temperature nuclear orientation facility NICOLE

    International Nuclear Information System (INIS)

    Ohtsubo, T; Roccia, S; Gaulard, C; Stone, N J; Stone, J R; Köster, U; Nikolov, J; Veskovic, M; Simpson, G S

    2017-01-01

    We review major experiments and results obtained by the on-line low temperature nuclear orientation method at the NICOLE facility at ISOLDE, CERN since the year 2000 and highlight their general physical impact. This versatile facility, providing a large degree of controlled nuclear polarization, was used for a long-standing study of magnetic moments at shell closures in the region Z  = 28, N  = 28–50 but also for dedicated studies in the deformed region around A  ∼ 180. Another physics program was conducted to test symmetry in the weak sector and constrain weak coupling beyond V–A . Those two programs were supported by careful measurements of the involved solid state physics parameters to attain the full sensitivity of the technique and provide interesting interdisciplinary results. Future plans for this facility include the challenging idea of measuring the beta–gamma–neutron angular distributions from polarized beta delayed neutron emitters, further test of fundamental symmetries and obtaining nuclear structure data used in medical applications. The facility will also continue to contribute to both the nuclear structure and fundamental symmetry test programs. (paper)

  5. The Westinghouse BEACON on-line core monitoring system

    International Nuclear Information System (INIS)

    Buechel, Robert J.; Boyd, William A.; Casadei, Alberto L.

    1995-01-01

    BEACON (Best Estimate Analysis of Core Operations - Nuclear), a core monitoring and operational support package developed by Westinghouse, has been installed at many operating PWRs worldwide. The BEACON system is a real-time monitoring system which can be used in plants with both fixed and movable incore detector systems and utilizes an on-line nodal model combined with core instrumentation data to provide continuous core power distribution monitoring. In addition, accurate core-predictive capabilities utilizing a full core nodal model updated according to plant operating history can be made to provide operational support. Core history information is kept and displayed to help operators anticipate core behavior and take pro-active control actions. The BEACON system has been licensed by the U.S. Nuclear Regulatory Commission for direct, continuous monitoring of DNBR and peak linear heat rate. This allows BEACON to be integrated into the plant technical specifications to permit significant relaxation of operating limitations defined by conventional technical specifications. (author). 4 refs, 2 figs, 1 tab

  6. Development of an On-Line Uranium Enrichment Monitor

    International Nuclear Information System (INIS)

    Xuesheng, L.; Guorong, L.; Yonggang, Z.; Xueyuan, H. X.-Y.

    2015-01-01

    An on-line enrichment monitor was developed to measure the enrichment of UF6 flowing through the processing pipes in centrifuge uranium enrichment plant. A NaI(Tl) detector was used to measure the count rates of the 186 keV gamma ray emitted from 235U, and the total quantity of uranium was determined from thermodynamic characteristics of gaseous uranium hexafluoride. The results show that the maximum relative standard deviation is less than 1% when the measurement time is 120 s or more and the pressure is more than 2 kPa in the measurement chamber. There are two working models for the monitor. The monitor works normally in the continuous model, When the gas's pressure in the pipe fluctuates greatly, it can work in the intermittent model, and the measurement result is very well. The background of the monitor can be measured automatically periodically. It can control automatically electromagnetic valves open and close, so as to change the gas's quantity in the chamber. It is a kind of unattended and remote monitor, all of data can be transfer to central control room. It should be effective for nuclear materials accountability verifications and materials balance verification at uranium enrichment plant by using the monitor to monitor Uranium enrichment of gaseous uranium hexafluoride in the output end of cascade continuously. (author)

  7. On-line mass separator of superheavy atoms

    International Nuclear Information System (INIS)

    Oganesyan, Yu.Ts.

    2002-01-01

    The concept is presented of an on-line Mass Analyzer of SuperHeavy Atoms (MASHA) dedicated to the separation and determination of the mass and decay properties of new elements and isotopes produced in heavy-ion induced reactions. The new nuclides with half-lives T 1/2 ≥ 1 s are transported to an ECR-source working at a frequency of 2.45 GHz and are separated by mass with a mass resolution of M/ΔM ∼ 1500. In the focal plane of the magnetic analyzer a front strip detector surrounded by side detectors will be placed to determine the mass according to the signals from the detected α-particles or fission fragments with efficiency of about 90 %. In comparison to other existing in-flight recoil separators, the present setup will be characterized by higher efficiency and high selectivity relative to background reaction products. The setup MASHA may be used also in the investigation of nuclear reactions of different type induced by stable and radioactive beams

  8. On-Line Mass Separator of Superheavy Atoms

    CERN Document Server

    Oganessian, Yu T

    2002-01-01

    The concept is presented of an on-line Mass Analyzer of SuperHeavy Atoms (MASHA) dedicated to the separation and determination of the mass and decay properties of new elements and isotopes produced in heavy-ion induced reactions. The new nuclides with half-lives T_{1/2}\\ge 1 s are transported to an ECR-source working at a frequency of 2.45 GHz and are separated by mass with a mass resolution of M/\\Delta M\\sim 1500. In the focal plane of the magnetic analyzer a front strip detector surrounded by side detectors will be placed to determine the mass according to the signals from the detected alpha-particles or fission fragments with efficiency of about 90 %. In comparison to other existing in-flight recoil separators, the present setup will be characterized by higher efficiency and high selectivity relative to background reaction products. The setup MASHA may be used also in the investigation of nuclear reactions of different type induced by stable and radioactive beams.

  9. Performing maintenance activities on-line a risk perspective

    International Nuclear Information System (INIS)

    Darling, S.S.; Mairs, T.P.

    1993-01-01

    The US nuclear power industry is attempting to deal with the issue of optimizing the performance of maintenance activities with the advent of the maintenance rule. The impact of any maintenance activity on the safe operation of a nuclear power facility can be quantified on the basis of risk. Therefore, it is incumbent upon the industry to accommodate the regulator and present a maintenance optimization program in terms that explicitly address the potential risk inherent in its concept and implementation. The motivation for utilities to perform maintenance while the plant is operating (i.e., on-line) is readily perceived to offer the following advantages: 1. greater system availability; 2. higher plant capacity factor; 3. more evenly distributed workload for the maintenance department; and 4. overall safer plant operation. However, risks inherent in undertaking maintenance activities during power operation could amount to the realization that reapportionment of these tasks is not cost-beneficial. Therefore, it is important that any utility considering implementing such a paradigm in maintenance philosophy establish a rigorous process to select, perform, and monitor maintenance tasks performed while operating

  10. On-line nuclear analysis of coal (Nucoalyzer)

    International Nuclear Information System (INIS)

    Brown, D.R.; Gozani, T.; Bozorgmanesh, H.

    1980-01-01

    Control of quality in the coal process stream is increasingly important in both coal preparation facilities and coal fire power plants. Traditional wet chemistry methods of monitoring coal composition are incapable of providing anything approaching real-time analysis of coal. Typically, small samples of the coal stream are laboratory analyzed and the results made available between a day to a week later. By this time the coal is through the process stream, often already burned and no control is possible. The need of real-time analysis of bulk quantities of the coal has long been recognized and this need motivated Science Applications, Inc. to develop, since 1975, a continuous on-line nuclear analyzer of coal (or CONAC). Over the last three years a prototype of this instrument has undergone extensive testing using 200 pound bulk samples of a wide variety of US coal types. The Nucoalyzer has proven capable of measuring the abundances of all the important elemental constituents of coal along with the ash and calorific value. In the past year the first instrument has been installed and undergone testing at Detroit Edison's Monroe Coal blending facility, where it will control the blending of high and low sulfur coal to meet EPA emission regulations

  11. An on-line tritium-in-water monitor

    International Nuclear Information System (INIS)

    Singh, A.N.; Ratnakaran, M.; Vohra, K.G.

    1985-01-01

    The paper describes the development and operation of a continuous on-line tritium-in-water monitor for the detection of heavy water leaks into the secondary coolant light water of a heavy water power reactor. The heart of the instrument is its plastic scintillator sponge detector, made from 5 μm thick plastic scintillator films. The sponge weighs only about 1 g and is in the form of disc of 48 mm diameter and 8 mm thickness. The total surface area of the films is about 3000 cm 2 . In the coincidence mode of counting, the detector gives 1000 cps for the passage of 3.7 x 10 4 Bq/cm 3 (1 μCi/cm 3 ) of tritiated water. The background in 6 cm thick lead shielding in the laboratory is 0.2 cps, and inside the reactor building it is below 1 cps. The monitor presently scans 18 sample lines in sequence for 5 min each and gives a printout for the activity in each line. (orig.)

  12. An on-line tritium-in-water monitor

    Science.gov (United States)

    Singh, A. N.; Ratnakaran, M.; Vohra, K. G.

    1985-05-01

    The paper describes the development and operation of a continuous on-line tritium-in-water monitor for the detection of heavy water leaks into the secondary coolant light water of a heavy water power reactor. The heart of the instrument is its plastic scintillator sponge detector, made from 5 μm thick plastic scintillator films. The sponge weighs only about 1 g and is in the form of disc of 48 mm diameter and 8 mm thickness. The total surface area of the films is about 3000 cm 2. In the coincidence mode of counting, the detector gives 1000 cps for the passage of 3.7 × 10 4 Bq/cm 3 (1 μCi/cm 3) of tritiated water. The background in 6 cm thick lead shielding in the laboratory is 0.2 cps, and inside the reactor building it is below 1 cps. The monitor presently scans 18 sample lines in sequence for 5 min each and gives a printout for the activity in each line.

  13. Knowledge-based on-line vibration monitoring diagnose

    International Nuclear Information System (INIS)

    Johansson, L.G.; Karlsson, A.; Noeremark, A.

    1990-01-01

    ABB STAL developed some years ago a knowledge-based on-line vibration analysis system (working-name KOVA). KOVA is intended to work together with some type of vibration monitoring system, at present it is adapted to TVM 300. KOVA has no controlling function. It will only diagnose the actual situation and give the user explanations and proposals for actions to be taken. During the developing work, great experience has been gained of the features this type of system demands. This paper will present the outlines of the application and also discuss how to make diagnoses based both on general rules as well as on historical vibration cases for that particular unit (or identical units9. Another subject that this paper will outline, is the representation and evaluation of knowledge. KOVA serves as a decision-support system for the operator. Since KOVA will often give the operator more than one possible diagnosis as the cause of a fault, it is of great importance to give the operator comprehensive explanations and as many facts as possible. It is also important to rank the suggested diagnoses in some way. In KOVA these demands are effectively supported. The models and tools used to realize this functionality will be described in this paper

  14. On-line monitoring of lithium carbonate dissolution

    Energy Technology Data Exchange (ETDEWEB)

    Sun, Yuzhu; Song, Xingfu; Wang, Jin; Luo, Yan; Yu, Jianguo [National Engineering Research Center for Integrated Utilization Salt Lake Resources, East China University of Science and Technology, Shanghai (China)

    2009-11-15

    Dissolution of lithium carbonate (Li{sub 2}CO{sub 3}) in aqueous solution was investigated using three on-line apparatuses: the concentration of Li{sub 2}CO{sub 3} was measured by electrical conductivity equipment; CLD (Chord Length Distribution) was monitored by FBRM (Focused Beam Reflectance Measurement); crystal image was observed by PVM (Particle Video Microscope). Results show dissolution rate goes up with a decrease of particle size, and with an increase in temperature; stirring speed causes little impact on dissolution; ultrasound facilitates dissolution obviously. The CLD evolution and crystal images of Li{sub 2}CO{sub 3}powders in stirred fluid were observed detailedly by FBRM and PVM during dissolution. Experimental data were fitted to Avrami model, through which the activation energy was found to be 34.35 kJ/mol. PBE (Population Balance Equation) and moment transform were introduced to calculate dissolution kinetics, obtaining correlation equations of particle size decreasing rate as a function of temperature and undersaturation. (copyright 2009 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim) (orig.)

  15. EXPANDING ACADEMIC VOCABULARY WITH AN INTERACTIVE ON-LINE DATABASE

    Directory of Open Access Journals (Sweden)

    Marlise Horst

    2005-05-01

    Full Text Available University students used a set of existing and purpose-built on-line tools for vocabulary learning in an experimental ESL course. The resources included concordance, dictionary, cloze-builder, hypertext, and a database with interactive self-quizzing feature (all freely available at www.lextutor.ca. The vocabulary targeted for learning consisted of (a Coxhead's (2000 Academic Word List, a list of items that occur frequently in university textbooks, and (b unfamiliar words students had met in academic texts and selected for entry into the class database. The suite of tools were designed to foster retention by engaging learners in deep processing, an aspect that is often described as missing in computer exercises for vocabulary learning. Database entries were examined to determine whether context sentences supported word meanings adequately and whether entered words reflected the unavailability of cognates in the various first languages of the participants. Pre- and post-treatment performance on tests of knowledge of words targeted for learning in the course were compared to establish learning gains. Regression analyses investigated connections between use of specific computer tools and gains.

  16. Design considerations for on-line vibration diagnostic systems

    International Nuclear Information System (INIS)

    Branagan, L.A.; Schjeibel, J.R.

    1989-01-01

    The decisions made in the design of a data system for on-line vibration diagnostic system in power plants define how well the system will meet its intended goals. Direct use of the data for performing troubleshooting or developing operating correlations requires an understanding of the subtle impact of the design decisions incorporated in the data system. A data system includes data acquisition, data storage, and data retrieval. Data acquisition includes the selection of sensors, of vibration measurement modes, and of the time stamping format, and the arrangement of data collection cycles. Data storage requires the evaluation of data compression options and of data segregation. Data retrieval design requires an understanding of the data storage and acquisition techniques. Each of these options and design decisions involves compromises, many of which are discussed in this paper. Actual and synthetic data are presented to illustrate these points. The authors' experience with multiple data collection cycles, with frequent monitoring, and with storage by exception suggests that these techniques can be developed into an effective diagnostic system

  17. Study of the on line radioactive multicharged ion production

    International Nuclear Information System (INIS)

    Lecesne, N.

    1997-01-01

    This work is directly related to the SPIRAL project (Systeme de Production d'Ions Radioactifs Acceleres en Ligne) which will start at GANIL at the end of 1998. The aim of the thesis was to study the on line radioactive multicharged ion beam production stages, i.e. the production and diffusion of the radioactive nuclei in a thick target, their possible transfer up to an ECR ion source and their ionisation. Production cross sections of radioactive neutron rich nuclei, formed by fragmentation of a heavy ion beam in a thick target, were measured. An external target-ECR source system, dedicated to the radioactive noble gases production, and two internal target-ECR source systems, dedicated to the radioactive condensable element production, were built and tested on the SIRa tests bench (Separateur d'Ions Radioactifs). Different detection configurations were elaborated in order to identify the radioactive nuclei and estimate their production yields. Finally, a new method for measuring the overall efficiency of the separator was developed and allowed to study the diffusion properties of radioactive noble gases in various targets. (author)

  18. On-line confidence monitoring during decision making.

    Science.gov (United States)

    Dotan, Dror; Meyniel, Florent; Dehaene, Stanislas

    2018-02-01

    Humans can readily assess their degree of confidence in their decisions. Two models of confidence computation have been proposed: post hoc computation using post-decision variables and heuristics, versus online computation using continuous assessment of evidence throughout the decision-making process. Here, we arbitrate between these theories by continuously monitoring finger movements during a manual sequential decision-making task. Analysis of finger kinematics indicated that subjects kept separate online records of evidence and confidence: finger deviation continuously reflected the ongoing accumulation of evidence, whereas finger speed continuously reflected the momentary degree of confidence. Furthermore, end-of-trial finger speed predicted the post-decisional subjective confidence rating. These data indicate that confidence is computed on-line, throughout the decision process. Speed-confidence correlations were previously interpreted as a post-decision heuristics, whereby slow decisions decrease subjective confidence, but our results suggest an adaptive mechanism that involves the opposite causality: by slowing down when unconfident, participants gain time to improve their decisions. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. 3081/E processor and its on-line use

    International Nuclear Information System (INIS)

    Rankin, P.; Bricaud, B.; Gravina, M.

    1985-05-01

    The 3081/E is a second generation emulator of a mainframe IBM. One of it's applications will be to form part of the data acquisition system of the upgraded Mark II detector for data taking at the SLAC linear collider. Since the processor does not have direct connections to I/O devices a FASTBUS interface will be provided to allow communication with both SLAC Scanner Processors (which are responsible for the accumulation of data at a crate level) and the experiment's VAX 8600 mainframe. The 3081/E's will supply a significant amount of on-line computing power to the experiment (a single 3081/E is equivalent to 4 to 5 VAX 11/780's). A major advantage of the 3081/E is that program development can be done on an IBM mainframe (such as the one used for off-line analysis) which gives the programmer access to a full range of debugging tools. The processor's performance can be continually monitored by comparison of the results obtained using it to those given when the same program is run on an IBM computer. 9 refs

  20. Gated Treatment Delivery Verification With On-Line Megavoltage Fluoroscopy

    International Nuclear Information System (INIS)

    Tai An; Christensen, James D.; Gore, Elizabeth; Khamene, Ali; Boettger, Thomas; Li, X. Allen

    2010-01-01

    Purpose: To develop and clinically demonstrate the use of on-line real-time megavoltage (MV) fluoroscopy for gated treatment delivery verification. Methods and Materials: Megavoltage fluoroscopy (MVF) image sequences were acquired using a flat panel equipped for MV cone-beam CT in synchrony with the respiratory signal obtained from the Anzai gating device. The MVF images can be obtained immediately before or during gated treatment delivery. A prototype software tool (named RTReg4D) was developed to register MVF images with phase-sequenced digitally reconstructed radiograph images generated from the treatment planning system based on four-dimensional CT. The image registration can be used to reposition the patient before or during treatment delivery. To demonstrate the reliability and clinical usefulness, the system was first tested using a thoracic phantom and then prospectively in actual patient treatments under an institutional review board-approved protocol. Results: The quality of the MVF images for lung tumors is adequate for image registration with phase-sequenced digitally reconstructed radiographs. The MVF was found to be useful for monitoring inter- and intrafractional variations of tumor positions. With the planning target volume contour displayed on the MVF images, the system can verify whether the moving target stays within the planning target volume margin during gated delivery. Conclusions: The use of MVF images was found to be clinically effective in detecting discrepancies in tumor location before and during respiration-gated treatment delivery. The tools and process developed can be useful for gated treatment delivery verification.

  1. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  2. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  3. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  4. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  5. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  6. Security Management Model in Cloud Computing Environment

    OpenAIRE

    Ahmadpanah, Seyed Hossein

    2016-01-01

    In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which virtual machine security architecture, based on AHP (Analytic Hierarchy Process) virtual machine de...

  7. A Re-configurable On-line Learning Spiking Neuromorphic Processor comprising 256 neurons and 128K synapses

    Directory of Open Access Journals (Sweden)

    Ning eQiao

    2015-04-01

    Full Text Available Implementing compact, low-power artificial neural processing systems with real-time on-line learning abilities is still an open challenge. In this paper we present a full-custom mixed-signal VLSI device with neuromorphic learning circuits that emulate the biophysics of real spiking neurons and dynamic synapses for exploring the properties of computational neuroscience models and for building brain-inspired computing systems. The proposed architecture allows the on-chip configuration of a wide range of network connectivities, including recurrent and deep networks with short-term and long-term plasticity. The device comprises 128 K analog synapse and 256 neuron circuits with biologically plausible dynamics and bi-stable spike-based plasticity mechanisms that endow it with on-line learning abilities. In addition to the analog circuits, the device comprises also asynchronous digital logic circuits for setting different synapse and neuron properties as well as different network configurations. This prototype device, fabricated using a 180 nm 1P6M CMOS process, occupies an area of 51.4 mm 2 , and consumes approximately 4 mW for typical experiments, for example involving attractor networks. Here we describe the details of the overall architecture and of the individual circuits and present experimental results that showcase its potential. By supporting a wide range of cortical-like computational modules comprising plasticity mechanisms, this device will enable the realization of intelligent autonomous systems with on-line learning capabilities.

  8. Dynamics

    CERN Document Server

    Goodman, Lawrence E

    2001-01-01

    Beginning text presents complete theoretical treatment of mechanical model systems and deals with technological applications. Topics include introduction to calculus of vectors, particle motion, dynamics of particle systems and plane rigid bodies, technical applications in plane motions, theory of mechanical vibrations, and more. Exercises and answers appear in each chapter.

  9. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  10. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  11. Using Reading Guides and On-Line Quizzes to Improve Reading Compliance and Quiz Scores

    Science.gov (United States)

    Maurer, Trent W.; Longfield, Judith

    2015-01-01

    This study compared students' daily in-class reading quiz scores in an introductory Child Development course across five conditions: control, reading guide only, reading guide and on-line practice quiz, reading guide and on-line graded quiz, and reading guide and both types of on-line quizzes. At the beginning of class, students completed a 5-item…

  12. On-line Versus Face-to-Face Education: Utilizing Technology to Increase Effectiveness

    Science.gov (United States)

    2012-05-17

    Andragogy and learner-centered education provided in on-line education present excellent results. Secondly, the cost of on-line education compared to...13 Pedagogy versus Andragogy ...achieving learning outcomes. However, Andragogy and learner centered education provided in on-line education presents excellent results. Secondly, the cost

  13. The effect of family therapy on the changes in the severity of on-line game play and brain activity in adolescents with on-line game addiction

    Science.gov (United States)

    Han, Doug Hyun; Kim, Sun Mi; Lee, Young Sik; Renshaw, Perry F.

    2015-01-01

    We evaluated whether a brief 3-week family therapy intervention would change patterns of brain activation in response to affection and gaming cues in adolescents from dysfunctional families who met criteria for on-line game addiction. Fifteen adolescents with on-line game addiction and fifteen adolescents without problematic on-line game play and an intact family structure were recruited. Over 3 weeks, families were asked to carry out homework assignments focused on increasing family cohesion for more than 1 hour/day and 4 days/week. Before therapy, adolescents with on-line game addiction demonstrated decreased activity as measured by functional magnetic resonance imaging (fMRI) within the caudate, middle temporal gyrus, and occipital lobe in response to images depicting parental affection and increased activity of the middle frontal and inferior parietal in response scenes from on-line games, relative to healthy comparison subjects. Improvement in perceived family cohesion following 3 weeks of treatment was associated with an increase in the activity of the caudate nucleus in response to affection stimuli and was inversely correlated with changes in on-line game playing time. With evidence of brain activation changes in response to on-line game playing cues and images depicting parental love, the present findings suggest that family cohesion may be an important factor in the treatment of problematic on-line game playing. PMID:22698763

  14. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  15. Joint Data Assimilation and Parameter Calibration in on-line groundwater modelling using Sequential Monte Carlo techniques

    Science.gov (United States)

    Ramgraber, M.; Schirmer, M.

    2017-12-01

    As computational power grows and wireless sensor networks find their way into common practice, it becomes increasingly feasible to pursue on-line numerical groundwater modelling. The reconciliation of model predictions with sensor measurements often necessitates the application of Sequential Monte Carlo (SMC) techniques, most prominently represented by the Ensemble Kalman Filter. In the pursuit of on-line predictions it seems advantageous to transcend the scope of pure data assimilation and incorporate on-line parameter calibration as well. Unfortunately, the interplay between shifting model parameters and transient states is non-trivial. Several recent publications (e.g. Chopin et al., 2013, Kantas et al., 2015) in the field of statistics discuss potential algorithms addressing this issue. However, most of these are computationally intractable for on-line application. In this study, we investigate to what extent compromises between mathematical rigour and computational restrictions can be made within the framework of on-line numerical modelling of groundwater. Preliminary studies are conducted in a synthetic setting, with the goal of transferring the conclusions drawn into application in a real-world setting. To this end, a wireless sensor network has been established in the valley aquifer around Fehraltorf, characterized by a highly dynamic groundwater system and located about 20 km to the East of Zürich, Switzerland. By providing continuous probabilistic estimates of the state and parameter distribution, a steady base for branched-off predictive scenario modelling could be established, providing water authorities with advanced tools for assessing the impact of groundwater management practices. Chopin, N., Jacob, P.E. and Papaspiliopoulos, O. (2013): SMC2: an efficient algorithm for sequential analysis of state space models. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 75 (3), p. 397-426. Kantas, N., Doucet, A., Singh, S

  16. In situ microscopy for on-line determination of biomass.

    Science.gov (United States)

    Bittner, C; Wehnert, G; Scheper, T

    1998-10-05

    A sensor is presented, which allows on-line microscopic observation of microorganisms during fermentations in bioreactors. This sensor, an In Situ Microscope (ISM) consists of a direct-light microscope with a measuring chamber, integrated in a 25 mm stainless steel tube, two CCD-cameras, and two frame-grabbers. The data obtained are processed by an automatic image analysis system. The ISM is connected with the bioreactor via a standard port, and it is immersed directly in the culture liquid-in our case Saccharomyces cerevisiae in a synthetic medium. The microscopic examination of the liquid is performed in the measuring chamber, which is situated near the front end of the sensor head. The measuring chamber is opened and closed periodically. In the open state, the liquid in the bioreactor flows unrestricted through the chamber. In closing, a defined volume of 2,2. 10(-8) mL of the liquid becomes enclosed. After a few seconds, when the movement of the cells in the enclosed culture has stopped, they are examined with the microscope. The microscopic images of the cells are registered with the CCD-cameras and are visualized on a monitor, allowing a direct view of the cell population. After detection, the measuring chamber reopens, and the enclosed liquid is released. The images obtained are evaluated as to cell concentration, cell size, cell volume, biomass, and other relevant parameters simultaneously by automatic image analysis. With a PC (486/33 MHz), image processing takes about 15 s per image. The detection range tested when measuring cells of S. cerevisiae is about 10(6) to 10(9) cells/mL (equivalent to a biomass of 0.01 g/L to 12 g/L). The calculated biomass values correlate very well with those obtained using dry weight analysis. Furthermore, histograms can be calculated, which are comparable to those obtained by flow cytometry. Copyright 1998 John Wiley & Sons, Inc.

  17. Seniors-on-line: introducing older people to technology.

    Science.gov (United States)

    Irizarry, C; Downing, A; Elford, C

    1997-03-01

    Retired Engineers are playing an important role in ensuring that older people are not excluded from the benefits of technological advances. Technology is playing an increasingly important role in the lives of older people as it is incorporated into assistive devices, home security, access to health care, banking, communication and many other areas. However, if older people are unfamiliar with new technologies and find them daunting, they may not benefit fully from these advances. In order to minimize difficulties arising from unfamiliarity with technology, an introductory computer course was offered to people aged 55 and over. Teaching methods appropriate to the needs of older people were used: small classes, students and instructors from same age cohort, slow pace of presentation and ample opportunity to ask questions. Retired Engineers make up the majority of instructors. Three hundred and sixty nine older people have participated in the course and most plan to continue using a computer.

  18. On-line sensor technology for food manufacturing industry. Shokuhin bun prime ya ni okeru on-line sensor gijutsu

    Energy Technology Data Exchange (ETDEWEB)

    Komiya, K. (Ajinomoto Co. Inc., Tokyo (Japan))

    1990-08-05

    This paper introduced the sensor technology for food manufacturing industry. If sugar concentration in main raw material is too high in the amino acid fermentation, control of the concentration is required because fungi growth is inhibited. A controlling method for sugar concentration was developed by using the correlation between consumption of NH {sub 3} for pH adjustment and sugar consumption in place of conventional analyzing method and was introduced in the gulutamic acid fermantation. BOD sensor was developed to enable the selective measurement of organic substances which can be processed by organisms, and measuring time was shortened from previous five days to 30 minutes. Since many organics absorb infrared ray, near infrared analysis is suitable for food analysis and on-line analysis has high possibility. When this method is applied to measure moisture in fishes and meats, continuous measurement can be made nondestructively and without contacting, and further the precision is {plus minus} 0.1%. Simultaneous multi-composition analyses are carried out by continuous spectrum and near infrared method using higher rate scanning. Sensor development for taste and smell has started. 10 refs., 4 figs., 4 refs.

  19. Organization of the M-6000 computer calculating process in the CAMAC on-line measurement systems for a physical experiment

    International Nuclear Information System (INIS)

    Bespalova, T.V.; Volkov, A.S.; Golutvin, I.A.; Maslov, V.V.; Nevskaya, N.A.; Okonishnikov, A.A.; Terekhov, V.E.; Shilkin, I.P.

    1977-01-01

    Discussed are the basic results of the work on designing the software of the computer measuring complex (CMC) which uses the M-6000 computer and operates on line with an accelerator. All the CMC units comply with the CAMAC standard. The CMC incorporates a mainframe memory, twenty-four kilobytes of 16-digit words in size, and external memory on magnetic disks, 1 megabyte in size. Suggested is a modification of the technique for designing the CMC software providing for program complexes which are dynamically adjusted by an experimentalist for the given experiment for a short time. The CMC software comprises the following major portions: a software generator, data acquisition program, on-line data processing routines, off-line data processing programs and programs for data recording on magnetic tapes and disks. Testing of the designed CMC has revealed that the total data processing time equals to from 150 to 500 ms

  20. Application of classical versus bayesian statistical control charts to on-line radiological monitoring

    International Nuclear Information System (INIS)

    DeVol, T.A.; Gohres, A.A.; Williams, C.L.

    2009-01-01

    False positive and false negative incidence rates of radiological monitoring data from classical and Bayesian statistical process control chart techniques are compared. The on-line monitoring for illicit radioactive material with no false positives or false negatives is the goal of homeland security monitoring, but is unrealistic. However, statistical fluctuations in the detector signal, short detection times, large source to detector distances, and shielding effects make distinguishing between a radiation source and natural background particularly difficult. Experimental time series data were collected using a 1' x 1' LaCl 3 (Ce) based scintillation detector (Scionix, Orlando, FL) under various simulated conditions. Experimental parameters include radionuclide (gamma-ray) energy, activity, density thickness (source to detector distance and shielding), time, and temperature. All statistical algorithms were developed using MATLAB TM . The Shewhart (3-σ) control chart and the cumulative sum (CUSUM) control chart are the classical procedures adopted, while the Bayesian technique is the Shiryayev-Roberts (S-R) control chart. The Shiryayev-Roberts method was the best method for controlling the number of false positive detects, followed by the CUSUM method. However, The Shiryayev-Roberts method, used without modification, resulted in one of the highest false negative incidence rates independent of the signal strength. Modification of The Shiryayev-Roberts statistical analysis method reduced the number of false negatives, but resulted in an increase in the false positive incidence rate. (author)

  1. Roadmap on optical security

    Science.gov (United States)

    Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam

    2016-08-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections

  2. Report from the Light Water Reactor Sustainability Workshop on On-Line Monitoring Technologies

    International Nuclear Information System (INIS)

    Baldwin, Thomas; Tawfik, Magdy; Bond, Leonard

    2010-01-01

    In support of expanding the use of nuclear power, interest is growing in methods of determining the feasibility of longer term operation for the U.S. fleet of nuclear power plants, particularly operation beyond 60 years. To help establish the scientific and technical basis for such longer term operation, the DOE-NE has established a research and development (R and D) objective. This objective seeks to develop technologies and other solutions that can improve the reliability, sustain the safety, and extend the life of current reactors. The Light Water Reactor Sustainability (LWRS) Program, which addresses the needs of this objective, is being developed in collaboration with industry R and D programs to provide the technical foundations for licensing and managing the long-term, safe, and economical operation of nuclear power plants. The LWRS Program focus is on longer-term and higher-risk/reward research that contributes to the national policy objectives of energy and environmental security. In moving to identify priorities and plan activities, the Light Water Reactor Sustainability Workshop on On-Line Monitoring (OLM) Technologies was held June 10-12, 2010, in Seattle, Washington. The workshop was run to enable industry stakeholders and researchers to identify the nuclear industry needs in the areas of future OLM technologies and corresponding technology gaps and research capabilities. It also sought to identify approaches for collaboration that would be able to bridge or fill the technology gaps. This report is the meeting proceedings, documenting the presentations and discussions of the workshop and is intended to serve as a basis for a plan which is under development that will enable the I and C research pathway to achieve its goals. Benefits to the nuclear industry accruing from On Line Monitoring Technology cannot be ignored. Information gathered thus far has contributed significantly to the Department of Energy's Light Water Reactor Sustainability Program. DOE

  3. Report from the Light Water Reactor Sustainability Workshop on On-Line Monitoring Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas Baldwin; Magdy Tawfik; Leonard Bond

    2010-06-01

    In support of expanding the use of nuclear power, interest is growing in methods of determining the feasibility of longer term operation for the U.S. fleet of nuclear power plants, particularly operation beyond 60 years. To help establish the scientific and technical basis for such longer term operation, the DOE-NE has established a research and development (R&D) objective. This objective seeks to develop technologies and other solutions that can improve the reliability, sustain the safety, and extend the life of current reactors. The Light Water Reactor Sustainability (LWRS) Program, which addresses the needs of this objective, is being developed in collaboration with industry R&D programs to provide the technical foundations for licensing and managing the long-term, safe, and economical operation of nuclear power plants. The LWRS Program focus is on longer-term and higher-risk/reward research that contributes to the national policy objectives of energy and environmental security. In moving to identify priorities and plan activities, the Light Water Reactor Sustainability Workshop on On-Line Monitoring (OLM) Technologies was held June 10–12, 2010, in Seattle, Washington. The workshop was run to enable industry stakeholders and researchers to identify the nuclear industry needs in the areas of future OLM technologies and corresponding technology gaps and research capabilities. It also sought to identify approaches for collaboration that would be able to bridge or fill the technology gaps. This report is the meeting proceedings, documenting the presentations and discussions of the workshop and is intended to serve as a basis for a plan which is under development that will enable the I&C research pathway to achieve its goals. Benefits to the nuclear industry accruing from On Line Monitoring Technology cannot be ignored. Information gathered thus far has contributed significantly to the Department of Energy’s Light Water Reactor Sustainability Program. DOE has

  4. The 1-way on-line coupled atmospheric chemistry model system MECO(n – Part 2: On-line coupling with the Multi-Model-Driver (MMD

    Directory of Open Access Journals (Sweden)

    A. Kerkweg

    2012-01-01

    Full Text Available A new, highly flexible model system for the seamless dynamical down-scaling of meteorological and chemical processes from the global to the meso-γ scale is presented. A global model and a cascade of an arbitrary number of limited-area model instances run concurrently in the same parallel environment, in which the coarser grained instances provide the boundary data for the finer grained instances. Thus, disk-space intensive and time consuming intermediate and pre-processing steps are entirely avoided and the time interpolation errors of common off-line nesting approaches are minimised. More specifically, the regional model COSMO of the German Weather Service (DWD is nested on-line into the atmospheric general circulation model ECHAM5 within the Modular Earth Submodel System (MESSy framework. ECHAM5 and COSMO have previously been equipped with the MESSy infrastructure, implying that the same process formulations (MESSy submodels are available for both models. This guarantees the highest degree of achievable consistency, between both, the meteorological and chemical conditions at the domain boundaries of the nested limited-area model, and between the process formulations on all scales.

    The on-line nesting of the different models is established by a client-server approach with the newly developed Multi-Model-Driver (MMD, an additional component of the MESSy infrastructure. With MMD an arbitrary number of model instances can be run concurrently within the same message passing interface (MPI environment, the respective coarser model (either global or regional is the server for the nested finer (regional client model, i.e. it provides the data required to calculate the initial and boundary fields to the client model. On-line nesting means that the coupled (client-server models exchange their data via the computer memory, in contrast to the data exchange via files on disk in common off-line nesting approaches. MMD consists of a library

  5. On line instrument systems for monitoring steam turbogenerators

    Science.gov (United States)

    Clapis, A.; Giorgetti, G.; Lapini, G. L.; Benanti, A.; Frigeri, C.; Gadda, E.; Mantino, E.

    A computerized real time data acquisition and data processing for the diagnosis of malfunctioning of steam turbogenerator systems is described. Pressure, vibration and temperature measurements are continuously collected from standard or special sensors including startup or stop events. The architecture of the monitoring system is detailed. Examples of the graphics output are presented. It is shown that such a system allows accurate diagnosis and the possibility of creating a data bank to describe the dynamic characteristics of the machine park.

  6. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  7. Real time security assessment in national load dispatch centre, Tenaga Nasional Berhad, Malaysia

    Energy Technology Data Exchange (ETDEWEB)

    Sreedharan, G. [Tenaga Nasional Berhad, Kuala Lumpur (Malaysia); Moghavvemi, M. [Univ. of Malaya, Kuala Lumpur (Malaysia)

    2007-07-01

    Electric energy is one of the most important resources of modern industrial society. Electric power is available to the user instantly at the correct voltage, frequency and exactly at the amount that is needed. However, the power system is subjected to constant disturbances created by random load changes, faults created by natural causes and by equipment failures. One of the major impacts of the disturbances to the system is the impact imposed on transmission networks or corridors, which have increased the demand for more accurate and up to date information on the power system. It has become impossible to operate the system with an acceptable degree of security by using traditional operational planning studies that are conducted off-line and use forecast conditions to predict system security limits. Therefore the use of on-line security assessment is quickly becoming a necessity. This paper simplified the general off-line security assessment methodology by attempting to use the real time system snap shot data as an input to the dynamic security assessment tool namely VSAT. The study used raw data produced at every 10 minute cycle in order to conduct a security assessment of the power system, including current power system load; network topology; unit commitment; and generator and transmission line outages. The purpose of the project was to implement a real time security assessment to benefit the system operators to assist them in their daily work in monitoring and operating the power system in Tenaga Nasional Berhad. The paper discussed project implementation including a description of the project and project background. It discussed the operation of VSAT, result display, and future enhancement. 18 refs., 5 figs.

  8. Isotopic nuclear reactor with on-line separation

    International Nuclear Information System (INIS)

    Liviu, Popa-Simil

    2007-01-01

    In the new reactor-waste cycle design the nuclear reactor gets features of the living beings - resembling the plants/vegetation -. The separation of waste starts inside the fuel by using the fission reaction to separate the fission products from the fuel. The fuel, which is preferred to be highly isotopic enriched, is fabricated in beads smaller than the fission product range, immersed in a gentle flowing liquid drain. If this liquid is Lead Bismuth (LBE) the fission products will be lighter, while in Sodium-Potassium (NaK) will be heavier, except for gases. This drain liquid will collect both the fission products and the collision damage, drawing them slow to give time to short lives disintegration chains to take place inside the shielded nuclear reactor area outside the reactor core in a separation unit. While the drain liquid with the fission products is outside the reactor core few choices are available: - To solidify the drain liquid freezing all elements inside and transport the metal in cryogenic conditions to a remote separation unit, or to apply a separation partitioning process online stabilizing and packing the fission products only, or a combination of these two. The radioactivity of this drain liquid is smaller than that of the actual used fuel because it represents the accumulation of a very short period (about 1 month or less) and had enough time to cool down all the short lives. The separation unit on-line with the nuclear reactor is composed of a density separation unit, followed by a phase interface concentration unit which moves out of the LBE the fission products as lighter impurities, and an electrochemical separation unit for the fission products. Further, chemical separation, stabilization processes are applied and the fission products are delivered partitioned on groups of chemical compatible products. Finally the specific waste is about 1 Kg/Gw*day, to which the stabilization products have to be added which increases this mass by 10 times

  9. From Subjective Trust to Objective Trustworthiness in On-line Social Networks: Overview and Challenges

    Directory of Open Access Journals (Sweden)

    David Zejda

    2010-04-01

    Full Text Available Nowadays dozens of people share their content in the current Web 2.0 space, talk with friends in social networking sites such as Facebook and live on the Net in many other ways. They do all this quite naturally, forgetting the healthy cautiousness sometimes. In real life we rely on trusted people. Do we know how to reflect real-world trust mechanisms into on-line social software? In the article we focused to bring overview on state of the art in main ideas behind a trust processing in online social networking systems. What are common sources of subjective trust, how the trust emerges and what are the sources of trust dynamics? How can be trust captured into the systems, how can be explicit trust processed to infer indirect trust, the trust between users who do not know each other? And what are the ways to infer objective metrics of trust, the reputation or trustworthiness? Finally, we point out selected challenges related to the trust in current highly dynamic social networks.

  10. On-line MR imaging for dose validation of abdominal radiotherapy

    International Nuclear Information System (INIS)

    Glitzner, M; Crijns, S P M; De Senneville, B Denis; Kontaxis, C; Prins, F M; Lagendijk, J J W; Raaymakers, B W

    2015-01-01

    For quality assurance and adaptive radiotherapy, validation of the actual delivered dose is crucial.Intrafractional anatomy changes cannot be captured satisfactorily during treatment with hitherto available imaging modalitites. Consequently, dose calculations are based on the assumption of static anatomy throughout the treatment. However, intra- and interfraction anatomy is dynamic and changes can be significant.In this paper, we investigate the use of an MR-linac as a dose tracking modality for the validation of treatments in abdominal targets where both respiratory and long-term peristaltic and drift motion occur.The on-line MR imaging capability of the modality provides the means to perform respiratory gating of both delivery and acquisition yielding a model-free respiratory motion management under free breathing conditions.In parallel to the treatment, the volumetric patient anatomy was captured and used to calculate the applied dose. Subsequently, the individual doses were warped back to the planning grid to obtain the actual dose accumulated over the entire treatment duration. Ultimately, the planned dose was validated by comparison with the accumulated dose.Representative for a site subject to breathing modulation, two kidney cases (25 Gy target dose) demonstrated the working principle on volunteer data and simulated delivery. The proposed workflow successfully showed its ability to track local dosimetric changes. Integration of the on-line anatomy information could reveal local dose variations  −2.3–1.5 Gy in the target volume of a volunteer dataset. In the adjacent organs at risk, high local dose errors ranging from  −2.5 to 1.9 Gy could be traced back. (paper)

  11. On-line MR imaging for dose validation of abdominal radiotherapy

    Science.gov (United States)

    Glitzner, M.; Crijns, S. P. M.; de Senneville, B. Denis; Kontaxis, C.; Prins, F. M.; Lagendijk, J. J. W.; Raaymakers, B. W.

    2015-11-01

    For quality assurance and adaptive radiotherapy, validation of the actual delivered dose is crucial. Intrafractional anatomy changes cannot be captured satisfactorily during treatment with hitherto available imaging modalitites. Consequently, dose calculations are based on the assumption of static anatomy throughout the treatment. However, intra- and interfraction anatomy is dynamic and changes can be significant. In this paper, we investigate the use of an MR-linac as a dose tracking modality for the validation of treatments in abdominal targets where both respiratory and long-term peristaltic and drift motion occur. The on-line MR imaging capability of the modality provides the means to perform respiratory gating of both delivery and acquisition yielding a model-free respiratory motion management under free breathing conditions. In parallel to the treatment, the volumetric patient anatomy was captured and used to calculate the applied dose. Subsequently, the individual doses were warped back to the planning grid to obtain the actual dose accumulated over the entire treatment duration. Ultimately, the planned dose was validated by comparison with the accumulated dose. Representative for a site subject to breathing modulation, two kidney cases (25 Gy target dose) demonstrated the working principle on volunteer data and simulated delivery. The proposed workflow successfully showed its ability to track local dosimetric changes. Integration of the on-line anatomy information could reveal local dose variations  -2.3-1.5 Gy in the target volume of a volunteer dataset. In the adjacent organs at risk, high local dose errors ranging from  -2.5 to 1.9 Gy could be traced back.

  12. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  13. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  14. Development Approach of the Advanced Life Support On-line Project Information System

    Science.gov (United States)

    Levri, Julie A.; Hogan, John A.; Morrow, Rich; Ho, Michael C.; Kaehms, Bob; Cavazzoni, Jim; Brodbeck, Christina A.; Whitaker, Dawn R.

    2005-01-01

    The Advanced Life Support (ALS) Program has recently accelerated an effort to develop an On-line Project Information System (OPIS) for research project and technology development data centralization and sharing. There has been significant advancement in the On-line Project Information System (OPIS) over the past year (Hogan et al, 2004). This paper presents the resultant OPIS development approach. OPIS is being built as an application framework consisting of an uderlying Linux/Apache/MySQL/PHP (LAMP) stack, and supporting class libraries that provides database abstraction and automatic code generation, simplifying the ongoing development and maintenance process. Such a development approach allows for quick adaptation to serve multiple Programs, although initial deployment is for an ALS module. OPIS core functionality will involve a Web-based annual solicitation of project and technology data directly from ALS Principal Investigators (PIs) through customized data collection forms. Data provided by PIs will be reviewed by a Technical Task Monitor (TTM) before posting the information to OPIS for ALS Community viewing via the Web. Such Annual Reports will be permanent, citable references within OPIS. OPlS core functionality will also include Project Home Sites, which will allow PIS to provide updated technology information to the Community in between Annual Report updates. All data will be stored in an object-oriented relational database, created in MySQL(Reistered Trademark) and located on a secure server at NASA Ames Research Center (ARC). Upon launch, OPlS can be utilized by Managers to identify research and technology development (R&TD) gaps and to assess task performance. Analysts can employ OPlS to obtain the current, comprehensive, accurate information about advanced technologies that is required to perform trade studies of various life support system options. ALS researchers and technology developers can use OPlS to achieve an improved understanding of the NASA

  15. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  16. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  17. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  18. Gamma camera investigations using an on-line computer system

    International Nuclear Information System (INIS)

    Vikterloef, K.J.; Beckman, K.-W.; Berne, E.; Liljenfors, B.

    1974-01-01

    A computer system for use with a gamma camera has been developed by Oerebro Regional Hospital and Nukab AB using a PDP 8/e with a 12K core memory connected to a Selektronik gamma camera. It is possible to register, without loss, pictures of high (5kcps) pulse frequency, two separate channels with identical coordinates, fast dynamic functions down to 5 pictures/second, and to perform statistical smoothing and subtraction of two separate pictures. Experience has shown these possibilities to be so valuable that one has difficulty in thinking of a scanning system without them. This applies not only to sophisticated investigations, e.g. dual isotope registration, but also in conventional scanning for avoiding false positive interpretations and increasing the precision. It is possible at relatively low cost to add a dosage planning system. (JIW)

  19. Visual identification and similarity measures used for on-line motion planning of autonomous robots in unknown environments

    Science.gov (United States)

    Martínez, Fredy; Martínez, Fernando; Jacinto, Edwar

    2017-02-01

    In this paper we propose an on-line motion planning strategy for autonomous robots in dynamic and locally observable environments. In this approach, we first visually identify geometric shapes in the environment by filtering images. Then, an ART-2 network is used to establish the similarity between patterns. The proposed algorithm allows that a robot establish its relative location in the environment, and define its navigation path based on images of the environment and its similarity to reference images. This is an efficient and minimalist method that uses the similarity of landmark view patterns to navigate to the desired destination. Laboratory tests on real prototypes demonstrate the performance of the algorithm.

  20. On-line determination of anions in pulp mills by capillary electrophoresis (CE); Tehdasoloissa tapahtuva anionien kapillaarielektroforeettinen on-line maeaeritys ja sen hyoedyntaeminen prosessivalvonnassa - MPKY 02

    Energy Technology Data Exchange (ETDEWEB)

    Kokkonen, R; Holmberg, M; Vainikka, V [Finnish Pulp and Paper Research Institute, Espoo (Finland)

    1999-12-31

    The aim of the study was to set-up a process control system for on-line measurement of certain anions. Typical anions which forms precipitates in pulp and paper mills are oxalate, carbonate and sulphate. Thus it is important to develop a continuous process analyzing system to control concentration levels of this anions. For the preliminary tests of continuous determinations of chloride and sulphate anions in tap water a simple on-line system was build in KCL (The Finnish Pulp and Paper Research Institute) and connected to a capillary electroforesis apparatus. In the preliminary tests a chromate buffer (ph = 7.6) was used. Separation of chloride and sulphate was excellent but the stability of buffer was not good enough and it was usable only for few hours. After experimental studies VTT developed a stable capillary electrophoresis method based on mixed amine buffer and this was selected for an on-line method for determination of anions in process waters of the pulp and paper industry. In the preliminary on-line test (r = 20) repeatabilities of migration times of sulphate and chloride with the chromate buffer were < 5 % (RSD) and peak heights < 15 % (RSD). With the mixed amine buffer repeatabilities were better. The preliminary tests showed that it is possible to connect a capillary electrophoresis system to on-line measurements. For the moment no commercial on-line CE apparatus is available. (orig.)

  1. On-line determination of anions in pulp mills by capillary electrophoresis (CE); Tehdasoloissa tapahtuva anionien kapillaarielektroforeettinen on-line maeaeritys ja sen hyoedyntaeminen prosessivalvonnassa - MPKY 02

    Energy Technology Data Exchange (ETDEWEB)

    Kokkonen, R.; Holmberg, M.; Vainikka, V. [Finnish Pulp and Paper Research Institute, Espoo (Finland)

    1998-12-31

    The aim of the study was to set-up a process control system for on-line measurement of certain anions. Typical anions which forms precipitates in pulp and paper mills are oxalate, carbonate and sulphate. Thus it is important to develop a continuous process analyzing system to control concentration levels of this anions. For the preliminary tests of continuous determinations of chloride and sulphate anions in tap water a simple on-line system was build in KCL (The Finnish Pulp and Paper Research Institute) and connected to a capillary electroforesis apparatus. In the preliminary tests a chromate buffer (ph = 7.6) was used. Separation of chloride and sulphate was excellent but the stability of buffer was not good enough and it was usable only for few hours. After experimental studies VTT developed a stable capillary electrophoresis method based on mixed amine buffer and this was selected for an on-line method for determination of anions in process waters of the pulp and paper industry. In the preliminary on-line test (r = 20) repeatabilities of migration times of sulphate and chloride with the chromate buffer were < 5 % (RSD) and peak heights < 15 % (RSD). With the mixed amine buffer repeatabilities were better. The preliminary tests showed that it is possible to connect a capillary electrophoresis system to on-line measurements. For the moment no commercial on-line CE apparatus is available. (orig.)

  2. Information Security and Integrity Systems

    Science.gov (United States)

    1990-01-01

    Viewgraphs from the Information Security and Integrity Systems seminar held at the University of Houston-Clear Lake on May 15-16, 1990 are presented. A tutorial on computer security is presented. The goals of this tutorial are the following: to review security requirements imposed by government and by common sense; to examine risk analysis methods to help keep sight of forest while in trees; to discuss the current hot topic of viruses (which will stay hot); to examine network security, now and in the next year to 30 years; to give a brief overview of encryption; to review protection methods in operating systems; to review database security problems; to review the Trusted Computer System Evaluation Criteria (Orange Book); to comment on formal verification methods; to consider new approaches (like intrusion detection and biometrics); to review the old, low tech, and still good solutions; and to give pointers to the literature and to where to get help. Other topics covered include security in software applications and development; risk management; trust: formal methods and associated techniques; secure distributed operating system and verification; trusted Ada; a conceptual model for supporting a B3+ dynamic multilevel security and integrity in the Ada runtime environment; and information intelligence sciences.

  3. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  4. Simulation and optimization of forest ecological security of Beijing: an application of system dynamics model%北京市森林生态安全情景模拟与优化调控研究

    Institute of Scientific and Technical Information of China (English)

    鲁莎莎; 郭丽婷; 陈英红; 陈妮; 张珉珊; 关兴良

    2017-01-01

    Ecological security is the basis for regional security as well as regional socio-economic sustainable development.The situation of ecological environment and forest ecological security in Beijing,the capital of China,is not optimistic.Forest ecological security (FES) has attracted a widespread attention of the government and the public.Through four designed scenarios,this paper obtained the development trend of forest ecological security in Beijing under different control schemes,and provides an effective way for the sustainable forest ecological security in Beijing.According to the characteristics of forest ecosystems in Beijing,a comprehensive evaluation index system of forest ecological security was established based on the definition of forest ecological security,and a scenario analysis and control model of forest ecological security based on SD model was established.Four scenarios,developing reasonable forest management policies,the medium-speed socioeconomic development,strengthening environmental management,Forest-socio-economic-environment coordinated development,were designed and simulation and dynamic evaluation analysis were carried out on the forest ecological security situation in each scenario.The initial FES index value (in Scenario 0),the comprehensive assessment value of forest ecological security (FES) in Beijing increased from 2000 to 2020,and reached to its highest level of 0.527 in 2013,but it declined slightly to 0.519 in 2020.The improvement of forest ecosystem security is not obvious.In Scenarios 1-4,the FES index value will reach 0.541,0.525,0.559 and 0.604 respectively in 2020,which all enhance the forest ecological security in varying degrees compared with Scenario 0,and the quantity and quality of forest resources will also be improved in varying degrees.The implementation of forest management policies,socioeconomic development and environmental management combine to affect the FES in Beijing.Only by maintaining the productivity and

  5. Comparing On-Line to In-Person Course Delivery: An Empirical Study

    OpenAIRE

    Jammie Price; Leslie Hossfeld

    2007-01-01

    Web-based technologies have been used in the classroom for over 15 years, including websites, email, listserves, library reserves, and text books. Among these options, social scientists range widely in their web usage – from simply posting syllabi on-line to delivering a course fully on-line in asynchronous learning networks. Use of web-based technology for instructional purposes is increasing, as is enrollment in distance education courses and on-line course offerings. Many administrators ...

  6. Gene expression programming for power system static security ...

    African Journals Online (AJOL)

    user

    fuzzy logic, artificial neural networks and expert systems have been explored for static security assessment problems (Bansal et ..... MATLAB version 7.6 neural network toolbox was ..... Vision 2020 Dynamic Security Assessment in Real time.

  7. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  8. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  9. On-Line Booking Policies and Competitive Analysis of Medical Examination in Hospital

    Directory of Open Access Journals (Sweden)

    Li Luo

    2014-01-01

    Full Text Available From the on-line point, we consider the hospital’s medical examination appointment problem with hierarchical machines. This approach eliminates the need for both demand forecasts and a risk-neutrality assumption. Due to different unit revenue, uncertain demand, and arrival of patients, we design on-line booking policies for two kinds of different situations from the perspective of on-line policy and competitive analysis. After that, we prove the optimal competitive ratios. Through numerical examples, we compare advantages and disadvantages between on-line policies and traditional policies, finding that there is different superiority for these two policies under different arrival sequences.

  10. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  11. Use Cases for Dynamic Secure Wireless Networking in Coalition Environments (Cas d utilisation de r seau sans fil dynamique et s curis dans des environnements de coalition)

    Science.gov (United States)

    2015-05-01

    Provider Willingness 15 and Degree of Exposure STO-TR-IST-109 v vi STO-TR-IST-109 List of Acronyms CC Coloured Cloud CoI Community of...could be applied to the MANET connectivity scenario. In PCN terminology [4]2, an E-node3 advertises guarantees of bandwidth and other services of...its Coloured Cloud4 (CC). It will be equipped with Service-Level Agreement (SLA) management functions, including support for security and risk. In

  12. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  13. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  14. Architecture and Functionality of the Advanced Life Support On-Line Project Information System

    Science.gov (United States)

    Hogan, John A.; Levri, Julie A.; Morrow, Rich; Cavazzoni, Jim; Rodriguez, Luis F.; Riano, Rebecca; Whitaker, Dawn R.

    2004-01-01

    An ongoing effort is underway at NASA Ames Research Center (ARC) to develop an On-line Project Information System (OPIS) for the Advanced Life Support (ALS) Program. The objective of this three-year project is to develop, test, revise and deploy OPIS to enhance the quality of decision-making metrics and attainment of Program goals through improved knowledge sharing. OPIS will centrally locate detailed project information solicited from investigators on an annual basis and make it readily accessible by the ALS Community via a Web-accessible interface. The data will be stored in an object-oriented relational database (created in MySQL) located on a secure server at NASA ARC. OPE will simultaneously serve several functions, including being an research and technology development (R&TD) status information hub that can potentially serve as the primary annual reporting mechanism for ALS-funded projects. Using OPIS, ALS managers and element leads will be able to carry out informed R&TD investment decisions, and allow analysts to perform accurate systems evaluations. Additionally, the range and specificity of information solicited will serve to educate technology developers of programmatic needs. OPIS will collect comprehensive information from all ALS projects as well as highly detailed information specific to technology development in each ALS area (Waste, Water, Air, Biomass, Food, Thermal, Controls and Systems Analysis). Because the scope of needed information can vary dramatically between areas, element-specific technology information is being compiled with the aid of multiple specialized working groups. This paper presents the current development status in terms of the architecture and functionality of OPIS. Possible implementation approaches for OPIS are also discussed.

  15. Architecture and Functionality of the Advanced Life Support On-Line Project Information System (OPIS)

    Science.gov (United States)

    Hogan, John A.; Levri, Julie A.; Morrow, Rich; Cavazzoni, Jim; Rodriquez, Luis F.; Riano, Rebecca; Whitaker, Dawn R.

    2004-01-01

    An ongoing effort is underway at NASA Amcs Research Center (ARC) tu develop an On-line Project Information System (OPIS) for the Advanced Life Support (ALS) Program. The objective of this three-year project is to develop, test, revise and deploy OPIS to enhance the quality of decision-making metrics and attainment of Program goals through improved knowledge sharing. OPIS will centrally locate detailed project information solicited from investigators on an annual basis and make it readily accessible by the ALS Community via a web-accessible interface. The data will be stored in an object-oriented relational database (created in MySQL(Trademark) located on a secure server at NASA ARC. OPE will simultaneously serve several functions, including being an R&TD status information hub that can potentially serve as the primary annual reporting mechanism. Using OPIS, ALS managers and element leads will be able to carry out informed research and technology development investment decisions, and allow analysts to perform accurate systems evaluations. Additionally, the range and specificity of information solicited will serve to educate technology developers of programmatic needs. OPIS will collect comprehensive information from all ALS projects as well as highly detailed information specific to technology development in each ALS area (Waste, Water, Air, Biomass, Food, Thermal, and Control). Because the scope of needed information can vary dramatically between areas, element-specific technology information is being compiled with the aid of multiple specialized working groups. This paper presents the current development status in terms of the architecture and functionality of OPIS. Possible implementation approaches for OPIS are also discussed.

  16. Developing national on-line services to annotate and analyse underwater imagery in a research cloud

    Science.gov (United States)

    Proctor, R.; Langlois, T.; Friedman, A.; Davey, B.

    2017-12-01

    Fish image annotation data is currently collected by various research, management and academic institutions globally (+100,000's hours of deployments) with varying degrees of standardisation and limited formal collaboration or data synthesis. We present a case study of how national on-line services, developed within a domain-oriented research cloud, have been used to annotate habitat images and synthesise fish annotation data sets collected using Autonomous Underwater Vehicles (AUVs) and baited remote underwater stereo-video (stereo-BRUV). Two developing software tools have been brought together in the marine science cloud to provide marine biologists with a powerful service for image annotation. SQUIDLE+ is an online platform designed for exploration, management and annotation of georeferenced images & video data. It provides a flexible annotation framework allowing users to work with their preferred annotation schemes. We have used SQUIDLE+ to sample the habitat composition and complexity of images of the benthos collected using stereo-BRUV. GlobalArchive is designed to be a centralised repository of aquatic ecological survey data with design principles including ease of use, secure user access, flexible data import, and the collection of any sampling and image analysis information. To easily share and synthesise data we have implemented data sharing protocols, including Open Data and synthesis Collaborations, and a spatial map to explore global datasets and filter to create a synthesis. These tools in the science cloud, together with a virtual desktop analysis suite offering python and R environments offer an unprecedented capability to deliver marine biodiversity information of value to marine managers and scientists alike.

  17. Application of a Mechanistic Model as a Tool for On-line Monitoring of Pilot Scale Filamentous Fungal Fermentation Processes - The Importance of Evaporation Effects

    DEFF Research Database (Denmark)

    Mears, Lisa; Stocks, Stuart M.; Albæk, Mads Orla

    2017-01-01

    A mechanistic model-based soft sensor is developed and validated for 550L filamentous fungus fermentations operated at Novozymes A/S. The soft sensor is comprised of a parameter estimation block based on a stoichiometric balance, coupled to a dynamic process model. The on-line parameter estimation...... a historical dataset of eleven batches from the fermentation pilot plant (550L) at Novozymes A/S. The model is then implemented on-line in 550L fermentation processes operated at Novozymes A/S in order to validate the state estimator model on fourteen new batches utilizing a new strain. The product...... block models the changing rates of formation of product, biomass, and water, and the rate of consumption of feed using standard, available on-line measurements. This parameter estimation block, is coupled to a mechanistic process model, which solves the current states of biomass, product, substrate...

  18. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  19. Event-based plausibility immediately influences on-line language comprehension.

    Science.gov (United States)

    Matsuki, Kazunaga; Chow, Tracy; Hare, Mary; Elman, Jeffrey L; Scheepers, Christoph; McRae, Ken

    2011-07-01

    In some theories of sentence comprehension, linguistically relevant lexical knowledge, such as selectional restrictions, is privileged in terms of the time-course of its access and influence. We examined whether event knowledge computed by combining multiple concepts can rapidly influence language understanding even in the absence of selectional restriction violations. Specifically, we investigated whether instruments can combine with actions to influence comprehension of ensuing patients of (as in Rayner, Warren, Juhuasz, & Liversedge, 2004; Warren & McConnell, 2007). Instrument-verb-patient triplets were created in a norming study designed to tap directly into event knowledge. In self-paced reading (Experiment 1), participants were faster to read patient nouns, such as hair, when they were typical of the instrument-action pair (Donna used the shampoo to wash vs. the hose to wash). Experiment 2 showed that these results were not due to direct instrument-patient relations. Experiment 3 replicated Experiment 1 using eyetracking, with effects of event typicality observed in first fixation and gaze durations on the patient noun. This research demonstrates that conceptual event-based expectations are computed and used rapidly and dynamically during on-line language comprehension. We discuss relationships among plausibility and predictability, as well as their implications. We conclude that selectional restrictions may be best considered as event-based conceptual knowledge rather than lexical-grammatical knowledge.

  20. A test plan for an on-line whole building energy calculator

    Energy Technology Data Exchange (ETDEWEB)

    Purdy, J.; Ferguson, A.; Mombourquette, S.; Haddad, K.; Lopez, P.; Wyndham-Wheeler, P.; Henry, S. [CANMET Energy Technology Centre, Natural Resources, Ottawa, Ont. (Canada)

    2008-04-15

    This paper presents the testing of a dynamic on-line whole-building energy calculator. The tool consists of a web-based interface for user inputs; an application to create the simulation input files from these user inputs; a simulation engine; and an application for passing the simulation engine output back to the interface and user. A detailed test protocol, composed of three parts, was developed as part of the software development process for quality assurance purposes. This paper will present the tasks specific to the development of the simulation engine, including, the definition of the required user inputs, the creation of default house archetypes, and the definition of the results to be presented to the user. It will also investigate the three parts of the test plan as well as the task automation tools developed to facilitate the testing. The use of these tools proved very useful given the large number of combinations of user inputs at the web interface and input files to the simulation engine. The findings show the importance of having a detailed and comprehensive test protocol during the software development phase. (author)