WorldWideScience

Sample records for perimeter security advisor

  1. Perimeter security for Minnesota correctional facilities

    Energy Technology Data Exchange (ETDEWEB)

    Crist, D. [Minnesota Department of Corrections, St. Paul, MN (United States); Spencer, D.D. [Sandia National Labs., Albuquerque, NM (United States)

    1996-12-31

    For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned new construction at other facilities.

  2. Airport Perimeter Security Advisor, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The aviation system of the United States of America is one of our national treasures. Very few elements of our culture capture the America spirit like aviation. Air...

  3. Fiber-optic perimeter security system based on WDM technology

    Science.gov (United States)

    Polyakov, Alexandre V.

    2017-10-01

    Intelligent underground fiber optic perimeter security system is presented. Their structure, operation, software and hardware with neural networks elements are described. System allows not only to establish the fact of violation of the perimeter, but also to locate violations. This is achieved through the use of WDM-technology division spectral information channels. As used quasi-distributed optoelectronic recirculation system as a discrete sensor. The principle of operation is based on registration of the recirculation period change in the closed optoelectronic circuit at different wavelengths under microstrain exposed optical fiber. As a result microstrain fiber having additional power loss in a fiber optical propagating pulse, which causes a time delay as a result of switching moments of the threshold device. To separate the signals generated by intruder noise and interference, the signal analyzer is used, based on the principle of a neural network. The system detects walking, running or crawling intruder, as well as undermining attempts to register under the perimeter line. These alarm systems can be used to protect the perimeters of facilities such as airports, nuclear reactors, power plants, warehouses, and other extended territory.

  4. Fiber optic perimeter system for security in smart city

    Science.gov (United States)

    Cubik, Jakub; Kepak, Stanislav; Nedoma, Jan; Fajkus, Marcel; Zboril, Ondrej; Novak, Martin; Jargus, Jan; Vasinek, Vladimir

    2017-10-01

    Protection of persons and assets is the key challenge of Smart City safeguards technologies. Conventional security technologies are often outdated and easy to breach. Therefore, new technologies that could complement existing systems or replace them are developed. The use of optical fibers and their subsequent application in sensing is a trend of recent years. This article discusses the use of fiber-optic sensors in perimeter protection. The sensor consists of optical fibers and couplers only and being constructed without wires and metal parts bring many advantages. These include an absence of interference with electromagnetic waves, system presence can be difficult to detect as well as affect its operation. Testing installation of perimeter system was carried out under reinforced concrete structure. Subjects walked over the bridge at different speeds and over the different routes. The task for the system was an absolute detection of all subjects. The proposed system should find application mainly in areas with the presence of volatile substances, strong electromagnetic fields, or in explosive areas.

  5. Knowledge-based computer security advisor

    International Nuclear Information System (INIS)

    Hunteman, W.J.; Squire, M.B.

    1991-01-01

    The rapid expansion of computer security information and technology has included little support to help the security officer identify the safeguards needed to comply with a policy and to secure a computing system. This paper reports that Los Alamos is developing a knowledge-based computer security system to provide expert knowledge to the security officer. This system includes a model for expressing the complex requirements in computer security policy statements. The model is part of an expert system that allows a security officer to describe a computer system and then determine compliance with the policy. The model contains a generic representation that contains network relationships among the policy concepts to support inferencing based on information represented in the generic policy description

  6. Network perimeter security building defense in-depth

    CERN Document Server

    Riggs, Cliff

    2003-01-01

    PREFACEWho is this Book For?The Path to Network SecurityWho Should Read This Book?MANAGING NETWORK SECURITYThe Big Picture: Security Policies from A to ZAdministrative CountermeasuresPhysical CountermeasuresTechnological CountermeasuresCreating the Security Standards DocumentCreating the Configuration Guide DocumentPulling it All Together: Sample Security Policy CreationProteris Security Standards and ProceduresTHE NETWORK STACK AND SECURITYConnecting the NetworkProtocolsServers and HostsCRYPTOGRAPHY AND VPN TERMINOLOGYKeysCertificatesHashingDigital SignaturesCommon Encryption AlgorithmsSplit

  7. Hardware implementation of adaptive filtering using charge-coupled devices. [For perimeter security sensors

    Energy Technology Data Exchange (ETDEWEB)

    Donohoe, G.W.

    1977-01-01

    Sandia Laboratories' Digital Systems Division/1734, as part of its work on the Base and Installation Security Systems (BISS) program has been making use of adaptive digital filters to improve the signal-to-noise ratio of perimeter sensor signals. In particular, the Widrow-Hoff least-mean-squares algorithm has been used extensively. This non-recursive linear predictor has been successful in extracting aperiodic signals from periodic noise. The adaptive filter generates a predictor signal which is subtracted from the input signal to produce an error signal. The value of this error is fed back to the filter to improve the quality of the next prediction. Implementation of the Widrow adaptive filter using a Charge-Coupled Device tapped analog delay line, analog voltage multipliers and operational amplifiers is described. The resulting filter adapts to signals with frequency components as high as several megahertz.

  8. Fire Perimeters

    Data.gov (United States)

    California Natural Resource Agency — The Fire Perimeters data consists of CDF fires 300 acres and greater in size and USFS fires 10 acres and greater throughout California from 1950 to 2003. Some fires...

  9. Wireless Sensor Buoys for Perimeter Security of Military Vessels and Seabases

    Science.gov (United States)

    2015-12-01

    two decades have demonstrated that attacks of this type are indeed possible, and that current security measures may not be sufficient to mitigate such...attack by small surface crafts. The past two decades have demonstrated that attacks of this type are indeed possible, and that current security measures ...xiii LIST OF ACRONYMS AND ABBREVIATIONS ADAPT AP ARA AT/FP COTS DARPA DOD DODINST EF-21 GPS GUI IEEE ISR LCS LiDAR LTE MAC MAGTF

  10. Team of Advisors: The Social Science of Advice in Homeland and National Security

    Science.gov (United States)

    2017-03-01

    choice they have to make.”19 While these biases are subconscious and unavoidable, they cannot serve as a crutch to explain away quick, uninformed or...eradicate the influence of biases and heuristics as described by Kahneman, leaders can take steps to reduce the risk of these subconscious influences...hidden bias . Advisors play a role in identifying, recognizing and mitigating the risks inherent to subconsciously relying on heuristics. Third, advisors

  11. 75 FR 5609 - Privacy Act of 1974; Department of Homeland Security/ALL-024 Facility and Perimeter Access...

    Science.gov (United States)

    2010-02-03

    ..., date of birth, and social security number. Organization's name; Citizenship; Country of origin, if... servers, magnetic disc, tape, digital media, and CD-ROM. Retrievability: Records may be retrieved by...

  12. Integrated multisensor perimeter detection systems

    Science.gov (United States)

    Kent, P. J.; Fretwell, P.; Barrett, D. J.; Faulkner, D. A.

    2007-10-01

    The report describes the results of a multi-year programme of research aimed at the development of an integrated multi-sensor perimeter detection system capable of being deployed at an operational site. The research was driven by end user requirements in protective security, particularly in threat detection and assessment, where effective capability was either not available or prohibitively expensive. Novel video analytics have been designed to provide robust detection of pedestrians in clutter while new radar detection and tracking algorithms provide wide area day/night surveillance. A modular integrated architecture based on commercially available components has been developed. A graphical user interface allows intuitive interaction and visualisation with the sensors. The fusion of video, radar and other sensor data provides the basis of a threat detection capability for real life conditions. The system was designed to be modular and extendable in order to accommodate future and legacy surveillance sensors. The current sensor mix includes stereoscopic video cameras, mmWave ground movement radar, CCTV and a commercially available perimeter detection cable. The paper outlines the development of the system and describes the lessons learnt after deployment in a pilot trial.

  13. Perimeter intrusion sensors

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1977-01-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  14. Fire Perimeters (2012)

    Data.gov (United States)

    Department of Homeland Security — The Geospatial Multi-Agency Coordination Group, or GeoMAC, is an internet-based mapping tool originally designed for fire managers to access online maps of current...

  15. 17 CFR 4.14 - Exemption from registration as a commodity trading advisor.

    Science.gov (United States)

    2010-04-01

    ... a commodity trading advisor. 4.14 Section 4.14 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION COMMODITY POOL OPERATORS AND COMMODITY TRADING ADVISORS General Provisions, Definitions and Exemptions § 4.14 Exemption from registration as a commodity trading advisor. This section is...

  16. Fragmentation of percolation cluster perimeters

    Science.gov (United States)

    Debierre, Jean-Marc; Bradley, R. Mark

    1996-05-01

    We introduce a model for the fragmentation of porous random solids under the action of an external agent. In our model, the solid is represented by a bond percolation cluster on the square lattice and bonds are removed only at the external perimeter (or `hull') of the cluster. This model is shown to be related to the self-avoiding walk on the Manhattan lattice and to the disconnection events at a diffusion front. These correspondences are used to predict the leading and the first correction-to-scaling exponents for several quantities defined for hull fragmentation. Our numerical results support these predictions. In addition, the algorithm used to construct the perimeters reveals itself to be a very efficient tool for detecting subtle correlations in the pseudo-random number generator used. We present a quantitative test of two generators which supports recent results reported in more systematic studies.

  17. Nuclear-power-plant perimeter-intrusion alarm systems

    International Nuclear Information System (INIS)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981

  18. 78 FR 27444 - Forum Investment Advisors, LLC, et al.;

    Science.gov (United States)

    2013-05-10

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30507; 812-13915] Forum Investment Advisors, LLC, et al.; Notice of Application May 6, 2013. AGENCY: Securities and Exchange Commission (``Commission''). ACTION: Notice of an application for an order under section 6(c) of the...

  19. Safety review advisor

    International Nuclear Information System (INIS)

    Boshers, J.A.; Uhrig, R.E.; Alguindigue, I.A.; Burnett, C.G.

    1991-01-01

    The University of Tennessee's Nuclear Engineering department, in cooperation with the Tennessee Valley Authority (TVA), is evaluating the feasibility of utilizing an expert system to aid in 10CFR50.59 evaluations. This paper discusses the history of 10CFR50.59 reviews, and details the development approach used in the construction of a prototype Safety Review Advisor (SRA). The goals for this expert system prototype are to aid the engineer in the evaluation process by directing his attention to the appropriate critical issues, increase the efficiency, consistency, and thoroughness of the evaluation process, and provide a foundation of appropriate Safety Analysis Report (SAR) references for the reviewer

  20. Safety review advisor

    International Nuclear Information System (INIS)

    Boshers, J.A.; Alguindigue, I.E.; Uhrig, R.E.

    1989-01-01

    The University of Tennessee's Nuclear Engineering Department, in cooperation with the Tennessee Valley Authority (TVA), is evaluating the feasibility of utilizing an expert system to aid in 10CFR50.59 evaluations. This paper discusses the history of 10CFR50.59 reviews, and details the development approach used in the construction of a prototype Safety Review Advisor (SRA). The goals for this expert system prototype are to (1) aid the engineer in the evaluation process by directing his attention to the appropriate critical issues, (2) increase the efficiency, consistency, and thoroughness of the evaluation process, and (3) provide a foundation of appropriate Safety Analysis Report (SAR) references for the reviewer. 6 refs., 2 figs

  1. 78 FR 46381 - Calamos Advisors LLC and Calamos ETF Trust; Notice of Application

    Science.gov (United States)

    2013-07-31

    ... Advisors LLC and Calamos ETF Trust; Notice of Application July 24, 2013. AGENCY: Securities and Exchange... sections 12(d)(1)(A) and (B) of the Act. Applicants: Calamos Advisors LLC (``Adviser'') and Calamos ETF... series of the Trust will be the Calamos Focus Growth ETF (the ``Initial Fund''), the investment objective...

  2. 77 FR 5585 - Northwestern Mutual Series Fund, Inc. and Mason Street Advisors, LLC; Notice of Application

    Science.gov (United States)

    2012-02-03

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29939; File No. 812-13982] Northwestern Mutual Series Fund, Inc. and Mason Street Advisors, LLC; Notice of Application January 30, 2012... instruments. Applicants: Northwestern Mutual Series Fund, Inc. (``Company'') and Mason Street Advisors, LLC...

  3. Historical Fire Perimeters - Southern California [ds384

    Data.gov (United States)

    California Natural Resource Agency — CDF, USDA Forest Service Region 5, BLM, NPS, Contract Counties and other agencies jointly maintain a comprehensive fire perimeter GIS layer for public and private...

  4. The Advisor Quality Survey: Good College Advisors Are Available, Knowledgeable, and Autonomy Supportive

    Science.gov (United States)

    Sheldon, Kennon M.; Garton, Bryan; Orr, Rachael; Smith, Amy

    2015-01-01

    Most US institutions of higher education do not assess advisor quality. We report a scale development effort informed by the developmental prescriptions of self-determination theory (Deci & Ryan, 1985, 2000). The 15-item Missouri Advisor Quality Survey assesses advisor knowledge, advisor availability, and advisor autonomy supportiveness.…

  5. Design and evaluation of the ReKon : an integrated detection and assessment perimeter system.

    Energy Technology Data Exchange (ETDEWEB)

    Dabling, Jeffrey Glenn; Andersen, Jason Jann; McLaughlin, James O. [Stonewater Control Systems, Inc., Kannapolis, NC

    2013-02-01

    Kontek Industries (Kannapolis, NC) and their subsidiary, Stonewater Control Systems (Kannapolis, NC), have entered into a cooperative research and development agreement with Sandia to jointly develop and evaluate an integrated perimeter security system solution, one that couples access delay with detection and assessment. This novel perimeter solution was designed to be configurable for use at facilities ranging from high-security military sites to commercial power plants, to petro/chemical facilities of various kinds. A prototype section of the perimeter has been produced and installed at the Sandia Test and Evaluation Center in Albuquerque, NM. This prototype system integrated fiber optic break sensors, active infrared sensors, fence disturbance sensors, video motion detection, and ground sensors. This report documents the design, testing, and performance evaluation of the developed ReKon system. The ability of the system to properly detect pedestrian or vehicle attempts to bypass, breach, or otherwise defeat the system is characterized, as well as the Nuisance Alarm Rate.

  6. Nuclear power plant security systems - The need for upgrades

    International Nuclear Information System (INIS)

    Murskyj, M.P.; Furlow, C.H.

    1989-01-01

    Most perimeter security systems for nuclear power plants were designed and installed in the late 1970s or early 1980s. This paper explores the need to regularly evaluate and possibly upgrade a security system in the area of perimeter intrusion detection and surveillance. this paper discusses US Nuclear Regulatory Commission audits and regulatory effectiveness reviews (RERs), which have raised issues regarding the performance of perimeter security systems. The audits and RERs identified various degrees of vulnerability in certain aspects of existing perimeter security systems. In addition to reviewing the regulatory concerns, this paper discusses other reasons to evaluate and/or upgrade a perimeter security system

  7. 76 FR 18383 - Extension of Sunset Date for Attorney Advisor Program

    Science.gov (United States)

    2011-04-04

    ... Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY INFORMATION: Electronic Version The... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2009-0048] RIN 0960-AH05 Extension of Sunset Date for Attorney Advisor Program AGENCY: Social Security Administration. ACTION: Final...

  8. ACADEMIC ADVISORS: VALUES EDUCATED LEADERS

    Directory of Open Access Journals (Sweden)

    Brizeida Mijares

    2008-07-01

    Full Text Available The purpose of this article is to study the academic advisors’ profile from the attitudes in the learning process view point, being the center of which the need that as an educator, the advisor has to be a leader educated in values. The research was documental, according to the theoretical contributions of Arana and Batista (2006,  Ortega and Minguez (2001 and Denis (2000, among others. It is concluded that an academic advisor in values allows individual and collective trasnformation and an education without values as its center, it is a hollow and useless education.

  9. 21 CFR 886.1605 - Perimeter.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Perimeter. 886.1605 Section 886.1605 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL DEVICES... or manual device intended to determine the extent of the peripheral visual field of a patient. The...

  10. Computing nonsimple polygons of minimum perimeter

    NARCIS (Netherlands)

    Fekete, S.P.; Haas, A.; Hemmer, M.; Hoffmann, M.; Kostitsyna, I.; Krupke, D.; Maurer, F.; Mitchell, J.S.B.; Schmidt, A.; Schmidt, C.; Troegel, J.

    2018-01-01

    We consider the Minimum Perimeter Polygon Problem (MP3): for a given set V of points in the plane, find a polygon P with holes that has vertex set V , such that the total boundary length is smallest possible. The MP3 can be considered a natural geometric generalization of the Traveling Salesman

  11. Fire Perimeters - Southern California, Fall 2007 [ds385

    Data.gov (United States)

    California Natural Resource Agency — Southern Callifornia fire perimeters for the Fall 2007 wildfires. The perimeters were assembled from various sources by California Department of Fish and Game (DFG)...

  12. 24 CFR 3285.307 - Perimeter support piers.

    Science.gov (United States)

    2010-04-01

    ... URBAN DEVELOPMENT MODEL MANUFACTURED HOME INSTALLATION STANDARDS Foundations § 3285.307 Perimeter support piers. (a) Piers required at mate-line supports, perimeter piers, and piers at exterior wall...

  13. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  14. 75 FR 33857 - DWS Advisor Funds, et al.; Notice of Application

    Science.gov (United States)

    2010-06-15

    ...''). Applicants state that the DWS Funds of Funds will offer investors a range of investment objectives generally... investment objectives and policies of the Unaffiliated Fund; (b) how the performance of securities purchased... Advisor Funds, et al.; Notice of Application June 9, 2010. AGENCY: Securities and Exchange Commission...

  15. An armored-cable-based fiber Bragg grating sensor array for perimeter fence intrusion detection

    Science.gov (United States)

    Hao, Jianzhong; Dong, Bo; Varghese, Paulose; Phua, Jiliang; Foo, Siang Fook

    2012-01-01

    In this paper, an armored-cable-based optical fiber Bragg grating (FBG) sensor array, for perimeter fence intrusion detection, is demonstrated and some of the field trial results are reported. The field trial was conducted at a critical local installation in Singapore in December 2010. The sensor array was put through a series of both simulated and live intrusion scenarios to test the stability and suitability of operation in the local environmental conditions and to determine its capabilities in detecting and reporting these intrusions accurately to the control station. Such a sensor array can provide perimeter intrusion detection with fine granularity and preset pin-pointing accuracy. The various types of intrusions included aided or unaided climbs, tampering and cutting of the fence, etc. The unique sensor packaging structure provides high sensitivity, crush resistance and protection against rodents. It is also capable of resolving nuisance events such as rain, birds sitting on the fence or seismic vibrations. These sensors are extremely sensitive with a response time of a few seconds. They can be customized for a desired spatial resolution and pre-determined sensitivity. Furthermore, it is easy to cascade a series of such sensors to monitor and detect intrusion events over a long stretch of fence line. Such sensors can be applied to real-time intrusion detection for perimeter security, pipeline security and communications link security.

  16. SPILC: An expert student advisor

    Science.gov (United States)

    Read, D. R.

    1990-01-01

    The Lamar University Computer Science Department serves about 350 undergraduate C.S. majors, and 70 graduate majors. B.S. degrees are offered in Computer Science and Computer and Information Science, and an M.S. degree is offered in Computer Science. In addition, the Computer Science Department plays a strong service role, offering approximately sixteen service course sections per long semester. The department has eight regular full-time faculty members, including the Department Chairman and the Undergraduate Advisor, and from three to seven part-time faculty members. Due to the small number of regular faculty members and the resulting very heavy teaching loads, undergraduate advising has become a difficult problem for the department. There is a one week early registration period and a three-day regular registration period once each semester. The Undergraduate Advisor's regular teaching load of two classes, 6 - 8 semester hours, per semester, together with the large number of majors and small number of regular faculty, cause long queues and short tempers during these advising periods. The situation is aggravated by the fact that entering freshmen are rarely accompanied by adequate documentation containing the facts necessary for proper counselling. There has been no good method of obtaining necessary facts and documenting both the information provided by the student and the resulting advice offered by the counsellors.

  17. System overview and applications of a panoramic imaging perimeter sensor

    International Nuclear Information System (INIS)

    Pritchard, D.A.

    1995-01-01

    This paper presents an overview of the design and potential applications of a 360-degree scanning, multi-spectral intrusion detection sensor. This moderate-resolution, true panoramic imaging sensor is intended for exterior use at ranges from 50 to 1,500 meters. This Advanced Exterior Sensor (AES) simultaneously uses three sensing technologies (infrared, visible, and radar) along with advanced data processing methods to provide low false-alarm intrusion detection, tracking, and immediate visual assessment. The images from the infrared and visible detector sets and the radar range data are updated as the sensors rotate once per second. The radar provides range data with one-meter resolution. This sensor has been designed for easy use and rapid deployment to cover wide areas beyond or in place of typical perimeters, and tactical applications around fixed or temporary high-value assets. AES prototypes are in development. Applications discussed in this paper include replacements, augmentations, or new installations at fixed sites where topological features, atmospheric conditions, environmental restrictions, ecological regulations, and archaeological features limit the use of conventional security components and systems

  18. 78 FR 29399 - ERNY Financial ETF Trust and ERNY Financial Advisors, LLC; Notice of Application

    Science.gov (United States)

    2013-05-20

    ... Financial ETF Trust and ERNY Financial Advisors, LLC; Notice of Application May 13, 2013. AGENCY: Securities... for an exemption from sections 12(d)(1)(A) and (B) of the Act. Applicants: ERNY Financial ETF Trust... ETF (the ``Initial Fund''), the investment objective of which will be to seek long-term capital...

  19. 78 FR 77175 - Catalyst Capital Advisors LLC and Mutual Fund Series Trust; Notice of Application

    Science.gov (United States)

    2013-12-20

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30832; 812-14101] Catalyst... shareholder approval. APPLICANTS: Catalyst Capital Advisors LLC (``CCA'' or the ``Adviser'') and Mutual Fund Series Trust (formerly Catalyst Funds) (the ``Trust''). DATES: Filing Dates: The application was filed on...

  20. 78 FR 69155 - Altegris Advisors, L.L.C., et al.; Notice of Application

    Science.gov (United States)

    2013-11-18

    ... Advisors, L.L.C., et al.; Notice of Application November 12, 2013. AGENCY: Securities and Exchange..., under sections 6(c) and 17(b) of the Act for an exemption from sections 17(a)(1) and (2) of the Act, and under section 6(c) of the Act for an exemption from rule 12d1- 2(a) under the Act. Summary of...

  1. 77 FR 58593 - Factor Advisors, LLC, et al.; Notice of Application

    Science.gov (United States)

    2012-09-21

    ... Factor Advisors (each, an ``Adviser''), and (b) seek investment returns that correspond to the price and... ``ETF,'' an ``investment company,'' a ``fund,'' or a ``trust.'' All marketing materials that describe... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30204; File No. 812-13934...

  2. Senior Media Relations Advisor | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    In addition, the Advisor contributes to the Centre's corporate strategic and ... of media strategies, opportunities, approaches, and initiatives to enhance awareness, ... The job demands strategic thinking and planning skills as well as diplomacy, ...

  3. Residual heat removal system diagnostic advisor

    International Nuclear Information System (INIS)

    Tripp, L.

    1991-01-01

    This paper reports on the Residual Heat Removal System (RHRS) Diagnostic Advisor which is an expert system designed to alert the operators to abnormal conditions that exits in the RHRS and offer advice about the cause of the abnormal conditions. The Advisor uses a combination of rule-based and model-based diagnostic techniques to perform its functions. This diagnostic approach leads to a deeper understanding of the RHRS by the Advisor and consequently makes it more robust to unexpected conditions. The main window of the interactive graphic display is a schematic diagram of the RHRS piping system. When a conclusion about a failed component can be reached, the operator can bring up windows that describe the failure mode of the component and a brief explanation about how the Advisor arrived at its conclusion

  4. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security

    National Research Council Canada - National Science Library

    Ganger, Gregory

    2000-01-01

    This report contains the technical content of a recent funding proposal. In it, we propose a new approach to network security in which each individual device erects its own security perimeter and defends its own critical resources...

  5. Spot and Runway Departure Advisor

    Science.gov (United States)

    Jung, Yoon Chul

    2013-01-01

    The Spot and Runway Departure Advisor (SARDA) is a research prototype of a decision support tool for ATC tower controllers to assist in manging and controlling traffic on the surface of an airport. SARDA employs a scheduler to generate an optimal runway schedule and gate push-back - spot release sequence and schedule that improves efficiency of surface operations. The advisories for ATC tower controllers are displayed on an Electronic Flight Strip (EFS) system. The human-in-the-loop simulation of the SARDA tool was conducted for east operations of Dallas-Ft. Worth International Airport (DFW) to evaluate performance of the SARDA tool and human factors, such as situational awareness and workload. The results indicates noticeable taxi delay reduction and fuel savings by using the SARDA tool. Reduction in controller workload were also observed throughout the scenario runs. The future plan includes modeling and simulation of the ramp operations of the Charlotte International Airport, and develop a decision support tool for the ramp controllers.

  6. Historical Fire Perimeters (2000 to 2011)

    Data.gov (United States)

    Department of Homeland Security — The Geospatial Multi-Agency Coordination Group, or GeoMAC, is an internet-based mapping tool originally designed for fire managers to access online maps of current...

  7. Compensation Services Advisor | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Job Summary The Compensation Services Advisor is accountable for the effective ... Coordinates the annual Performance Review and Assessment System ... by IDRC and the broader financial and social implications of working in Canada. ... in areas such as mortgages, credit and so on to individuals not accustomed to ...

  8. 77 FR 49839 - IndexIQ Advisors LLC and IndexIQ Active ETF Trust; Notice of Application

    Science.gov (United States)

    2012-08-17

    ... Advisors LLC and IndexIQ Active ETF Trust; Notice of Application August 13, 2012. AGENCY: Securities and... IndexIQ Active ETF Trust (the ``Trust''). SUMMARY OF APPLICATION: Applicants request an order that... series, IQ Global Equity Active ETF (``Global Equity ETF''), IQ Global Fixed Income Active ETF (``Global...

  9. 77 FR 66651 - Salient Advisors, L.P. and MarketShares ETF Trust; Notice of Application

    Science.gov (United States)

    2012-11-06

    ... Advisors, L.P. and MarketShares ETF Trust; Notice of Application October 31, 2012 AGENCY: Securities and... ETF Trust (the ``Trust''). Summary of Application: Applicants request an order that permits: (a... statutory trust. The Trust will initially offer one series, the Salient MLP and Energy Infrastructure ETF...

  10. Global Health Security

    Centers for Disease Control (CDC) Podcasts

    2017-09-21

    Dr. Jordan Tappero, a CDC senior advisor on global health, discusses the state of global health security.  Created: 9/21/2017 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID), Center for Global Health (CGH).   Date Released: 9/21/2017.

  11. DAVID: A new video motion sensor for outdoor perimeter applications

    International Nuclear Information System (INIS)

    Alexander, J.C.

    1986-01-01

    To be effective, a perimeter intrusion detection system must comprise both sensor and rapid assessment components. The use of closed circuit television (CCTV) to provide the rapid assessment capability, makes possible the use of video motion detection (VMD) processing as a system sensor component. Despite it's conceptual appeal, video motion detection has not been widely used in outdoor perimeter systems because of an inability to discriminate between genuine intrusions and numerous environmental effects such as cloud shadows, wind motion, reflections, precipitation, etc. The result has been an unacceptably high false alarm rate and operator work-load. DAVID (Digital Automatic Video Intrusion Detector) utilizes new digital signal processing techniques to achieve a dramatic improvement in discrimination performance thereby making video motion detection practical for outdoor applications. This paper begins with a discussion of the key considerations in implementing an outdoor video intrusion detection system, followed by a description of the DAVID design in light of these considerations

  12. Top scientists join Stephen Hawking at Perimeter Institute

    Science.gov (United States)

    Banks, Michael

    2009-03-01

    Nine leading researchers are to join Stephen Hawking as visiting fellows at the Perimeter Institute for Theoretical Physics in Ontario, Canada. The researchers, who include string theorists Leonard Susskind from Stanford University and Asoka Sen from the Harisch-Chandra Research Institute in India, will each spend a few months of the year at the institute as "distinguished research chairs". They will be joined by another 30 scientists to be announced at a later date.

  13. Real-time estimation of wildfire perimeters from curated crowdsourcing

    Science.gov (United States)

    Zhong, Xu; Duckham, Matt; Chong, Derek; Tolhurst, Kevin

    2016-04-01

    Real-time information about the spatial extents of evolving natural disasters, such as wildfire or flood perimeters, can assist both emergency responders and the general public during an emergency. However, authoritative information sources can suffer from bottlenecks and delays, while user-generated social media data usually lacks the necessary structure and trustworthiness for reliable automated processing. This paper describes and evaluates an automated technique for real-time tracking of wildfire perimeters based on publicly available “curated” crowdsourced data about telephone calls to the emergency services. Our technique is based on established data mining tools, and can be adjusted using a small number of intuitive parameters. Experiments using data from the devastating Black Saturday wildfires (2009) in Victoria, Australia, demonstrate the potential for the technique to detect and track wildfire perimeters automatically, in real time, and with moderate accuracy. Accuracy can be further increased through combination with other authoritative demographic and environmental information, such as population density and dynamic wind fields. These results are also independently validated against data from the more recent 2014 Mickleham-Dalrymple wildfires.

  14. Gross anatomy of network security

    Science.gov (United States)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  15. Automated Advice: A Portfolio Management Perspective on Robo-Advisors

    OpenAIRE

    Vukovic, Ana; Bjerknes, Line

    2017-01-01

    In this paper we investigate the predominant robo-advisor model, uncovering that however novel this solution might be, it also relies religiously on imperative contributions to modern portfolio theory that have been made in the past half a century. Despite conforming by and large to passive investment, we find that the slight variations in the methodologies used by robo-advisors introduce significant variability in risk-adjusted returns across the robo-advisor spectrum. Nonetheless, our perfo...

  16. 78 FR 11702 - AdvisorShares Investments, LLC and AdvisorShares Trust; Notice of Application

    Science.gov (United States)

    2013-02-19

    ..., American Wealth Management, Trim Tabs Asset Management, LLC, Rockledge Advisors, LLC, Your Source Financial... of Investment Management, Office of Investment Company Regulation). SUPPLEMENTARY INFORMATION: The... organized as a Delaware statutory trust and is registered under the Act as an open-end management investment...

  17. Russia’s Security Relations with Finland, Norway, and Sweden

    Science.gov (United States)

    2017-09-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. RUSSIA’S SECURITY... RELATIONS WITH FINLAND, NORWAY, AND SWEDEN by Rory J. Hayden September 2017 Thesis Advisor: Mikhail Tsypkin Co-Advisor: David S. Yost...THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of

  18. The role of farm advisors in multifunctional landscapes

    DEFF Research Database (Denmark)

    Vesterager, Jens Peter; Lindegaard, Klaus

    2012-01-01

    This study investigates the influence of farm advisors on farmers decisions regarding Multifunctional landscape commons, a concept covering environmental and landscape values that benefit the public but which depend on farmers management practices. The influence of advisors is analysed by combining...

  19. Senior Enlisted Advisor to the CNGB - The National Guard

    Science.gov (United States)

    ARNG Readiness Home : Leadership : SEA Senior Enlisted Advisor to the CNGB Command Sergeant Major Christopher Kepner Command Sergeant Major Christopher Kepner currently serves as the Senior Enlisted Advisor include the United States Army Sergeants Major Academy, Senior Enlisted Joint Professional Military

  20. 76 FR 823 - Registration of Municipal Advisors

    Science.gov (United States)

    2011-01-06

    ... financial products.\\12\\ For example, as derivatives have developed in the municipal securities market, some... public information regarding the size of the municipal securities derivative market. Estimates of the..., Municipal Derivative Securities--Uses and Valuation 21 (1995) (discussion of revenue bonds). See also...

  1. Hacking Facebook Privacy and Security

    Science.gov (United States)

    2012-08-28

    REPORT Hacking Facebook Privacy and Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: When people talk about hacking and social networks , they’re...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Facebook , Privacy, Security, Social Network Dr. Jeff Duffany (Advisor), Omar Galban...transmit personal information that many people that they dare not do it personally. FACEBOOK PLATFORM Facebook is a popular social networking

  2. Spot and Runway Departure Advisor (SARDA)

    Science.gov (United States)

    Jung, Yoon

    2016-01-01

    Spot and Runway Departure Advisor (SARDA) is a decision support tool to assist airline ramp controllers and ATC tower controllers to manage traffic on the airport surface to significantly improve efficiency and predictability in surface operations. The core function of the tool is the runway scheduler which generates an optimal solution for runway sequence and schedule of departure aircraft, which would minimize system delay and maximize runway throughput. The presentation also discusses the latest status of NASA's current surface research through a collaboration with an airline partner, where a tool is developed for airline ramp operators to assist departure pushback operations. The presentation describes the concept of the SARDA tool and results from human-in-the-loop simulations conducted in 2012 for Dallas-Ft. Worth International Airport and 2014 for Charlotte airport ramp tower.

  3. OTA director to be Clinton's science advisor

    Science.gov (United States)

    Leath, Audrey

    President Clinton has nominated John H. “Jack” Gibbons to be Assistant to the President for Science and Technology, and director of the White House Office of Science and Technology Policy (OSTP). For over a decade, Gibbons has served as director of the Office of Technology Assessment (OTA), a bipartisan research arm of Congress.In nominating Gibbons, Clinton said, “I am delighted to appoint a brilliant scientist and gifted administrator… It is profoundly important that the president have a science advisor who understands science, who understands technology, who understands the practical application of these disciplines to the myriad of problems we face today. And I can tell you that from [Vice-president] Al Gore on down to every other member of Congress I have discussed John Gibbons with, I have hardly ever received more glowing and more consistent recommendations for anyone.”

  4. Thermal performance advisor expert system development

    International Nuclear Information System (INIS)

    McClintock, M.; Hirota, N.; Metzinger, R.

    1991-01-01

    In recent years the electric industry has developed an increased interest in improving efficiency of nuclear power plants. EPRI has embarked upon a research project RP2407, Nuclear Plant Performance Improvements which is designed to address needs in this area. One product of this project has been the Thermal Performance Diagnostic Manual for Nuclear Power Plants (NP-4990P). The purpose of this manual is to provide engineering personnel at nuclear power plants with a consistent way in which to identify thermal performance problems. General Physics is also involved in the development of another computer system called Fossil Thermal Performance Advisor (FTPA) which helps operators improve performance for fossil power plants. FTPA is a joint venture between General Physics and New York State Electric and Gas Company. This paper describes both of these computer systems and uses the FTPA as an interesting comparison that illustrates the considerations required for the development of a computer system that effectively addresses the needs of the users

  5. Data Transfer Advisor with Transport Profiling Optimization

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Liu, Qiang [ORNL; Yun, Daqing [Harrisburg University; Wu, Chase Qishi [New Jersey Institute of Technology; Kettimuthu, R. [Argonne National Laboratory (ANL); Jung, Eun-sung [Argonne National Laboratory (ANL)

    2017-11-01

    The network infrastructures have been rapidly upgraded in many high-performance networks (HPNs). However, such infrastructure investment has not led to corresponding performance improvement in big data transfer, especially at the application layer, largely due to the complexity of optimizing transport control on end hosts. We design and implement ProbData, a PRofiling Optimization Based DAta Transfer Advisor, to help users determine the most effective data transfer method with the most appropriate control parameter values to achieve the best data transfer performance. ProbData employs a profiling optimization based approach to exploit the optimal operational zone of various data transfer methods in support of big data transfer in extreme scale scientific applications. We present a theoretical framework of the optimized profiling approach employed in ProbData as wellas its detailed design and implementation. The advising procedure and performance benefits of ProbData are illustrated and evaluated by proof-of-concept experiments in real-life networks.

  6. Divergence-Measure Fields, Sets of Finite Perimeter, and Conservation Laws

    Science.gov (United States)

    Chen, Gui-Qiang; Torres, Monica

    2005-02-01

    Divergence-measure fields in L∞ over sets of finite perimeter are analyzed. A notion of normal traces over boundaries of sets of finite perimeter is introduced, and the Gauss-Green formula over sets of finite perimeter is established for divergence-measure fields in L∞. The normal trace introduced here over a class of surfaces of finite perimeter is shown to be the weak-star limit of the normal traces introduced in Chen & Frid [6] over the Lipschitz deformation surfaces, which implies their consistency. As a corollary, an extension theorem of divergence-measure fields in L∞ over sets of finite perimeter is also established. Then we apply the theory to the initial-boundary value problem of nonlinear hyperbolic conservation laws over sets of finite perimeter.

  7. Determinants of physical activity promotion by smoking cessation advisors.

    Science.gov (United States)

    Mas, Sébastien; Bernard, Paquito; Gourlan, Mathieu

    2018-05-17

    To investigate the cross-sectional association between personal physical activity (PA) level, Theory of Planned Behavior (TPB) constructs toward PA promotion, and PA promotion behavior among smoking cessation advisors. 149 smoking cessation advisors were invited to complete online questionnaires. Hypotheses were tested using Bayesian path analysis. Attitudes and perceived behavioral control (PBC) of smoking cessation advisors were related to PA promotion intentions; intentions were in turn related to PA promotion behaviors. Advisors' personal PA level was indirectly associated with PA promotion behaviors through PBC and PA promotion intentions. The TPB is a relevant theoretical framework with which to explore determinants of PA promotion behavior among smoking cessation advisors. The PA level of health care professionals may be linked to PA promotion behavior through some TPB constructs. Smoking cessation advisor training should include education on attitude development (e.g., PA benefits on smoking cessation), PBC (e.g., modality of PA prescription) and PA promotion intentions (e.g., goal setting). Smoking cessation advisors should also be encouraged to regularly practice PA in order to improve their PA promotion behaviors. Copyright © 2018 Elsevier B.V. All rights reserved.

  8. Ethical Decision-Making for Homeland Security

    Science.gov (United States)

    2013-09-01

    PhD Thesis Co-Advisor Anders Strindberg, PhD Thesis Co-Advisor Mohammed Hafez, PhD Chair, Department of National Security Affairs...expectations may be deleterious in the long-term, emotionally, psychologically , spiritually , and socially (what we label as moral injury)” (Litz 2009). They...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited ETHICAL DECISION

  9. Marketing advisors and their role for junior gas producers

    International Nuclear Information System (INIS)

    Maffitt, D.W.

    1997-01-01

    The role of marketing advisors in the new deregulated natural gas industry was discussed. These producer-oriented marketing consultants are specialists in providing affordable marketing services to junior gas producers on an 'as-needed' basis. The most important service provided by marketing advisors is helping the client identify management problems, analyze such problems and recommend solutions. Accordingly, the marketing advisor should be independent and objective, with no conflict of interests. He/she should be prepared to invest a lot of time and effort in providing the junior producer with a customized diagnosis of its marketing problems. 5 refs., 3 figs

  10. Marketing advisors and their role for junior gas producers

    Energy Technology Data Exchange (ETDEWEB)

    Maffitt, D.W. [Phoenix Gas Marketing Consultants Inc., Calgary, AB (Canada)

    1997-05-01

    The role of marketing advisors in the new deregulated natural gas industry was discussed. These producer-oriented marketing consultants are specialists in providing affordable marketing services to junior gas producers on an `as-needed` basis. The most important service provided by marketing advisors is helping the client identify management problems, analyze such problems and recommend solutions. Accordingly, the marketing advisor should be independent and objective, with no conflict of interests. He/she should be prepared to invest a lot of time and effort in providing the junior producer with a customized diagnosis of its marketing problems. 5 refs., 3 figs.

  11. Obsessive-Compulsive Homeland Security: Insights from the Neurobiological Security Motivation System

    Science.gov (United States)

    2018-03-01

    HOMELAND SECURITY: INSIGHTS FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM by Marissa D. Madrigal March 2018 Thesis Advisor...FROM THE NEUROBIOLOGICAL SECURITY MOTIVATION SYSTEM 5. FUNDING NUMBERS 6. AUTHOR(S) Marissa D. Madrigal 7. PERFORMING ORGANIZATION NAME(S) AND...how activation of the neurobiological security- motivation system can lead to securitization in response to a security speech act. It explores the model

  12. Programs of the Office of the Science Advisor (OSA)

    Science.gov (United States)

    Office of the Science Advisor provides leadership in cross-Agency science and science policy. Program areas: Risk Assessment, Science and Technology Policy, Human Subjects Research, Environmental Measurement and Modeling, Scientific Integrity.

  13. Thomas Sinks, Director, Office of the Science Advisor

    Science.gov (United States)

    Biography of the Director of the Office of the Science Advisor which is responsible for is responsible for EPA’s human subject research ethics, scientific integrity, and developing cross-agency science policy guidance.

  14. Experience with the shift technical advisor position

    International Nuclear Information System (INIS)

    Melber, B.D.; Olson, J.; Schreiber, R.E.; Winges, L.

    1984-03-01

    The provision of engineering expertise on shift at commercial nuclear power plants has mainly taken the form of the Shift Technical Advisor (STA). This person, acting in a capacity that is part engineer and part operator, is expected to advise the operations crew in the event of an emergency and review plant operating experience during normal circumstances. The position was mandated by the Nuclear Regulatory Commission following the incident at Three Mile Island. This report expands on a growing body of knowledge regarding the effectiveness of the STA. The new data presented here come from interviews with plant personnel and utility officials from nine sites. Researchers from the Pacific Northwest Laboratory (PNL) interviewed plant personnel, including the STA and immediate management, the shift supervisor and management, the training department, and ancillary staff, all of whom affect the intended performance of the STA. The conclusions of the report are that the design of the STA position results in limited contribution during emergencies; more comprehensive ways should be sought to provide the variety and specificity of engineering expertise needed during such times

  15. Experience with the shift technical advisor position

    Energy Technology Data Exchange (ETDEWEB)

    Melber, B.D.; Olson, J.; Schreiber, R.E.; Winges, L.

    1984-03-01

    The provision of engineering expertise on shift at commercial nuclear power plants has mainly taken the form of the Shift Technical Advisor (STA). This person, acting in a capacity that is part engineer and part operator, is expected to advise the operations crew in the event of an emergency and review plant operating experience during normal circumstances. The position was mandated by the Nuclear Regulatory Commission following the incident at Three Mile Island. This report expands on a growing body of knowledge regarding the effectiveness of the STA. The new data presented here come from interviews with plant personnel and utility officials from nine sites. Researchers from the Pacific Northwest Laboratory (PNL) interviewed plant personnel, including the STA and immediate management, the shift supervisor and management, the training department, and ancillary staff, all of whom affect the intended performance of the STA. The conclusions of the report are that the design of the STA position results in limited contribution during emergencies; more comprehensive ways should be sought to provide the variety and specificity of engineering expertise needed during such times.

  16. ADVISOR Users Conference Proceedings 2000 - Final Electronic version

    Energy Technology Data Exchange (ETDEWEB)

    NREL

    2000-09-26

    This is a compilation of papers presented at the ADVISOR (ADvanced Vehicle SimulatOR) Users Conference held in Costa Mesa, California, August 24-25, 2000. Major topics of the conference included modeling and simulation; partnering with the auto industry; co-simulation: partnering with the software industry in optimization and thermal modeling and geometric and mechanical modeling; forward-looking simulations coupled with ADVISOR; new concepts from universities; validation, vehicle development and applications.

  17. Current Density Distribution on the Perimeter of Waveguide Exciter Cylindrical Vibrator Conductor

    OpenAIRE

    Zakharia, Yosyp

    2010-01-01

    On ground of electrodynamic analysis the surface current distribution nonuniformity on the perimeter of waveguide-exciter cylindrical conductor is found. Considerable influence of current distribution nonuniformity on exciter input reactance is established. It is also showed, that the current distribution on the vibrator perimeter, for conductor radius no greater then 0,07 of waveguide cross section breadth, approximately uniform is.

  18. Numerical quantification and minimization of perimeter losses in high-efficiency silicon solar cells

    Energy Technology Data Exchange (ETDEWEB)

    Altermatt, P.P.; Heiser, Gernot; Green, M.A. [New South Wales Univ., Kensington, NSW (Australia)

    1996-09-01

    This paper presents a quantitative analysis of perimeter losses in high-efficiency silicon solar cells. A new method of numerical modelling is used, which provides the means to simulate a full-sized solar cell, including its perimeter region. We analyse the reduction in efficiency due to perimeter losses as a function of the distance between the active cell area and the cut edge. It is shown how the optimum distance depends on whether the cells in the panel are shingled or not. The simulations also indicate that passivating the cut-face with a thermal oxide does not increase cell efficiency substantially. Therefore, doping schemes for the perimeter domain are suggested in order to increase efficiency levels above present standards. Finally, perimeter effects in cells that remain embedded in the wafer during the efficiency measurement are outlined. (author)

  19. The North Atlantic Treaty Organization and the European Union’s Common Security and Defense Policy: Intersecting Trajectories

    Science.gov (United States)

    2011-07-01

    Lieutenant General, Canadian Forces, Canadian Military Repre- sentative to NATO Elizabeth Race, Deputy Defence Policy Advisor, Canadian Joint...Ruehle, Head, Energy Security Section, Emerging Security Challenges Division, NATO ( Brus - sels) Patrick Nash, Lieutenant General, Irish Army, for- mer

  20. Data fusion concept in multispectral system for perimeter protection of stationary and moving objects

    Science.gov (United States)

    Ciurapiński, Wieslaw; Dulski, Rafal; Kastek, Mariusz; Szustakowski, Mieczyslaw; Bieszczad, Grzegorz; Życzkowski, Marek; Trzaskawka, Piotr; Piszczek, Marek

    2009-09-01

    The paper presents the concept of multispectral protection system for perimeter protection for stationary and moving objects. The system consists of active ground radar, thermal and visible cameras. The radar allows the system to locate potential intruders and to control an observation area for system cameras. The multisensor construction of the system ensures significant improvement of detection probability of intruder and reduction of false alarms. A final decision from system is worked out using image data. The method of data fusion used in the system has been presented. The system is working under control of FLIR Nexus system. The Nexus offers complete technology and components to create network-based, high-end integrated systems for security and surveillance applications. Based on unique "plug and play" architecture, system provides unmatched flexibility and simplistic integration of sensors and devices in TCP/IP networks. Using a graphical user interface it is possible to control sensors and monitor streaming video and other data over the network, visualize the results of data fusion process and obtain detailed information about detected intruders over a digital map. System provides high-level applications and operator workload reduction with features such as sensor to sensor cueing from detection devices, automatic e-mail notification and alarm triggering.

  1. 75 FR 26815 - AdvisorShares Investments, LLC and AdvisorShares Trust; Notice of Application

    Science.gov (United States)

    2010-05-12

    ... replace any Deposit Security or Redemption Security that is a to-be-announced transaction (``TBA Transaction''). A TBA transaction is a method of trading mortgage-backed securities. In a TBA Transaction, the... amount of substituted cash in the case of TBA Transactions will be equivalent to the value of the TBA...

  2. Knowledge representation and knowledge base design for operator advisor system

    International Nuclear Information System (INIS)

    Hangos, K.M.; Sziano, T.; Tapolcai, L.

    1990-01-01

    The problems of knowledge representation, knowledge base handling and design has been described for an Operator Advisor System in the Paks Nuclear Power Plant. The Operator Advisor System is to be implemented as a part of the 5th and 6th unit. The knowledge of the Operator Advisor system is described by a few elementary knowledge items (diagnostic event functions, fault graph, action trees), weighted directed graphs have been found as their common structure. List-type and relational representation of these graphs have been used for the on-line and off-line part of the knowledge base respectively. A uniform data base design and handling has been proposed which consists of a design system, a knowledge base editor and a knowledge base compiler

  3. Solar Advisor Model User Guide for Version 2.0

    Energy Technology Data Exchange (ETDEWEB)

    Gilman, P.; Blair, N.; Mehos, M.; Christensen, C.; Janzou, S.; Cameron, C.

    2008-08-01

    The Solar Advisor Model (SAM) provides a consistent framework for analyzing and comparing power system costs and performance across the range of solar technologies and markets, from photovoltaic systems for residential and commercial markets to concentrating solar power and large photovoltaic systems for utility markets. This manual describes Version 2.0 of the software, which can model photovoltaic and concentrating solar power technologies for electric applications for several markets. The current version of the Solar Advisor Model does not model solar heating and lighting technologies.

  4. The Home, the Family and the Energy Advisor

    DEFF Research Database (Denmark)

    Tjørring, Lise

    within. The empirical focus is on the households' potential to perform energy renovations of their homes and adopt flexible electricity use. Four papers investigate what characterises the social and gendered engagements among the home, the family and the energy advisor and the implications...... events, social relations, historical conditions and social status. These findings call for new methods to increase the number of energy renovations and the likelihood of adopting flexible electricity use. We must focus on the home not only as a technical issue that can be improved but also as a dwelling...... space that contains gendered practices, cultural norms and social engagements among the home, the family and the energy advisor....

  5. 33 CFR 1.05-5 - Marine Safety and Security Council.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Marine Safety and Security... SECURITY GENERAL GENERAL PROVISIONS Rulemaking § 1.05-5 Marine Safety and Security Council. The Marine Safety and Security Council, composed of senior Coast Guard officials, acts as policy advisor to the...

  6. An Iraq C-130 Aviation Advisor Mission and Lessons for the Future

    National Research Council Canada - National Science Library

    Bauer, Michael J

    2007-01-01

    .... A review of lessons learned from the initial Iraq C-130 advisor mission provided insights into challenges stemming from differences in United States advisors and Iraqi airmen in language, culture...

  7. The American Military Advisor: Dealing with Senior Foreign Officials in the Islamic World

    National Research Council Canada - National Science Library

    Metrinko, Michael J

    2008-01-01

    "The American Military Advisor: Dealing with Senior Foreign Officials in the Islamic World" is a comprehensive guide for American military officers assigned as advisors to regional officials in places very different from the United States...

  8. Environmental Assessment for Perimeter Security Lighting at Fort MacArthur, California

    Science.gov (United States)

    2007-07-01

    8217J lOft pPm ifllti" ~ r- IVf $ 10~11)’ \\Qiume, or l!lO’Cm)lesOI j:""-t.-m! pE"f m;::le of gas. • ~ tQUI•<tlii:I I)IOC:tdtlr• ""lidl Wlbt $00l’l𔃻ll0...defines the appropriate styles, finishes, and materials to be used to achieve the best facility life-cycle costs . An objective of the plan is to

  9. Ukraine-Japanese-Swedish project: Upgrading of perimeter protection system at Kharkov Institute of Physics and Technology (KIPT)

    International Nuclear Information System (INIS)

    Mikahaylov, V.; Lapshin, V.; Ek, P.; Flyghed, L.; Nilsson, A.; Ooka, N.; Shimizu, K.; Tanuma, K.

    2001-01-01

    Full text: Since the Ukraine voluntarily accepted the status of a non-nuclear-weapons state and concluded a Safeguards Agreement with the IAEA, the Kharkov Institute of Physics and Technology (KIPT) as a nuclear facility using the nuclear material of category 1, has become a Ukrainian priority object for the international community's efforts to ensure nuclear non-proliferation measures and to bring the existing protection systems to the generally accepted security standards. In March 1996, at the meeting held under the auspices of the IAEA in Kiev, the representatives from Japan, Sweden and the USA agreed to provide technical assistance concerning improvement of the nuclear material accountancy and control and physical protection system (MPC and A) available at KIPT. The Technical Secretariat of the Japan-Ukraine Committee for Co-operation on Reducing Nuclear Weapons and Swedish Nuclear Power Inspectorate undertook to solve the most expensive and labour-consuming task namely, the upgrading of the perimeter protection system at KIPT. This included that the current perimeter system, comprising several kilometers, should be completely replaced. Besides the above-mentioned problem, the upgrading should be carried out with the institute in operation. Thus, it was not allowed to replace the existing protection system by a new one unless KIPT was constantly protected. This required the creation of a new protected zone that to a large extent was occupied by the communication equipment, buildings, trees and other objects interfering with the work. All these difficulties required very comprehensive development of the project design as well as a great deal of flexibility during the implementation of the project. These problems were all successfully resolved thanks to a well working project organization, composed of experts from KIPT, JAERI and ANS, involving the highly qualified Swedish technical experts who played a leading role. In the framework of implementation of the

  10. TEACHER-ADVISORS: Where There's a Skill There's A Way.

    Science.gov (United States)

    Tamminen, Armas; And Others

    This report discusses a program to present the Teacher Advisement Training Model. This model for training teacher-advisors is based on the assumption that tentative commitment to making school a more rewarding experience for all is the first step in starting an effective program. The approach is to help teachers learn specific skills and methods…

  11. The perceived roles and functions of school science subject advisors

    African Journals Online (AJOL)

    The science subject advisor can play an important role in upgrading ... literature study highlighted practices in the UK and the US that are ... South Africa has recently adopted a strate- ... (North West Province) felt that a solution to their teaching problems ..... teachers, clustering of schools, practical work, cross teaching,.

  12. Trends in Defamation Law: Let the Advisor Beware.

    Science.gov (United States)

    King, Robert D.

    1992-01-01

    Although most lawsuits brought by students against a college are grounded on contract and due process theories, courts have been willing to consider students' defamation suits using tort theories. Recent changes in defamation law have engendered increased litigation and risk of liability for faculty and advisors. (Author/MSE)

  13. Design and Implementation of an Experimental Cataloging Advisor--Mapper.

    Science.gov (United States)

    Ercegovac, Zorana; Borko, Harold

    1992-01-01

    Describes the design of an experimental computer-aided cataloging advisor, Mapper, that was developed to help novice users with the descriptive cataloging of single-sheet maps from U.S. publishers. The human-computer interface is considered, the use of HyperCard is discussed, the knowledge base is explained, and assistance screens are described.…

  14. LIA: An Intelligent Advisor for E-Learning

    Science.gov (United States)

    Capuano, Nicola; Gaeta, Matteo; Marengo, Agostino; Miranda, Sergio; Orciuoli, Francesco; Ritrovato, Pierluigi

    2009-01-01

    Intelligent e-learning systems have revolutionized online education by providing individualized and personalized instruction for each learner. Nevertheless, until now very few systems were able to leave academic laboratories and be integrated into real commercial products. One of these few exceptions is the Learning Intelligent Advisor (LIA)…

  15. The Use of Images in Intelligent Advisor Systems.

    Science.gov (United States)

    Boulet, Marie-Michele

    This paper describes the intelligent advisor system, named CODAMA, used in teaching a university-level systems analysis and design course. The paper discusses: (1) the use of CODAMA to assist students to transfer theoretical knowledge to the practical; (2) details of how CODAMA is applied in conjunction with a computer-aided software engineering…

  16. Training Mentors as Educational Advisors for Adult Learners. Process Manual.

    Science.gov (United States)

    Singer, Elizabeth W.

    Materials used by the director of a project designed to assist key personnel in businesses, industries, and agencies with the educational counseling of their employees are presented. The objectives of the project, "Training Mentors as Educational Advisors of Adult Learners," were to: (1) provide two training sessions in educational…

  17. Risk Management in College Fraternities: Guidance from Two Faculty Advisors

    Science.gov (United States)

    Rosenberg, Stuart; Mosca, Joseph

    2016-01-01

    Students who become members of fraternities and sororities avail themselves of significant opportunities that enrich their college life. Faculty advisors play an important role in assisting fraternities and sororities in shaping students' leadership, scholastic, and personal development. Given the risks such as alcohol use and hazing that continue…

  18. Secure Audit Logging with Tamper-Resistant Hardware

    NARCIS (Netherlands)

    Chong, C.N.; Peng, Z.; Peng, Z.; Hartel, Pieter H.; Gritzalis, D.; De Capitani di Vimercati, S.; Katsikas, S.K.; Samarati, P.

    Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights holder. Secure audit logging records the user's actions on content and enables detection of some forms of tampering with

  19. The Advisor and Instructor as a Dynamic Duo: Academic Motivation and Basic Psychological Needs

    Science.gov (United States)

    Burt, Tracie D.; Young-Jones, Adena D.; Yadon, Carly A.; Carr, Michael T.

    2013-01-01

    Students learn in and out of a formal classroom, and instructors and academic advisors play key roles in academic motivation and learning. Therefore, through the lens of self-determination theory, we examined the ways perceived support from instructors and advisors relates to satisfaction of college students' basic psychological needs. Advisor and…

  20. 75 FR 51609 - Classified National Security Information Program for State, Local, Tribal, and Private Sector...

    Science.gov (United States)

    2010-08-23

    ... within that agency. Sec. 2. Policy Direction. With policy guidance from the National Security Advisor and... of other agencies and representatives of SLTPS entities, as nominated by any Committee member and...

  1. P50/P90 Analysis for Solar Energy Systems Using the System Advisor Model: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Dobos, A. P.; Gilman, P.; Kasberg, M.

    2012-06-01

    To secure competitive financing for a solar energy generation project, the economic risk associated with interannual solar resource variability must be quantified. One way to quantify this risk is to calculate exceedance probabilities representing the amount of energy expected to be produced by a plant. Many years of solar radiation and metereological data are required to determine these values, often called P50 or P90 values for the level of certainty they represent. This paper describes the two methods implemented in the National Renewable Energy Laboratory's System Advisor Model (SAM) to calculate P50 and P90 exceedance probabilities for solar energy projects. The methodology and supporting data sets are applicable to photovoltaic, solar water heating, and concentrating solar power (CSP) systems.

  2. Saudi Arabia’s Counterterrorism Methods: A Case Study on Homeland Security

    Science.gov (United States)

    2017-06-01

    Approved for public release. Distribution is unlimited. SAUDI ARABIA’S COUNTERTERRORISM METHODS: A CASE STUDY ON HOMELAND SECURITY Majed M...examined in the previous chapter with examples from the case studies related to terrorist attacks and Saudi Arabia’s responses. Furthermore, the...COUNTERTERRORISM METHODS: A CASE STUDY ON HOMELAND SECURITY by Majed M. Bin Madhian June 2017 Thesis Advisor: James Russell Co-Advisor

  3. Training need analysis for energy efficiency advisors and data bank of available training programs (9255 U 965)

    International Nuclear Information System (INIS)

    Lail, K.S.

    1995-01-01

    Development of a skill profile for an 'energy efficiency advisor' position, and production of a data base of available training programs undertaken by the Power Acquisition department of B.C. Hydro, were described. Driving forces for products and services at competitive prices and transition factors crucial to successful market positioning were outlined, along with future plans for securing a foothold in British Columbia. Desirable market oriented management principles and dynamic competitive marketing strategies were noted. It was concluded that the progression toward market-based dynamics would make changes occur more quickly and would require the introduction of tailored products and services

  4. Urban Design Dimension Of Informality At The Perimeter Of Brawijaya University And UIN Maliki Malang

    Directory of Open Access Journals (Sweden)

    Tyaghita Cesarin Binar

    2018-01-01

    Full Text Available Informality is one of the commonly emerged issues in urban design which rarely explored, especially informality within university’s perimeter. Brawijaya as one of the biggest and oldest University in Malang over time has boosted the development of several of its perimeter, provided several hotspots for students and youth. These rapid hotspots growth is related to the growth of informal practices. For cities that developed by its universities, it is necessary to understand both of the formal and informal practices within its perimeter. Through this study I would like to know the characteristic of informality within university perimeter, which formed by Brawijaya, UIN Maliki, and ITN; and to frame it within Carmona’s Urban Design Dimension. Mapping is utilized as a primary method to analyze both formal and informality within site. The formal aspect consists of formal activities, function and site user. While informality mapper consists of street vendors and street art. The research found that while urban informality within Brawijaya and UIN Maliki are related to the character and morphology, its formal structure has; its relation is reciprocal. The morphological, visual and functional dimension of university perimeter is driven by the social, perceptual and temporal dimension formed by its user and showed through informality.

  5. Determination of a BNI perimeter. Guide nr 9, Release of the 2013/10/31

    International Nuclear Information System (INIS)

    2013-01-01

    This guide specifies modalities of definition of the perimeter of a BNI (basic nuclear installation), and elements of assessment of criteria for the inclusion of installations, works and equipment within this perimeter, in compliance with legal measures specified in the French Code of the Environment and in various decrees. It first proposes an overview of the concerned articles in these legal texts, and notices some articulation with other legal texts which do not address nuclear issues. It specifies the various criteria of definition of a BNI perimeter by distinguishing installations, works and equipment under the responsibility of the operator and needed for the BNI exploitation, and installations, works and equipment not needed for the BNI exploitation but under the responsibility of the operator and susceptible to modify risks or inconveniences of the BNI. It addresses some peculiar situations: effluent processing installations and plants, control piezometers, the dredging of water and release sampling works, underground or underwater installations, and some specific departments (medicine, laundry, and so on). It outlines some important aspects of the procedure of modification of a BNI perimeter. An appendix addresses the methodology related to the inclusion of installations, equipment or works within the perimeter

  6. Experimental study of abdominal CT scanning exposal doses adjusted on the basis of pediatric abdominal perimeter

    International Nuclear Information System (INIS)

    Wei Wenzhou; Zhu Gongsheng; Zeng Lingyan; Yin Xianglin; Yang Fuwen; Liu Changsheng

    2006-01-01

    Objective: To optimize the abdominal helical CT scanning parameters in pediatric patients and to reduce its radiation hazards. Methods: 60 canines were evenly grouped into 4 groups on the basis of pediatric abdominal perimeter, scanned with 110,150,190 and 240 mAs, and their qualities of canine CT images were analyzed. 120 pediafric patients with clinic suspected abdominal diseases were divided into 4 groups on the basis of abdominal perimeter, scanned by optimal parameters and their image qualities were analyzed. Results: After CT exposure were reduced, the percentages of total A and B were 90.9 % and 92.0 % in experimental canines and in pediatric patients, respectively. Compared with conventional CT scanning, the exposure and single slice CT dose index weighted (CTDIw) were reduced to 45.8%-79.17%. Conclusion: By adjusted the pediatric helical CT parameters basedon the of pediatric abdominal perimeter, exposure of patient to the hazards of radiation is reduced. (authors)

  7. Intelligent data retrieval in the industry experience advisor expert system

    International Nuclear Information System (INIS)

    Swisshelm, J.D.

    1991-01-01

    ABB Impell Corporation developed a prototype expert system called the Industry Experience Advisor for Florida Power and Light Company. This expert system assists plant engineers in evaluating design changes against previous nuclear industry experience. Previous experience is in the form of root causes or lessons learned of past events. The root-cause statements were developed from an engineering review of important event documents [US Nuclear Regulatory Commission information notices (INs) and information bulletins (IBs) and the Institute of Nuclear Power Operations safety evaluation reports and significant operating experience reports]. This paper describes the project that is currently expanding the prototype into a production system for use at a nuclear plant site. The Industry Experience Advisor should be ready for production release by the end of 1991. It will include knowledge of important events through 1990. In 1992 and in each following year, an update will be released adding the previous year's events

  8. Perspectives on the Science Advisor Program at Sandia National Laboratories

    International Nuclear Information System (INIS)

    Bennett, P.C.; Heath, R.B.; Podlesny, A.; Channon, P.A.

    1992-01-01

    This paper discusses a Science Advisor Program which has been established at Sandia National Laboratories (SNL) for the long term augmentation of math and science instruction in New Mexico schools. Volunteer SNL engineers and scientists team with the faculty of participating schools to enhance the teachers' abilities to capture and hold the student's scientific imagination and develop their scientific skills. This is done primarily through providing laboratory resources, training the teachers how to use those resources, and advising how to obtain them in the future. In its first year, over 140 advisors teamed with 132 schools, for average weekly contact with 500 teachers and 10,000 students. Surveys indicate a general rise in frequency and quality of hands-on science instruction, as well as teacher and student attitudes. An expanded evaluation is planned for subsequent years

  9. Education and training of the shift technical advisor

    International Nuclear Information System (INIS)

    Thomas, E.L.

    1981-01-01

    This paper discusses the background and current approaches for qualifying the required position of Shift Technical Advisor (STA). Industry positions regarding the regulation are given. Problems associated with meeting the requirement are identified, along with a discussion of other alternatives for upgrading the education level of shift management. Inherent in the discussion is the conclusion that voluntary improvements in the training and education of shift management personnel are more effective than mandatory positions or degree requirements

  10. Perimeter generating functions for the mean-squared radius of gyration of convex polygons

    International Nuclear Information System (INIS)

    Jensen, Iwan

    2005-01-01

    We have derived long series expansions for the perimeter generating functions of the radius of gyration of various polygons with a convexity constraint. Using the series we numerically find simple (algebraic) exact solutions for the generating functions. In all cases the size exponent ν 1. (letter to the editor)

  11. Developmental Dyscalculia and Automatic Magnitudes Processing: Investigating Interference Effects between Area and Perimeter

    Directory of Open Access Journals (Sweden)

    Hili Eidlin-Levy

    2017-12-01

    Full Text Available The relationship between numbers and other magnitudes has been extensively investigated in the scientific literature. Here, the objectives were to examine whether two continuous magnitudes, area and perimeter, are automatically processed and whether adults with developmental dyscalculia (DD are deficient in their ability to automatically process one or both of these magnitudes. Fifty-seven students (30 with DD and 27 with typical development performed a novel Stroop-like task requiring estimation of one aspect (area or perimeter while ignoring the other. In order to track possible changes in automaticity due to practice, we measured performance after initial and continuous exposure to stimuli. Similar to previous findings, current results show a significant group × congruency interaction, evident beyond exposure level or magnitude type. That is, the DD group systematically showed larger Stroop effects. However, analysis of each exposure period showed that during initial exposure to stimuli the DD group showed larger Stroop effects in the perimeter and not in the area task. In contrast, during continuous exposure to stimuli no triple interaction was evident. It is concluded that both magnitudes are automatically processed. Nevertheless, individuals with DD are deficient in inhibiting irrelevant magnitude information in general and, specifically, struggle to inhibit salient area information after initial exposure to a perimeter comparison task. Accordingly, the findings support the assumption that DD involves a deficiency in multiple cognitive components, which include domain-specific and domain-general cognitive functions.

  12. Visual field examination method using virtual reality glasses compared with the Humphrey perimeter

    Directory of Open Access Journals (Sweden)

    Tsapakis S

    2017-08-01

    Full Text Available Stylianos Tsapakis, Dimitrios Papaconstantinou, Andreas Diagourtas, Konstantinos Droutsas, Konstantinos Andreanos, Marilita M Moschos, Dimitrios Brouzas 1st Department of Ophthalmology, National and Kapodistrian University of Athens, Athens, Greece Purpose: To present a visual field examination method using virtual reality glasses and evaluate the reliability of the method by comparing the results with those of the Humphrey perimeter.Materials and methods: Virtual reality glasses, a smartphone with a 6 inch display, and software that implements a fast-threshold 3 dB step staircase algorithm for the central 24° of visual field (52 points were used to test 20 eyes of 10 patients, who were tested in a random and consecutive order as they appeared in our glaucoma department. The results were compared with those obtained from the same patients using the Humphrey perimeter.Results: High correlation coefficient (r=0.808, P<0.0001 was found between the virtual reality visual field test and the Humphrey perimeter visual field.Conclusion: Visual field examination results using virtual reality glasses have a high correlation with the Humphrey perimeter allowing the method to be suitable for probable clinical use. Keywords: visual fields, virtual reality glasses, perimetry, visual fields software, smartphone

  13. Swivel arm perimeter for visual field testing in different body positions.

    Science.gov (United States)

    Flammer, J; Hendrickson, P; Lietz, A; Stümpfig, D

    1993-01-01

    To investigate the influence of body position on visual field results, a 'swivel arm perimeter' was built, based on a modified Octopus 1-2-3. Here, the measuring unit was detected from the control unit and mounted on a swivel arm, allowing its movement in all directions. The first results obtained with this device have indicated that its development was worthwhile.

  14. Examining perimeter gating control of urban traffic networkswith locally adaptive traffic signals

    NARCIS (Netherlands)

    Keyvan Ekbatani, M.; Gao, X.; Gayah, V.V.; Knoop, V.L.

    2015-01-01

    Traditionally, urban traffic is controlled by traffic lights. Recent findings of the Macroscopic or Network Fundamental Diagram (MFD or NFD) have led to the development of novel traffic control strategies that can be applied at a networkwide level. One pertinent example is perimeter flow control

  15. Developmental Dyscalculia and Automatic Magnitudes Processing: Investigating Interference Effects between Area and Perimeter.

    Science.gov (United States)

    Eidlin-Levy, Hili; Rubinsten, Orly

    2017-01-01

    The relationship between numbers and other magnitudes has been extensively investigated in the scientific literature. Here, the objectives were to examine whether two continuous magnitudes, area and perimeter, are automatically processed and whether adults with developmental dyscalculia (DD) are deficient in their ability to automatically process one or both of these magnitudes. Fifty-seven students (30 with DD and 27 with typical development) performed a novel Stroop-like task requiring estimation of one aspect (area or perimeter) while ignoring the other. In order to track possible changes in automaticity due to practice, we measured performance after initial and continuous exposure to stimuli. Similar to previous findings, current results show a significant group × congruency interaction, evident beyond exposure level or magnitude type. That is, the DD group systematically showed larger Stroop effects. However, analysis of each exposure period showed that during initial exposure to stimuli the DD group showed larger Stroop effects in the perimeter and not in the area task. In contrast, during continuous exposure to stimuli no triple interaction was evident. It is concluded that both magnitudes are automatically processed. Nevertheless, individuals with DD are deficient in inhibiting irrelevant magnitude information in general and, specifically, struggle to inhibit salient area information after initial exposure to a perimeter comparison task. Accordingly, the findings support the assumption that DD involves a deficiency in multiple cognitive components, which include domain-specific and domain-general cognitive functions.

  16. Tooth angulation and dental arch perimeter-the effect of orthodontic bracket prescription.

    Science.gov (United States)

    Pontes, Luana F; Cecim, Rodolpho L; Machado, Sissy M; Normando, David

    2015-08-01

    The aim of this study was to evaluate the effects of upper incisors and canine angulations introduced by different bracket prescriptions on dental arch perimeter. Cone beam computerized tomography scans collected using I-Cat (Imaging Sciences International, Hatfield, PA, USA) were selected conveniently from a database of routine exams of a clinical radiology center. Crown and radicular measurements of upper incisors and canines were made and exported to the Autocad 2011 software to create a virtual dental model. The virtual teeth were positioned with an angulation of zero; thereafter, a reference value for the perimeter of the arch was measured. Furthermore, teeth angulations were applied according to the standards of the Edgewise bracket system and the Straight-wire systems: MBT, Capelozza, Andrews, and Roth. The largest linear distances for tooth crown (anterior arch perimeter) and root (radicular distance) were obtained for each bracket prescription. The anterior perimeter for well-aligned incisors and canines without angulation was used as reference (crown: 47.34mm; root: 39.13mm). An increase in the arch perimeter was obtained for all bracket prescriptions evaluated, which ranged from 0.28 and 3.19mm in the Edgewise technique, for the crown and root measurements, respectively, to 1.09 and 11.28mm for the Roth prescription. Bracket prescriptions with greater angulation led to an increased use of space within the dental arch, mainly in the radicular region. The consequence of this radicular angular displacement will need to be further investigated. © The Author 2014. Published by Oxford University Press on behalf of the European Orthodontic Society. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  17. Returning to Our Small Wars Roots: Preparing Marine Advisors to Help Other Lands Meet Future Threats

    Science.gov (United States)

    2012-04-26

    1918 uprising. Not surprisingly, the best qualified Marines like Smedley Butler were sent to France, adding to these challenges. When confronted... Robert S. McNamara authorized advisors for each province and advisory teams for each combat battalion. In addition to the increased role advisors...University of Pennsylvania Press, 2009), 51. 17 Ibid, 40. 18 Ibid. 19 Ramsey III, Robert D., Advising Indigenous Forces: American Advisors in

  18. landscaping for passive security and adaptation to climate in church

    African Journals Online (AJOL)

    user

    Man has 10-15 years left to put in place serious measures to start .... 1.2 Adaptation of Man to Climate Change. Adaptation .... 1.4 Physical Security Control Measures and Landscaping ... and enhance the appearance of perimeter fences and.

  19. Convex lattice polygons of fixed area with perimeter-dependent weights.

    Science.gov (United States)

    Rajesh, R; Dhar, Deepak

    2005-01-01

    We study fully convex polygons with a given area, and variable perimeter length on square and hexagonal lattices. We attach a weight tm to a convex polygon of perimeter m and show that the sum of weights of all polygons with a fixed area s varies as s(-theta(conv))eK(t)square root(s) for large s and t less than a critical threshold tc, where K(t) is a t-dependent constant, and theta(conv) is a critical exponent which does not change with t. Using heuristic arguments, we find that theta(conv) is 1/4 for the square lattice, but -1/4 for the hexagonal lattice. The reason for this unexpected nonuniversality of theta(conv) is traced to existence of sharp corners in the asymptotic shape of these polygons.

  20. Security Considerations of Doing Business via the Internet: Cautions To Be Considered.

    Science.gov (United States)

    Aldridge, Alicia; White, Michele; Forcht, Karen

    1997-01-01

    Lack of security is perceived as a major roadblock to doing business online. This article examines system, user, and commercial transaction privacy on the World Wide Web and discusses methods of protection: operating systems security, file and data protection, user education, access restrictions, data authentication, perimeter and transaction…

  1. Comparison of the students’ satisfaction about the performance of academic advisors before and after the advisor project in Shahrekord University of Medical Sciences

    Directory of Open Access Journals (Sweden)

    MASOUMEH DELARAM

    2014-01-01

    Full Text Available Introduction: Inappropriate advice interferes with the students’ achievement of educational and professional goals and they may fail to use proper resources for their educational needs. The present study was carried out to compare the students’ satisfaction about the performance of academic advisors before and after the advisor project in Shahrekord University of Medical Sciences. Methods: This longitudinal study was carried out using census report on 244 students in different courses at Shahrekord University of Medical Sciences in two stages at the first semester of 2010-2011 and first semester of 2011-2012. To collect the data, we used a self-designed questionnaire including individual and educational information and 10 multiple-choice questions with Likert scale to assess the students’ satisfaction about the advisors’ performance. Data were analyzed in SPSS 14 using paired t-test, qui-square test. P<0.05 was considered significant. Results: Of the ten items of satisfaction, there was only a significant difference in “accessibility to an advisor before and after the advisor project in students of nursing and midwifery school” (p=0.010, and the difference was not significant in other items in these students. No significant difference was found in ten items of satisfaction in students at other schools before and after the advisor project (p=0.010. Conclusion: It seems that the implementation of advisor project could not provide a satisfactory position for students. Adequate supervision of university officials on proper implementation of the advisor project, supporting faculty advisors and strengthening their position can help to improve the process.

  2. Asymptotics of the $s$-perimeter as $s\\searrow 0$

    OpenAIRE

    Dipierro, Serena; Figalli, Alessio; Palatucci, Giampiero; Valdinoci, Enrico

    2012-01-01

    We deal with the asymptotic behavior of the $s$-perimeter of a set $E$ inside a domain $\\Omega$ as $s\\searrow0$. We prove necessary and sufficient conditions for the existence of such limit, by also providing an explicit formulation in terms of the Lebesgue measure of $E$ and $\\Omega$. Moreover, we construct examples of sets for which the limit does not exist.

  3. Clock Drawing in Spatial Neglect: A Comprehensive Analysis of Clock Perimeter, Placement, and Accuracy

    Science.gov (United States)

    Chen, Peii; Goedert, Kelly M.

    2012-01-01

    Clock drawings produced by right-brain-damaged (RBD) individuals with spatial neglect often contain an abundance of empty space on the left while numbers and hands are placed on the right. However, the clock perimeter is rarely compromised in neglect patients’ drawings. By analyzing clock drawings produced by 71 RBD and 40 healthy adults, this study investigated whether the geometric characteristics of the clock perimeter reveal novel insights to understanding spatial neglect. Neglect participants drew smaller clocks than either healthy or non-neglect RBD participants. While healthy participants’ clock perimeter was close to circular, RBD participants drew radially extended ellipses. The mechanisms for these phenomena were investigated by examining the relation between clock-drawing characteristics and performance on six subtests of the Behavioral Inattention Test (BIT). The findings indicated that the clock shape was independent of any BIT subtest or the drawing placement on the test sheet and that the clock size was significantly predicted by one BIT subtest: the poorer the figure and shape copying, the smaller the clock perimeter. Further analyses revealed that in all participants, clocks decreased in size as they were placed farther from the center of the paper. However, even when neglect participants placed their clocks towards the center of the page, they were smaller than those produced by healthy or non-neglect RBD participants. These results suggest a neglect-specific reduction in the subjectively available workspace for graphic production from memory, consistent with the hypothesis that neglect patients are impaired in the ability to enlarge the attentional aperture. PMID:22390278

  4. The environmental impacts of land transformation in the coastal perimeter of the Mar Menor lagoon (Spain)

    OpenAIRE

    GARCÍA-AYLLON VEINTIMILLA, SALVADOR; Miralles García, José Luis

    2014-01-01

    Assigned to WIT Press all rights under copyright that may exist in and to the Work and any associated written or multimedia components or other enhancements accompanying the Work. The distinctive environment of the lagoon has long been attractive for visitors. A surge in touristic activities has taken place in the area since the early 1960s, characterised by intense urban development along the lagoon s perimeter to accommodate the growing seasonal population. This phenomenon has particular...

  5. Design and testing of a perimeter of increment threshold by projection

    OpenAIRE

    García Domene, María del Carmen; Luque Cobija, María José; Fez Saiz, Dolores de

    2017-01-01

    In the present study, we have designed and tested a perimeter for the detection of damage in the chromatic mechanisms using a video projector. To this purpose, we have characterized pixel to pixel a video projector, to account for the inhomogeneities in the projection. We have measured the tristimulus values of the projector primaries as a function of digital level, at 49 locations of the projection screen and, from them, we have arrived to a characterization model which reduces the color dif...

  6. A Preliminary Report of Advisor Perceptions of Advising and of a Profession

    Science.gov (United States)

    Aiken-Wisniewski, Sharon A.; Johnson, Anna; Larson, Joshua; Barkemeyer, Jason

    2015-01-01

    Practicing advisors may not agree, know, or understand that advising does not meet the scholarly definition of a profession. Through a phenomenological study, members of NACADA: The Global Community for Academic Advising were invited to describe the position of academic advisor. The data gathered were used to address two research questions:…

  7. Industrial-Organizational and Human Factors Graduate Program Admission: Information for Undergraduate Advisors

    Science.gov (United States)

    Shoenfelt, Elizabeth L.; Stone, Nancy J.; Kottke, Janet L.

    2015-01-01

    Many psychology departments do not have industrial-organizational (IO) or human factors (HF) faculty members. As such, potential IO and HF graduate students may miss career opportunities because faculty advisors are unfamiliar with the disciplines and their graduate programs. To assist advisors, this article highlights the content of IO and HF…

  8. Perceptions of Effectiveness and Job Satisfaction of Pre-Law Advisors

    Science.gov (United States)

    Knotts, H. Gibbs; Wofford, Claire B.

    2017-01-01

    Despite playing an important role, preprofessional advising has received little research attention. For this study, 313 U.S. preprofessional advisors were surveyed in 2015. Drawing on work adjustment and social cognitive career theories, we analyzed the job satisfaction and perceived effectiveness of pre-law advisors. The major findings reveal…

  9. 78 FR 11865 - President's Board of Advisors on Historically Black Colleges and Universities

    Science.gov (United States)

    2013-02-20

    .... Brown, Jr., White House Initiative on Historically Black Colleges and Universities, U.S. Department of... DEPARTMENT OF EDUCATION President's Board of Advisors on Historically Black Colleges and Universities AGENCY: U.S. Department of Education, President's Board of Advisors on Historically Black Colleges...

  10. 78 FR 14297 - President's Board of Advisors on Historically Black Colleges and Universities

    Science.gov (United States)

    2013-03-05

    ... DEPARTMENT OF EDUCATION President's Board of Advisors on Historically Black Colleges and... Board of Advisors on Historically Black Colleges and Universities scheduled for March 6, 2013, and... for a date to be announced in the future. FOR FURTHER INFORMATION CONTACT: John P. Brown, Designated...

  11. 76 FR 60564 - President's Council of Advisors on Science and Technology; Notice of Meeting: Open Regional...

    Science.gov (United States)

    2011-09-29

    ... development. Facility and infrastructure sharing. Policies that could create a fertile innovation environment...; Notice of Meeting: Open Regional Meeting of the President's Council of Advisors on Science and Technology... schedule and summary agenda for an open regional meeting of the President's Council of Advisors on Science...

  12. Undergraduate Students' Perceptions of the Communication Behaviors of Their Advisors and Perceptions of Relational Satisfaction

    Science.gov (United States)

    Punyanunt-Carter, Narissra; Carter, Stacy

    2015-01-01

    This study examined the specific interpersonal communication styles and behaviors of advisors and the expectations they have on their advisee's level of satisfaction, as well as what characteristics lead to higher relational satisfaction in the advisor-advisee relationship. A combination of convenience and snowball sampling were utilized to obtain…

  13. GSA Advisors' Self-Efficacy Related to LGBT Youth of Color and Transgender Youth

    Science.gov (United States)

    Poteat, V. Paul; Scheer, Jillian R.

    2016-01-01

    Gay-Straight Alliances (GSAs) serve lesbian, gay, bisexual, transgender (LGBT) and heterosexual youth from diverse backgrounds. Although some attention has been given to youth members in general, little attention has been given to adult advisors. Among 47 GSA advisors from 33 high schools (39 cisgender female, 8 cisgender male), the authors…

  14. Explaining Doctoral Students' Relational Maintenance with Their Advisor: A Psychosocial Development Perspective

    Science.gov (United States)

    Goldman, Zachary W.; Goodboy, Alan K.

    2017-01-01

    This study explored how psychosocial development affects doctoral students' relationship and communication with their advisor. Chickering and Reisser's vectors of psychosocial development were examined in the doctoral context to understand how students preserve communicatively satisfying relationships with their advisor through the use of…

  15. Design of complex bone internal structure using topology optimization with perimeter control.

    Science.gov (United States)

    Park, Jaejong; Sutradhar, Alok; Shah, Jami J; Paulino, Glaucio H

    2018-03-01

    Large facial bone loss usually requires patient-specific bone implants to restore the structural integrity and functionality that also affects the appearance of each patient. Titanium alloys (e.g., Ti-6Al-4V) are typically used in the interfacial porous coatings between the implant and the surrounding bone to promote stability. There exists a property mismatch between the two that in general leads to complications such as stress-shielding. This biomechanical discrepancy is a hurdle in the design of bone replacements. To alleviate the mismatch, the internal structure of the bone replacements should match that of the bone. Topology optimization has proven to be a good technique for designing bone replacements. However, the complex internal structure of the bone is difficult to mimic using conventional topology optimization methods without additional restrictions. In this work, the complex bone internal structure is recovered using a perimeter control based topology optimization approach. By restricting the solution space by means of the perimeter, the intricate design complexity of bones can be achieved. Three different bone regions with well-known physiological loadings are selected to illustrate the method. Additionally, we found that the target perimeter value and the pattern of the initial distribution play a vital role in obtaining the natural curvatures in the bone internal structures as well as avoiding excessive island patterns. Copyright © 2018 Elsevier Ltd. All rights reserved.

  16. Refined universal laws for hull volumes and perimeters in large planar maps

    International Nuclear Information System (INIS)

    Guitter, Emmanuel

    2017-01-01

    We consider ensembles of planar maps with two marked vertices at distance k from each other, and look at the closed line separating these vertices and lying at distance d from the first one ( d   <   k ). This line divides the map into two components, the hull at distance d which corresponds to the part of the map lying on the same side as the first vertex and its complementary. The number of faces within the hull is called the hull volume, and the length of the separating line the hull perimeter. We study the statistics of the hull volume and perimeter for arbitrary d and k in the limit of infinitely large planar quadrangulations, triangulations and Eulerian triangulations. We consider more precisely situations where both d and k become large with the ratio d / k remaining finite. For infinitely large maps, two regimes may be encountered: either the hull has a finite volume and its complementary is infinitely large, or the hull itself has an infinite volume and its complementary is of finite size. We compute the probability for the map to be in either regime as a function of d / k as well as a number of universal statistical laws for the hull perimeter and volume when maps are conditioned to be in one regime or the other. (paper)

  17. Miniscrew-assisted rapid palatal expansion for managing arch perimeter in an adult patient

    Directory of Open Access Journals (Sweden)

    Amanda Carneiro da Cunha

    Full Text Available ABSTRACT Introduction: Etiology of dental crowding may be related to arch constriction in diverse dimensions, and an appropriate manipulation of arch perimeter by intervening in basal bone discrepancies cases, may be a key for crowding relief, especially when incisors movement is limited due to underlying pathology, periodontal issues or restrictions related to soft tissue profile. Objectives: This case report illustrates a 24-year old woman, with maxillary transverse deficiency, upper and lower arches crowding, Class II, division 1, subdivision right relationship, previous upper incisors traumatic episode and straight profile. A non-surgical and non-extraction treatment approach was feasible due to the miniscrew-assisted rapid palatal expansion technique (MARPE. Methods: The MARPE appliance consisted of a conventional Hyrax expander supported by four orthodontic miniscrews. A slow expansion protocol was adopted, with an overall of 40 days of activation and a 3-month retention period. Intrusive traction miniscrew-anchored mechanics were used for correcting the Class II subdivision relationship, managing lower arch perimeter and midline deviation before including the upper central incisors. Results: Post-treatment records show an intermolar width increase of 5 mm, bilateral Class I molar and canine relationships, upper and lower crowding resolution, coincident dental midlines and proper intercuspation. Conclusions: The MARPE is an effective treatment approach for managing arch-perimeter deficiencies related to maxillary transverse discrepancies in adult patients.

  18. Towards Rural Land Use: Challenges for Oversizing Urban Perimeters in Shrinking Towns

    Science.gov (United States)

    Sá, João; Virtudes, Ana

    2017-12-01

    This article, based on the literature review, aims to study the challenges of the urban dispersion and oversizing of urban perimeters, in the cases where the towns are shrinking or spreading to the rural land-use. It is focused on the case of Portugal where during the last decades there was an escaping to the big cities alongside to the sea (Atlantic and Mediterranean) shore. In the Interior part of the country, which means near to the border with Spain, several towns are shrinking, despite their huge urban perimeters, proposed by the municipal master plans, since the middle of the nineties. Consequently, these urban perimeters are nowadays oversizing, with empty buildings and non-urbanized areas. At the same time, the social patterns of occupation of this territory have changed significantly, moving from a society with signs of rurality to an urban realm, understood not only in territorial terms but also regarding the current lifestyle. This deep changing has occurred not only in urbanistic terms but also in the economic, cultural and social organizations of the country, under a movement that corresponds to a decline of the small urban settlements in rural areas, far away from the cosmopolitan strip of land nearby the sea, in between the capital city, Lisbon and the second one Oporto. These transformations were not driven by any significant public policy for land-use actions. On the contrary, the production of urban areas, supporting the new model of economic and social development was largely left to the initiative of economic and social private agents and land owners. These agents were the leading responsible for the new urban developments and housing. In this sense, this research aims to present some strategies for the short time period regarding the devolution of urban areas to rural land use. In this sense, the next steps of spatial planning policies, under the role of local authorities (the 308 municipalities including Madeira and Azores islands, plus the

  19. System Advisor Model: Flat Plate Photovoltaic Performance Modeling Validation Report

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, Janine [National Renewable Energy Lab. (NREL), Golden, CO (United States); Whitmore, Jonathan [National Renewable Energy Lab. (NREL), Golden, CO (United States); Kaffine, Leah [National Renewable Energy Lab. (NREL), Golden, CO (United States); Blair, Nate [National Renewable Energy Lab. (NREL), Golden, CO (United States); Dobos, Aron P. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2013-12-01

    The System Advisor Model (SAM) is a free software tool that performs detailed analysis of both system performance and system financing for a variety of renewable energy technologies. This report provides detailed validation of the SAM flat plate photovoltaic performance model by comparing SAM-modeled PV system generation data to actual measured production data for nine PV systems ranging from 75 kW to greater than 25 MW in size. The results show strong agreement between SAM predictions and field data, with annualized prediction error below 3% for all fixed tilt cases and below 8% for all one axis tracked cases. The analysis concludes that snow cover and system outages are the primary sources of disagreement, and other deviations resulting from seasonal biases in the irradiation models and one axis tracking issues are discussed in detail.

  20. Shift technical advisors: in the eyes of the NRC

    International Nuclear Information System (INIS)

    Crocker, L.P.

    1981-01-01

    Since January 1, 1980, the NRC has required that Shift Technical Advisors be on-shift at all operating nuclear power plants. The objective of the requirement is to assure that technical expertise is immediately available to each operating shift to assess off-normal events and to provide advice to control room personnel. Further, this advice and assistance is to be provided by an individual not responsible for control manipulations or for directing the activities of reactor operators. The long-term requirement for on-shift technical expertise is firm. However, the exact manner in which this expertise must be furnished has not been determined. Licensees have proposed various alternatives to meet this requirement. These proposals still are being reviewed by the NRC staff

  1. Rapid repair advisor for motor-operated valves

    International Nuclear Information System (INIS)

    Somsel, J.K.

    1991-01-01

    This paper reports on the initial proposed application for the Rapid Repair Advisor project for motor-operated valves (MOVs). The expected benefits from an MOV testing expert system depend on the purpose of the testing. Straight acceptance testing (post-maintenance and surveillance) could benefit from field verification of test validity. Troubleshooting of failed operators is seldom difficult. Intermittent problems are difficult to resolve suggesting that trace recording capabilities are needed. Predictive diagnosis places the most demands on the interpretive skills of the engineer. However, the limit to predictive capabilities seems to lie in the design of the MOV and the measurable parameters. Utilities are expected to require a knowledgeable MOV maintenance engineer to make decisions on MOV maintenance and operability. The economics of developing an expert system are comparable to improved training for the end-users

  2. Academic involvement in shift technical advisor training for the utilities

    International Nuclear Information System (INIS)

    Davidson, J.N.; Sain, L.H.

    1981-01-01

    One of the clearest conclusions reached of nearly every commission and panel formed in response to the Three Mile Island accident was the desirability of upgrading the educational background of those persons with direct operational responsibility in a nuclear power plant. The long term objective is for all shift supervisors to have engineering degrees as well as NRC senior operating licenses. In the interim, the utilities are required to provide in-depth engineering expertise on every shift in the person of a Shift Technical Advisor (STA). The training of STA's is complicated by the requirement to have college level instruction in plant specific topics which are not typically included in the curricula of degree-granting instructions. One possible response to this challenge is presented

  3. Multi-Center Traffic Management Advisor Operational Field Test Results

    Science.gov (United States)

    Farley, Todd; Landry, Steven J.; Hoang, Ty; Nickelson, Monicarol; Levin, Kerry M.; Rowe, Dennis W.

    2005-01-01

    The Multi-Center Traffic Management Advisor (McTMA) is a research prototype system which seeks to bring time-based metering into the mainstream of air traffic control (ATC) operations. Time-based metering is an efficient alternative to traditional air traffic management techniques such as distance-based spacing (miles-in-trail spacing) and managed arrival reservoirs (airborne holding). While time-based metering has demonstrated significant benefit in terms of arrival throughput and arrival delay, its use to date has been limited to arrival operations at just nine airports nationally. Wide-scale adoption of time-based metering has been hampered, in part, by the limited scalability of metering automation. In order to realize the full spectrum of efficiency benefits possible with time-based metering, a much more modular, scalable time-based metering capability is required. With its distributed metering architecture, multi-center TMA offers such a capability.

  4. Recent Updates to the System Advisor Model (SAM)

    Energy Technology Data Exchange (ETDEWEB)

    DiOrio, Nicholas A [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2018-02-14

    The System Advisor Model (SAM) is a mature suite of techno-economic models for many renewable energy technologies that can be downloaded for free as a desktop application or software development kit. SAM is used for system-level modeling, including generating performance pro the release of the code as an open source project on GitHub. Other additions that will be covered include the ability to download data directly into SAM from the National Solar Radiation Database (NSRDB) and up- dates to a user-interface macro that assists with PV system sizing. A brief update on SAM's battery model and its integration with the detailed photovoltaic model will also be discussed. Finally, an outline of planned work for the next year will be presented, including the addition of a bifacial model, support for multiple MPPT inputs for detailed inverter modeling, and the addition of a model for inverter thermal behavior.

  5. The Northern States Power Company welding manual advisor

    International Nuclear Information System (INIS)

    Lu, Yi; Wood, R.M.

    1993-01-01

    The Welding Manual Advisor (WMA) is an object oriented expert system designed to assist Northern States Power (NSP) personnel in implementing the company's Welding Manual. The expert system captures the knowledge of welding experts, addresses important issues in welding activities and automates the use of the Welding Manual. It is estimated that use of the WMA will save $81,000 over the next six years at NSP, because of the reduction of labor and errors in the use of the Welding Manual, and facilitation of training of NSP personnel. The important features of the WMA include the accuracy and consistency in determining welding procedure and requirements, update capability, user friendly interface, on-line help function, back-up capability, and well-documented manuals

  6. Resilient Communication: A New Crisis Communication Strategy for Homeland Security

    Science.gov (United States)

    2012-03-01

    communication theory. Author, Timothy Coombs , in Ongoing Crisis Communication , discusses the need for a crisis management 10 plan to prepare for potential... COMMUNICATION : A NEW CRISIS COMMUNICATION STRATEGY FOR HOMELAND SECURITY by Sharon L. Watson March 2012 Thesis Advisor: Christopher Bellavita...REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Resilient Communication : A New Crisis Communication

  7. Norms Versus Security: What is More Important to Japan’s View of Nuclear Weapons

    Science.gov (United States)

    2017-03-01

    SECURITY : WHAT IS MORE IMPORTANT TO JAPAN’S VIEW OF NUCLEAR WEAPONS? by Calvin W. Dillard March 2017 Thesis Advisor: S. Paul Kapur Second...TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE NORMS VERSUS SECURITY : WHAT IS MORE IMPORTANT TO JAPAN’S VIEW OF NUCLEAR WEAPONS... security concerns and technology are important in determining whether a nation will create a weapons program while politics, economics, and security

  8. CRITERIA FOR CONSULTANT AND ADVISOR IN THE BRAZILIAN POSTGRADUATE SYSTEM.

    Science.gov (United States)

    Petroianu, Andy

    2015-01-01

    To review the rules, resolutions and existing documents relating to consultant and advisor to better target the actions of those who exercise these roles. The following documents were consulted: Statute of CAPES, through Decree No. 7692 of March 2, 2012; Ordinance No. 47 of 17/10/1995; Opinion 977 1965 Newton Sucupira; Area Document of Medicine III; Interministerial Ordinance 251 of 2012, based on Decree No. 7642 of 2011 of the Ministry of Science and Technology; CAPES Regiment. The Brazilian Postgraduate system is divided in two different fields, according to its aspects: the "lato sensu" postgraduate, defined as all professional studies performed after the high school graduation; and the "stricto sensu" postgraduate that includes the master degree and the doctorate, both of them different from what is known as MSc or MS and PhD. The Brazilian doctorate is recognized as academic because its purposes include to improve the scientific and the teaching levels of university docents. The master degree has two different objectives one is to be academic and similar to the doctorate; the other is to upgrade professionals to a higher level than specialist or MBA and is denominated professional master degree. The master degrees and the doctorate are designated as courses and may be put together in a structure known as stricto sensu postgraduate program. The complexity of these courses and programs in all the areas of the superior human knowledge requires a large number of professional directly involved with this system and other professionals that attend them, called consultants and advisors. The consultants are counselors, and the advisors are assistants, both of them legally established with the incumbency to aid the postgraduate staff in all their duties. Nothing prevents a person from being a consultant on the situation and advisor on another, even in the same institution. Have knowledge about what being a consultant and advisor is required to exercise the function

  9. Physical security workshop summary: entry control

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1982-01-01

    Entry control hardware has been used extensively in the past to assist security forces in separating the authorized from the unauthorized at the plant perimeter. As more attention is being focused on the insider threat, these entry control elements are being used to extend the security inspectors' presence into the plant by compartmentalizing access and monitoring vital components. This paper summarizes the experiences expressed by the participants at the March 16 to 19, 1982 INMM Physical Protection Workshop in utilizing access control and contraband detection hardware for plant wide entry control applications

  10. People, Process, and Policy: Case Studies in National Security Advising, the National Security Council, and Presidential Decision Making

    Science.gov (United States)

    2017-06-01

    confirmation of Lake’s concerns with the administration’s public relations failures, David Gergen, the president’s communications advisor, increased... Public Affairs: 389-395. 75 these positions, he did not openly object too them during the campaign. Additionally, as this case study shows, he...PEOPLE, PROCESS, AND POLICY: CASE STUDIES IN NATIONAL SECURITY ADVISING, THE NATIONAL SECURITY COUNCIL, AND PRESIDENTIAL DECISION MAKING

  11. 77 FR 53941 - Emerging Global Advisors, LLC, et al.;

    Science.gov (United States)

    2012-09-04

    ...'s portfolio as a result of the rebalancing of its Underlying Index (any such change, a ``Rebalancing... within the meaning of section 2(a)(3) of the Act. 3. Each Fund will consist of a portfolio of securities (``Portfolio Securities'') selected to correspond generally to the performance of an Underlying Index. No...

  12. Foreign Security Force Advisor Training, Doctrine, and Manning for 2015 and Beyond

    Science.gov (United States)

    2016-03-01

    physical and metaphysical environment, and ways to mitigate stressors.  Social Perspective Taking 2 hour class—Gain an understanding of how a foreign...Recognize Cultural Stress 1 hour class—Recognizing stressors in a physical and metaphysical environment, and ways to mitigate stressors. Don’t Recall N

  13. Are South African financial advisor addressing the estate planning objectives that are important to their client?

    Directory of Open Access Journals (Sweden)

    Venter, J.M.P.

    2014-07-01

    Full Text Available Estate planning is an important aspect of any effective financial plan. When preparing an estate plan several objectives identified by the individual planner, as well as several pieces of legislation have to be considered. In South Africa the actions of financial advisors are regulated by the Financial Advisory and Intermediary Services Act. The act aims to ensure that the financial advisor act in the best interest of his / her client. If the act meets its set objectives there will be an alignment of objectives set by a financial advisor and his / her client. This study investigates the existence of an expectation gap between the estate planning objectives considered to be important by the financial advisor and the importance allocated to these factors by the clients. The study found that there was an expectation gap for three of the objectives that should be considered in the estate plan

  14. The App Squad: SLJ's Advisors Weigh in on Kids' Book Apps

    Science.gov (United States)

    Ishizuka, Kathy

    2011-01-01

    In this article, "School Library Journal's" ("SLJ") advisors talk about book apps for kids. They discuss what they like, what one should look for in discerning the best for kids and teens, and where this all might be headed.

  15. The CBT Advisor: An Expert System Program for Making Decisions about CBT.

    Science.gov (United States)

    Kearsley, Greg

    1985-01-01

    Discusses structure, credibility, and use of the Computer Based Training (CBT) Advisor, an expert system designed to help managers make judgements about course selection, system selection, cost/benefits, development effort, and probable success of CBT projects. (MBR)

  16. Toward a New Trilateral Strategic Security Relationship: United States, Canada, and Mexico

    Directory of Open Access Journals (Sweden)

    Richard J. Kilroy, Jr.

    2010-01-01

    Full Text Available The term "perimeter defense" has come back into vogue recently, with regard to security strategies for North America. The United States' concern primarily with the terrorist threat to its homeland subsequent to September 11, 2001 (9/11 is generating this discussion with its immediate neighbors of Mexico and Canada (and to some extent some Caribbean nations—the "third border". The concept is simply that by pushing defenses out to the "perimeter" nations, then security will be enhanced, since the United States visions itself as more vulnerable to international terrorism than its neighbors. However, Canada and Mexico have not been very happy about the perimeter defined by Washington since 9/11. These nations have sought to define the trilateral relationship beyond just discussions of terrorism to include natural disasters and international organized crime as a component of a broader trilateral agenda. Eight years later these three nations continue to look for some convergence of security interests, although there remains a degree of tension and hesitancy towards achieving a "common security agenda" in the Western Hemisphere.This article examines the concept of "perimeter defense" within the context of the new security challenges that the United States, Mexico, and Canada face today. Questions to be addressed in the article include: Do all these nations share the same "threat" perception? Where exactly is the "perimeter?" What security arrangements have been tried in the past? What are the prospects for the future for increased security cooperation? The main focus of this article is at the sub-regional level in North America and whether a new "trilateral" strategic security relationship between the United States, Canada, and Mexico can emerge in North America.

  17. Evaluation of high-perimeter electrode designs for deep brain stimulation

    Science.gov (United States)

    Howell, Bryan; Grill, Warren M.

    2014-08-01

    Objective. Deep brain stimulation (DBS) is an effective treatment for movement disorders and a promising therapy for treating epilepsy and psychiatric disorders. Despite its clinical success, complications including infections and mis-programing following surgical replacement of the battery-powered implantable pulse generator adversely impact the safety profile of this therapy. We sought to decrease power consumption and extend battery life by modifying the electrode geometry to increase stimulation efficiency. The specific goal of this study was to determine whether electrode contact perimeter or area had a greater effect on increasing stimulation efficiency. Approach. Finite-element method (FEM) models of eight prototype electrode designs were used to calculate the electrode access resistance, and the FEM models were coupled with cable models of passing axons to quantify stimulation efficiency. We also measured in vitro the electrical properties of the prototype electrode designs and measured in vivo the stimulation efficiency following acute implantation in anesthetized cats. Main results. Area had a greater effect than perimeter on altering the electrode access resistance; electrode (access or dynamic) resistance alone did not predict stimulation efficiency because efficiency was dependent on the shape of the potential distribution in the tissue; and, quantitative assessment of stimulation efficiency required consideration of the effects of the electrode-tissue interface impedance. Significance. These results advance understanding of the features of electrode geometry that are important for designing the next generation of efficient DBS electrodes.

  18. Differential GPS effectiveness in measuring area and perimeter in forested settings

    International Nuclear Information System (INIS)

    Frank, Jereme; Wing, Michael G

    2013-01-01

    This study quantifies area and perimeter measurement errors, traverse times, recording intervals, and overall time and cost effectiveness for using a mapping-grade differential Global Positioning System (GPS) receiver in forested settings. We compared two configurations including one that maximized data collection productivity (position dilution of precision (PDOP) 20, signal to noise ratio (SNR 33), and minimum elevation mask 5°) and a second that involved traditional receiver settings that was designed to improve accuracies (PDOP 6, SNR 39, and minimum elevation mask 15°). We determined that averaging 30 positions and using the settings that maximized productivity was the most time effective combination of recording interval and settings. This combination of recording interval and settings proved slightly more cost effective than other traditional surveying methods such as a laser with digital compass and string box. Average absolute per cent area errors when averaging 30 positions and using maximum settings were 2.6% and average absolute per cent perimeter errors were 2.0%. These results should help forest resource professionals more effectively evaluate GPS techniques and receiver configurations. (paper)

  19. Farmers’ willingness to pay for surface water in the West Mitidja irrigated perimeter, northern Algeria

    Directory of Open Access Journals (Sweden)

    Malika Azzi

    2018-04-01

    Full Text Available Algeria is among the most water-stressed countries in the world. Because of its climatic conditions, irrigation is essential for agricultural production. Water prices paid by farmers in public irrigation districts are very low and do not cover the operation and maintenance (O&M costs of the irrigated perimeters, thus leading to the deterioration of these infrastructures. The objective of this paper is to analyse whether farmer’s in the West Mitidja irrigation district in northern Algeria would be willing to pay more for surface water in order to maintain the water supply service in its current conditions. We estimated farmers’ willingness to pay (WTP for water using data from a dichotomous choice contingent valuation survey to 112 randomly selected farmers. Farmers’ responses were modelled using logistic regression techniques. We also analysed which technical, structural, social and economic characteristics of farms and farmers explain the differences in WTP. Our results showed that nearly 80% of the surveyed farmers are willing to pay an extra price for irrigation water. The average WTP was 64% greater than the price currently paid by farmers, suggesting some scope for improving the financial resources of the Mitidja irrigated perimeter, but insufficient to cover all O&M costs. Some of the key identified factors that affect WTP for surface water relate to farm ownership, access to groundwater resources, cropping patterns, farmers’ agricultural training and risk exposure.

  20. Farmers’ willingness to pay for surface water in the West Mitidja irrigated perimeter, northern Algeria

    International Nuclear Information System (INIS)

    Azzi, M.; Calatrava, J.; Bedrani, S.

    2018-01-01

    Algeria is among the most water-stressed countries in the world. Because of its climatic conditions, irrigation is essential for agricultural production. Water prices paid by farmers in public irrigation districts are very low and do not cover the operation and maintenance (O&M) costs of the irrigated perimeters, thus leading to the deterioration of these infrastructures. The objective of this paper is to analyse whether farmer’s in the West Mitidja irrigation district in northern Algeria would be willing to pay more for surface water in order to maintain the water supply service in its current conditions. We estimated farmers’ willingness to pay (WTP) for water using data from a dichotomous choice contingent valuation survey to 112 randomly selected farmers. Farmers’ responses were modelled using logistic regression techniques. We also analysed which technical, structural, social and economic characteristics of farms and farmers explain the differences in WTP. Our results showed that nearly 80% of the surveyed farmers are willing to pay an extra price for irrigation water. The average WTP was 64% greater than the price currently paid by farmers, suggesting some scope for improving the financial resources of the Mitidja irrigated perimeter, but insufficient to cover all O&M costs. Some of the key identified factors that affect WTP for surface water relate to farm ownership, access to groundwater resources, cropping patterns, farmers’ agricultural training and risk exposure.

  1. System Advisor Model, SAM 2014.1.14: General Description

    Energy Technology Data Exchange (ETDEWEB)

    Blair, Nate [National Renewable Energy Lab. (NREL), Golden, CO (United States); Dobos, Aron P. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Freeman, Janine [National Renewable Energy Lab. (NREL), Golden, CO (United States); Neises, Ty [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wagner, Michael [National Renewable Energy Lab. (NREL), Golden, CO (United States); Ferguson, Tom [Global Resources, Northbrook, IL (United States); Gilman, Paul [National Renewable Energy Lab. (NREL), Golden, CO (United States); Janzou, Steven [Janzou Consulting, Idaho Springs, CO (United States)

    2014-02-01

    This document describes the capabilities of the U.S. Department of Energy and National Renewable Energy Laboratory's System Advisor Model (SAM), Version 2013.9.20, released on September 9, 2013. SAM is a computer model that calculates performance and financial metrics of renewable energy systems. Project developers, policy makers, equipment manufacturers, and researchers use graphs and tables of SAM results in the process of evaluating financial, technology, and incentive options for renewable energy projects. SAM simulates the performance of photovoltaic, concentrating solar power, solar water heating, wind, geothermal, biomass, and conventional power systems. The financial model can represent financial structures for projects that either buy and sell electricity at retail rates (residential and commercial) or sell electricity at a price determined in a power purchase agreement (utility). SAM's advanced simulation options facilitate parametric and sensitivity analyses, and statistical analysis capabilities are available for Monte Carlo simulation and weather variability (P50/P90) studies. SAM can also read input variables from Microsoft Excel worksheets. For software developers, the SAM software development kit (SDK) makes it possible to use SAM simulation modules in their applications written in C/C++, C#, Java, Python, and MATLAB. NREL provides both SAM and the SDK as free downloads at http://sam.nrel.gov. Technical support and more information about the software are available on the website.

  2. Scientific writing: strategies and tools for students and advisors.

    Science.gov (United States)

    Singh, Vikash; Mayer, Philipp

    2014-01-01

    Scientific writing is a demanding task and many students need more time than expected to finish their research articles. To speed up the process, we highlight some tools, strategies as well as writing guides. We recommend starting early in the research process with writing and to prepare research articles, not after but in parallel to the lab or field work. We suggest considering scientific writing as a team enterprise, which needs proper organization and regular feedback. In addition, it is helpful to select potential target journals early and to consider not only scope and reputation, but also decision times and rejection rates. Before submission, instructions to authors and writing guides should be considered, and drafts should be extensively revised. Later in the process editor's and reviewer's comments should be followed. Our tips and tools help students and advisors to structure the writing and publishing process, thereby stimulating them to develop their own strategies to success. Copyright © 2014 The International Union of Biochemistry and Molecular Biology.

  3. THE ROLE OF 'PROFESSIONAL ADVISORS ON FINANCIAL MATTERS' IN ENTREPRENEURIAL NETWORKS

    OpenAIRE

    KIM KLYVER; KEVIN HINDLE

    2010-01-01

    This study investigated the influence that 'professional advisors on financial matters' have in comparison with other people with whom entrepreneurs discuss their venture. Based on follow-up surveys completed in relation to the Danish participation in the Global Entrepreneurship Monitor (GEM) survey, it was found that professional advisors on financial matters only play a minor role in the two early phases of the entrepreneurial process before the venture is actually started. It was further r...

  4. March of the Robo-advisors : The potential for global expansion of digital asset management platforms

    OpenAIRE

    Rättyä, Jere

    2016-01-01

    This thesis looks into the robo-advisory market in the U.S. and Europe, with the goal of determining the international potential for a Finnish robo-advisor service and inspecting the interest of foreign service providers in the Finnish market. Fintech is becoming increasingly disruptive for the traditional and conservative financial sector, which has resulted in start-ups building their own robo-advisor platform around the world. Traditional wealth management is both expensive and exclusi...

  5. Soviet Advisors Group in South China and Soviet Union Financing of Gomindan War Planes in 1924

    Directory of Open Access Journals (Sweden)

    Александр Геннадьевич Юркевич

    2011-12-01

    Full Text Available The article dwells on the organization and activities of the Soviet advisors group, which assisted to the South China government of Sun Yatsen, its participation in financing Kuomintang political and military projects. The author pointed out that the main aim of the advisors group efforts was to form new Kuomintang power institutions and to bring its policy and army under control, for all that the tactics of implementation of strategy aim were constantly changing.

  6. Using the acid rain advisor to evaluate compliance strategies

    International Nuclear Information System (INIS)

    Stallard, G.S.; Anderson, A.A.

    1991-01-01

    Unlike prior Clean Air Act (CAA) legislation, the most recent amendments will require utilities to reduce SO 2 and NO x emissions for existing operating power station and provides for compliance strategies in which emissions for existing operating power stations and provides for compliance strategies in which emission reductions can be transferred from one unit to another. The Electric Power Research Institute (EPRI), in conjunction with the Department of Energy (DOE), is funding the development of the Coal Quality Expert (CQE), a comprehensive analytical/planning tool to consider the myriad of potential coal purchase decisions now facing the utility, including fuel switching, blending, coal beneficiation, and the installation of retrofit emission controls. The CQE will be built on the foundation of proven, validated computer models to the maximum extent possible, including EPRI's Coal Quality Impact Model (CQIM), a state-of-the-art computer model designed to evaluate cost/performance impacts of fuel switching at existing power plants. In addition, as the CQE development permits, interim computer products will be offered. The first of these products is the Acid Rain Advisor (ARA). The ARA complements the CQIM by providing the ability to rapidly evaluate the system-wide cost and reduction benefits which result from selecting various reduction techniques on various units within the system. Thus, with the ARA, the utility can efficiently combine cost/performance information, view overall system results, and rapidly consider various 'What if' alternatives to ensure that individual unit reduction strategies are consistent with the goals of the utility as a whole. This paper demonstrates the capabilities of the ARA, and by use of a 'sample analysis,' illustrates how a utility might develop and evaluate alternative CAA compliance strategies

  7. 76 FR 76981 - Request for Public Comments Concerning U.S.-Canada Action Plan for Perimeter Security and...

    Science.gov (United States)

    2011-12-09

    ... Jobs; Integrated Cross-Border Law Enforcement; and Critical Infrastructure and Cybersecurity. Progress... comments submitted electronically containing business confidential information, the file name of the business confidential version should begin with the characters ``BC''. The top of any page containing...

  8. Factors leading to the involvement of Forensic Advisors in the Belgian criminal justice system.

    Science.gov (United States)

    Bitzer, Sonja

    2018-04-01

    Forensic Advisors at the National Institute for Criminalistics and Criminology in Brussels act as advising body to the magistrate regarding analytical possibilities and the usefulness of trace analysis in a case. Initially, their function was devised to assist in complex murder cases with unknown offender. However, in a previous study, the increasing diversity of the cases they are requested for has been observed (Bitzer et al., in press). In order to deepen our understanding of the decision steps in the criminal investigation process, the decision to involve a Forensic Advisor and the factors leading to their involvement were evaluated. The study focused on homicide, robbery and burglary cases with and without requests for a Forensic Advisor between January 2014 and June 2016. The factors were categorised into five knowledge dimensions: strategic, immediate, physical, criminal and utility. Decision tree modelling was carried out in order to identify the factors influencing the request for a Forensic Advisor in the case. The decision to request a Forensic Advisor differs between different types of offences. It also depends on the complexity of the case in terms of the number of traces and objects collected at the crime scene, and the availability of witness reports. Indeed, Forensic Advisors take the role of trace analysis coordinator by providing an overview of all available traces, objects, analyses and results. According to the principal implication factors and the performed case study, the contribution of Forensic Advisors consists mainly in summarising all information and advise on potential additional analyses. This might be explained by a loss of overview of the information and the possibilities regarding trace analysis by the magistrate responsible of the case. Copyright © 2018 Elsevier B.V. All rights reserved.

  9. AIRFIL: a FORTRAN program for reduction of data obtained from alpha spectrometry of perimeter air filters

    International Nuclear Information System (INIS)

    Hinton, E.R. Jr.; Howell, R.L.

    1984-03-01

    Isotopic alpha spectrometry of 238 U, 235 U, and 234 U, along with gross alpha/beta counting of perimeter air filters, is performed by the Oak Ridge Y-12 Plant Laboratory in support of the Envrirnomental Monitoring Section of the Radiation Safety Department. Weekly samples are gross alpha/beta counted and the isotopic analysis performed on quarterly composites. Calculations and data management represents a major portion of the anlaysis time when performed manually, even with a desktop calculator. In order to reduce calculation time, perform orderly data manipulation and management, reduce errors due to redundant calculations, and eliminate report typing turnaround time, a computer program (AIRFIL) has been developed that performs these functions. The program accepts data through user prompts, then calculates and prints intermediate and final data, including detection limits

  10. Prediction based Greedy Perimeter Stateless Routing Protocol for Vehicular Self-organizing Network

    Science.gov (United States)

    Wang, Chunlin; Fan, Quanrun; Chen, Xiaolin; Xu, Wanjin

    2018-03-01

    PGPSR (Prediction based Greedy Perimeter Stateless Routing) is based on and extended the GPSR protocol to adapt to the high speed mobility of the vehicle auto organization network (VANET) and the changes in the network topology. GPSR is used in the VANET network environment, the network loss rate and throughput are not ideal, even cannot work. Aiming at the problems of the GPSR, the proposed PGPSR routing protocol, it redefines the hello and query packet structure, in the structure of the new node speed and direction information, which received the next update before you can take advantage of its speed and direction to predict the position of node and new network topology, select the right the next hop routing and path. Secondly, the update of the outdated node information of the neighbor’s table is deleted in time. The simulation experiment shows the performance of PGPSR is better than that of GPSR.

  11. Forming Of Spherical Titanium Cups From Circular Blanks With Cutouts On The Perimeter

    Directory of Open Access Journals (Sweden)

    Lacki P.

    2015-06-01

    Full Text Available Despite substantial demand for drawn parts made of high-strength sheet metal (including titanium alloys observed in the modern industry, particularly automotive and aviation, their application remains insignificant. This results from the fact that such sheet metal shows poor plasticity and its cold-forming is almost impossible. Low drawability makes it impossible to obtain even such simple shapes as spherical cups. The authors of this study developed circular sheet-metal blanks with cutouts on their perimeter. The blanks allow for cold forming of spherical cups from Ti6Al4V titanium alloy sheet metal using conventional rigid tools. The cutouts proposed in the study affect plastic strain distribution, which in turn leads to an increase in forming depth by about 30%. The numerical analysis, performed using the PamStamp 2G System software based on finite element method, was verified experimentally.

  12. Comparison of perimeter trap crop varieties: effects on herbivory, pollination, and yield in butternut squash.

    Science.gov (United States)

    Adler, L S; Hazzard, R V

    2009-02-01

    Perimeter trap cropping (PTC) is a method of integrated pest management (IPM) in which the main crop is surrounded with a perimeter trap crop that is more attractive to pests. Blue Hubbard (Cucurbita maxima Duch.) is a highly effective trap crop for butternut squash (C. moschata Duch. ex Poir) attacked by striped cucumber beetles (Acalymma vittatum Fabricius), but its limited marketability may reduce adoption of PTC by growers. Research comparing border crop varieties is necessary to provide options for growers. Furthermore, pollinators are critical for cucurbit yield, and the effect of PTC on pollination to main crops is unknown. We examined the effect of five border treatments on herbivory, pollination, and yield in butternut squash and manipulated herbivory and pollination to compare their importance for main crop yield. Blue Hubbard, buttercup squash (C. maxima Duch.), and zucchini (C. pepo L.) were equally attractive to cucumber beetles. Border treatments did not affect butternut leaf damage, but butternut flowers had the fewest beetles when surrounded by Blue Hubbard or buttercup squash. Yield was highest in the Blue Hubbard and buttercup treatments, but this effect was not statistically significant. Native bees accounted for 87% of pollinator visits, and pollination did not limit yield. There was no evidence that border crops competed with the main crop for pollinators. Our results suggest that both buttercup squash and zucchini may be viable alternatives to Blue Hubbard as borders for the main crop of butternut squash. Thus, growers may have multiple border options that reduce pesticide use, effectively manage pests, and do not disturb mutualist interactions with pollinators.

  13. Preferential Hyperacuity Perimeter (PreView PHP) for detecting choroidal neovascularization study.

    Science.gov (United States)

    Alster, Yair; Bressler, Neil M; Bressler, Susan B; Brimacombe, Judith A; Crompton, R Michael; Duh, Yi-Jing; Gabel, Veit-Peter; Heier, Jeffrey S; Ip, Michael S; Loewenstein, Anat; Packo, Kirk H; Stur, Michael; Toaff, Techiya

    2005-10-01

    To assess the ability of the Preferential Hyperacuity Perimeter (PreView PHP; Carl Zeiss Meditec, Dublin, CA) to detect recent-onset choroidal neovascularization (CNV) resulting from age-related macular degeneration (AMD) and to differentiate it from an intermediate stage of AMD. Prospective, comparative, concurrent, nonrandomized, multicenter study. Eligible participants' study eyes had a corrected visual acuity of 20/160 or better and either untreated CNV from AMD diagnosed within the last 60 days or an intermediate stage of AMD. After obtaining consent, visual acuity with habitual correction, masked PHP testing, stereoscopic color fundus photography, and fluorescein angiography were performed. Photographs and angiograms were evaluated by graders masked to diagnosis and PHP results. The reading center's diagnosis determined if the patient was categorized as having intermediate AMD or neovascular AMD. A successful study outcome was defined a priori as a sensitivity of at least 80% and a specificity of at least 80%. Of 185 patients who gave consent to be enrolled, 11 (6%) had PHP results judged to be unreliable. An additional 52 were not included because they did not meet all eligibility criteria. Of the remaining 122 patients, 57 had an intermediate stage of AMD and 65 had neovascular AMD. The sensitivity to detect newly diagnosed CNV using PHP testing was 82% (95% confidence interval [CI], 70%-90%). The specificity to differentiate newly diagnosed CNV from the intermediate stage of AMD using PHP testing was 88% (95% CI, 76%-95%). Preferential Hyperacuity Perimeter testing can detect recent-onset CNV resulting from AMD and can differentiate it from an intermediate stage of AMD with high sensitivity and specificity. These data suggest that monitoring with PHP should detect most cases of CNV of recent onset with few false-positive results at a stage when treatment usually would be beneficial. Thus, this monitoring should be considered in the management of the

  14. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  15. An Exploration of the Relationship between International Students and Their Advisors in U.S. Higher Education Institution

    OpenAIRE

    Mitra, Shreya

    2017-01-01

    International students in U.S. academic settings are facing barriers in the path of their academic accomplishments. In higher educational institutions, students work very closely with their academic advisors to solve a definite problem. Dependence on the academic advisor is much more when the advisee is international. Keeping these points in mind, one of the factors that might impact academic environment for an international student is the bonding that they share with their advisor. This rese...

  16. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  17. Guide to good practices for the selection, training, and qualification of shift technical advisors

    Energy Technology Data Exchange (ETDEWEB)

    1993-02-01

    The DOE Guide to Good Practices For The Selection, Training, and Qualification of Shift Technical Advisors can be used by any DOE nuclear facility that has implemented the shift technical advisor position. DOE Order 5480-20, ``Personnel Selection, Qualification, Training, and Staffing Requirements at DOE Reactor and Non-Reactor Nuclear Facilities,`` states that only Category A reactors must use shift technical advisor position. However, many DOE nuclear facilities have implemented the shift technical advisor position to provide independent on-shift technical advice and counsel to the shift operating personnel to help determine cause and mitigation of facility accidents. Those DOE nuclear facilities that have implemented or are going to implement the shift technical advisor position will find this guide useful. This guide addresses areas that may be covered by other training programs. In these cases, it is unnecessary (and undesirable) to duplicate these areas in the STA training program as long as the specific skills and knowledge essential for STAs are addressed. The guide is presented based on the premise that the trainee has not completed any facility-specific training other than general employee training.

  18. To Whistleblow or Not to Whistleblow: Affective and Cognitive Differences in Reporting Peers and Advisors.

    Science.gov (United States)

    McIntosh, Tristan; Higgs, Cory; Turner, Megan; Partlow, Paul; Steele, Logan; MacDougall, Alexandra E; Connelly, Shane; Mumford, Michael D

    2017-09-20

    Traditional whistleblowing theories have purported that whistleblowers engage in a rational process in determining whether or not to blow the whistle on misconduct. However, stressors inherent to whistleblowing often impede rational thinking and act as a barrier to effective whistleblowing. The negative impact of these stressors on whistleblowing may be made worse depending on who engages in the misconduct: a peer or advisor. In the present study, participants are presented with an ethical scenario where either a peer or advisor engages in misconduct, and positive and the negative consequences of whistleblowing are either directed to the wrongdoer, department, or university. Participant responses to case questions were evaluated for whistleblowing intentions, moral intensity, metacognitive reasoning strategies, and positive and negative, active and passive emotions. Findings indicate that participants were less likely to report the observed misconduct of an advisor compared to a peer. Furthermore, the findings also suggest that when an advisor is the source of misconduct, greater negative affect results. Post-hoc analyses were also conducted examining the differences between those who did and did not intend to blow the whistle under the circumstances of either having to report an advisor or peer. The implications of these findings for understanding the complexities involved in whistleblowing are discussed.

  19. LEGAL STATUS OF ADVISORS IN THE FIELD OF INTELLECTUAL PROPERTY RIGHT IN THE UNITED KINGDOM

    Directory of Open Access Journals (Sweden)

    Khrystyna Kmetyk

    2017-11-01

    Full Text Available Purpose: to research the legal status of advisors in the field of intellectual property right in the United Kingdom. In this article an author distinguishes and gives a legal description of the types of advisors in the field of intellectual property right in the United Kingdom. The main provisions of the Rules of Conduct for Patent Attorneys, Ttrade Mark Attorneys and Other Regulated Persons (2015 are considered. Methods: to analyse the legal status of advisors in the field of intellectual property right in the United Kingdom the method of induction, systematic approach, formal legal methods were used. Results: this research provides an opportunity to broaden the understanding of the institute of advisors in the field of intellectual property right (in particular patent attorneys and trademark attorneys in the UK and thus include this knowledge in domestic research on intellectual property right. Conclusions: the majority of types of advisors in the field of intellectual property right in the United Kingdom (patent attorneys, chartered patent attorneys, European patent attorneys, registered trademark attorneys and trademark attorneys, European trademark attorneys, etc. is well-educated professionals in all areas of intellectual property and are able to advise on a wide range of technical and commercial issues in this field. The obtained results will have a positive impact on the reform of the institute of representatives in the field of intellectual property in Ukraine in order to ensure its effectiveness and relevance to the challenges of the present.

  20. Viewpoints of students of Shahid Sadoughi University of Medical Sciences regarding their academic advisors

    Directory of Open Access Journals (Sweden)

    M.H Fallah Yakhdani

    2012-02-01

    Results: The majority of samples were from Nursing, Midwifery, and Public Health School and a few from Faculty of Medicine. The majority of students (41.8% agreed to have the same advisor from the first term to the last. Also the results showed that the functions of advisors were poor in the areas of constant supervision and monitoring of students’ educational status (35.8%, preparing the timetable for performing the personal or group counseling (41.8% and providing counseling sessions according to the timetable (42.3%. But their functions were fair in the areas of acceptable guidance of students in the educational problems (35.1%, and the advisor’s familiarity to educational regulations (43.9%. It is necessary to note that the advisor's ability in making the intimate relationship with students (37.1%, and the advisors’ motivation and tendency to guidance and counseling (30.1% were the two items evaluated excellent by students. Conclusion: It is necessary that advisors make the students familiar with educational regulations at the first semester of higher education. Also, the policies and regulations for advisors will clarify their activities and will help them to perform better.

  1. Relationship between Corporate Governance and Information Security Governance Effectiveness in United States Corporations

    Science.gov (United States)

    Davis, Robert E.

    2017-01-01

    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing…

  2. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  3. 2001 Joint ADVISOR/PSAT Vehicle Systems Modeling User's Conference Proceedings (CD)

    International Nuclear Information System (INIS)

    Markel, T.

    2001-01-01

    The 2001 Joint ADVISOR/PSAT Vehicle Systems Modeling User Conference provided an opportunity for engineers in the automotive industry and the research environment to share their experiences in vehicle systems modeling using ADVISOR and PSAT. ADVISOR and PSAT are vehicle systems modeling tools developed and supported by the National Renewable Energy Laboratory and Argonne National Laboratory respectively with the financial support of the US Department of Energy. During this conference peers presented the results of studies using the simulation tools and improvements that they have made or would like to see in the simulation tools. Focus areas of the presentations included Control Strategy, Model Validation, Optimization and Co-Simulation, Model Development, Applications, and Fuel Cell Vehicle Systems Analysis. Attendees were offered the opportunity to give feedback on future model development plans

  4. The figure of the helper advisor in cases of sexual abuse against people with intellectual disabilities

    Directory of Open Access Journals (Sweden)

    Almudena MARTORELL CAFRANGA

    2017-09-01

    Full Text Available In this paper we analyse the main barriers that people with intellectual disabilities who have suffered sexual abuse have to face when they access the Justice system. Regarding these barriers, the Victim Support Unit for People with Intellectual Disabilities of the Fundación Carmen Pardo-Valcarce proposes the inclusion in the judicial process of a helper advisor. The entry into force in 2015 of the Law 4/2015, in 27 April, the Statute of the crime victim represents an exemplary opportunity to ensure the incorporation of support proposals involving the insertion of the helper advisor in the judicial process in cases where the victim is a person with intellectual disabilities. In this paper we analyse the impact of the helper advisor, with particular emphasis on cases that have been dismissed under instruction.

  5. 2001 Joint ADVISOR/PSAT Vehicle Systems Modeling User's Conference Proceedings (CD)

    Energy Technology Data Exchange (ETDEWEB)

    Markel, T.

    2001-08-01

    The 2001 Joint ADVISOR/PSAT Vehicle Systems Modeling User Conference provided an opportunity for engineers in the automotive industry and the research environment to share their experiences in vehicle systems modeling using ADVISOR and PSAT. ADVISOR and PSAT are vehicle systems modeling tools developed and supported by the National Renewable Energy Laboratory and Argonne National Laboratory respectively with the financial support of the US Department of Energy. During this conference peers presented the results of studies using the simulation tools and improvements that they have made or would like to see in the simulation tools. Focus areas of the presentations included Control Strategy, Model Validation, Optimization and Co-Simulation, Model Development, Applications, and Fuel Cell Vehicle Systems Analysis. Attendees were offered the opportunity to give feedback on future model development plans.

  6. 78 FR 30346 - Financial Investors Trust and Hanson McClain Strategic Advisors, Inc.; Notice of Application

    Science.gov (United States)

    2013-05-22

    ...] Financial Investors Trust and Hanson McClain Strategic Advisors, Inc.; Notice of Application May 15, 2013... instruments. Applicants: Financial Investors Trust (the ``Trust''), on behalf of the Pathway Advisors... consistent with the public interest and the protection of investors. Applicants seek an exemption under...

  7. Contextualizing Gay-straight Alliances: Student, Advisor, and Structural Factors Related to Positive Youth Development among Members

    Science.gov (United States)

    Poteat, V. Paul; Yoshikawa, Hirokazu; Calzo, Jerel P.; Gray, Mary L.; DiGiovanni, Craig D.; Lipkin, Arthur; Mundy-Shephard, Adrienne; Perrotti, Jeff; Scheer, Jillian R.; Shaw, Matthew P.

    2015-01-01

    Gay-straight alliances (GSAs) may promote resilience. Yet, what GSA components predict well-being? Among 146 youth and advisors in 13 GSAs (58% lesbian, gay, bisexual, or questioning; 64% White; 38% received free/reduced-cost lunch), student (demographics, victimization, attendance frequency, leadership, support, control), advisor (years served,…

  8. Trainer module for security control center operations

    International Nuclear Information System (INIS)

    Bernard, E.A.

    1982-01-01

    An operator trainer module has been developed to be used with the security control center equipment to be installed as part of a safeguards physical protection system. The module is designed to provide improved training and testing capabilities for control center operators through the use of simulations for perimeter equipment operations. Operators, through the trainer module, can be challenged with a variety of realistic situations which require responsive action identical to that needed in an actual system. This permits a consistent evaluation and confirmation of operator capabilities prior to assignment as an operator and allows for periodic retesting to verify that adequate performance levels are maintained

  9. History of physical security R and D

    International Nuclear Information System (INIS)

    Myre, W.C.; De Montmollin, J.M.

    1987-01-01

    Serious concern about physical protection of nuclear facilities began around 1972. R and D was initiated at Sandia National Laboratory which had developed techniques to protect weapons for many years. Special vehicles, convoy procedures, and a communications system previously developed for weapons shipments were improved and extended for shipments of other sensitive materials. Barriers, perimeter alarms, portal and internal control systems were developed, tested, and published in handbooks and presented at symposia. Training programs were initiated for U.S. and foreign personnel. Containment and surveillance techniques were developed for the IAEA. Presently emphasis is on computer security, active barriers, and techniques to prevent theft or sabotage by ''insiders''

  10. United States Security Assistance 1977-1980: Human Rights Issues Affecting Arms Transfers.

    Science.gov (United States)

    1995-09-01

    police attempted to break up the gathering, the crowd became enraged and proceeded to destroy a number of banks, cinemas , and hotels (Brown:296...According to Carter’s National Security Advisor, Zbigniew Brzezinski, the Peruvian government released over 300 prisoners in April 1977; "disappearances

  11. 75 FR 79061 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Science.gov (United States)

    2010-12-17

    ... securities advisors--the Commission seeks comment on whether the proposed structure of the MSRB Nominating... membership on the Board, in order to establish a Nominating Committee in compliance with MSRB transitional... appropriate prior to the creation of the Nominating Committee of the MSRB (hereinafter, ``Nominating and...

  12. 78 FR 44607 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of a...

    Science.gov (United States)

    2013-07-24

    ... (collectively ``regulated entities''). It is governed by a 21- member board composed of eleven independent... directors in overseeing the municipal securities market, it is imperative that the board identify candidates... non- dealer municipal advisors. The public representatives must be independent of any regulated entity...

  13. Physiological intracellular crowdedness is defined by perimeter to area ratio of subcellular compartments

    Directory of Open Access Journals (Sweden)

    Noriko eHiroi

    2012-07-01

    Full Text Available The intracellular environment is known to be a crowded and inhomogeneous space. Such an in vivo environment differs from a well-diluted, homogeneous environment for biochemical reactions. However, the effects of both crowdedness and the inhomogeneity of environment on the behavior of a mobile particle have not yet been investigated sufficiently. As described in this paper, we constructed artificial reaction spaces with fractal models, which are assumed to be non-reactive solid obstacles in a reaction space with crevices that function as operating ranges for mobile particles threading the space. Because of the homogeneity of the structures of artificial reaction spaces, the models succeeded in reproducing the physiological fractal dimension of solid structures with a smaller number of non-reactive obstacles than in the physiological condition. This incomplete compatibility was mitigated when we chose a suitable condition of a perimeter-to-area ratio of the operating range to our model. Our results also show that a simulation space is partitioned into convenient reaction compartments as an in vivo environment with the exact amount of solid structures estimated from TEM images. The characteristics of these compartments engender larger mean square displacement of a mobile particle than that of particles in smaller compartments. Subsequently, the particles start to show confined particle-like behavior. These results are compatible with our previously presented results, which predicted that a physiological environment would produce quick-response and slow-exhaustion reactions.

  14. The way of land use in the perimeter of town Podu Iloaiei.

    Directory of Open Access Journals (Sweden)

    Irina Elena TODAŞCĂ

    2010-04-01

    Full Text Available Podu Iloaiei is situated in the south part of Jijia Plain, in Bahlui hydrographic basin. The relief is predominantlysculptural, followed by the accumulation relief. There are quaternary and basarabian  sediments/deposits. The climate is temperate-continental with dryness nuances whichcontributed to the growth of forest steppe vegetation. The hidrography is represented by Bahlui river and its main tributary: Bahluet. Pedological layer is influenced by the particular factors and processes of pedogenesis of Podu Iloaiei. There are spread types ofsoil from the following soil classes:cernisols, fluvisols, protisols and anthrosols. Podu Iloaiei perimeter didn’t have a spectacular evolution concerning its target. Its use is predominantly agricultural(83%, no matter the period studied(before and after 1990 orits recently rural-urban administrative structure. We may speak, in this case, about the existence of an agricultural-town. Many lands of Podu Iloaiei research station were taken over after 1990, by local entrepreneurs who preserve the modern techniques of land use,inherited from it. More than that, it feels the pressure of Iasi city, which determined some lands to get real interest.

  15. Constructibility Challenges for Perimeter Control Blasting and Slope Development in Shale and Other "Weak" Rocks

    Science.gov (United States)

    Scarpato, D. J.

    2016-02-01

    Slope construction in shale can present some interesting challenges for geotechnical design engineers and contractors alike. There are challenges that can be expected and designed for; however, all too frequently, such challenges manifest themselves as "surprises" in the field. Common constructibility challenges can include drill hole deviation during drilling for controlled blasting; and, excavation slope instability arising from inconsistent perimeter control drilling. Drill hole deviation results from the cumulative effects from both drilling mechanics and rock mass conditions. Once a hole has initiated the deviation trajectory, it is difficult to rectify drill steel position. Although such challenges are not necessarily unique to shale, they are often exacerbated by weak, weathered and transversely isotropic nature of bedrock conditions. All too often, the working assumption is that shale is "soft" and easily excavatable; however, this blanket assumption can prove to be costly. This paper is intended to provide design professionals and contractors with the practical considerations needed to avoid the "surprises" associated with drill hole deviation, and minimize the potential for costly claims.

  16. Availability of processed foods in the perimeter of public schools in urban areas.

    Science.gov (United States)

    Leite, Fernanda Helena Marrocos; Oliveira, Maria Aparecida de; Cremm, Elena Carvalho; Abreu, Débora Silva Costa de; Maron, Luana Rieffe; Martins, Paula Andrea

    2012-07-01

    To assess the availability of food in relation to their degree of industrial processing and the types of food stores in the perimeters of elementary schools. This is a cross-sectional study. 82 food stores located within a 500 m radius buffer of three public schools located in three distinct regions with different socioeconomic levels in the municipality of Santos, state of São Paulo, Brazil, were assessed. All streets within a 500-meter radius of the schools were covered, geographic coordinates were recorded and information about the stores and food items available were collected by direct observation and interview with store managers. Available food items were classified in relation to their degree of industrial processing as ultra-processed foods and minimally processed foods. Kernel's density maps were used to assess the degree of agglomeration of stores near the schools. The stores that offered mostly ultra-processed foods were significantly closer to schools than those who offered mostly minimally processed foods. There was a significant difference between the availability of processed food in different types of stores and between the three regions assessed. The data found by this work evidence that children who attend the three public schools assessed are exposed to an environment that encourages the consumption of ultra-processed foods through easier access of these products in the studied stores.

  17. Full perimeter intersection criteria. Definitions and implementations in SR-Site

    Energy Technology Data Exchange (ETDEWEB)

    Munier, Raymond

    2010-03-15

    Large fractures intersecting canisters have potential to reactivate due to nearby earthquakes and thereby jeopardising the canister/buffer integrity. The use of full perimeter intersection (FPI) as a proxy for fracture size has been explored within SKB since late 2004. A methodology to use FPI as a deposition hole rejection criterion was first reported in and the concept has successively matured ever since. As a response to feedback obtained from various instances of our organisation and external reviewers, additional analyses and benchmarks were reported in 2007. An analytical solution to the canister/fracture intersection probability was introduced, which enabled us to benchmark various aspects of the FPI simulations. The methodology was first applied within the framework of SR-CAN to compute the number of potentially critical canister positions and soon after, based on preliminary DFN models, as one of many prerequisites for repository design. The methodology and simulation logic has evolved substantially ever since it was originally reported in 2006 and the present report is intended to entirely replace previous reports on this subject, to thereby provide the interested reader with an description of the modelling procedure, prerequisites and limitations. As a consequence thereof, major portions of previous reports are repeated herein, though we occasionally refer to these reports for comparative purposes. Furthermore, as the final versions of the site descriptive models have been reported we find it convenient to, within this report, also apply the methodology using the most actual site specific fracture data

  18. How do incentives lead to deception in advisor-client interactions? Explicit and implicit strategies of self-interested deception.

    Science.gov (United States)

    Mackinger, Barbara; Jonas, Eva

    2012-01-01

    When confronted with important questions we like to rely on the advice of experts. However, uncertainty can occur regarding advisors' motivation to pursue self-interest and deceive the client. This can especially occur when the advisor has the possibility to receive an incentive by recommending a certain alternative. We investigated how the possibility to pursue self-interest led to explicit strategic behavior (bias in recommendation and transfer of information) and to implicit strategic behavior (bias in information processing: evaluation and memory). In Study 1 explicit strategic behavior could be identified: self-interested advisors recommended more often the self-serving alternative and transferred more self-interested biased information to their client compared to the advisor without specific interest. Also deception through implicit strategic behavior was identified: self-interested advisors biased the evaluation of information less in favor of the client compared to the control group. Self-interested advisors also remembered conflicting information regarding their self-interest worse compared to advisors without self-interest. In Study 2 beside self-interest we assessed accountability which interacted with self-interest and increased the bias: when accountability was high advisor's self-interest led to higher explicit strategic behavior (less transfer of conflicting information), and to higher implicit strategic behavior (devaluated and remembered less conflicting information). Both studies identified implicit strategic behavior as mediator which can explain the relation between self-interest and explicit strategic behavior. Results of both studies suggest that self-interested advisors use explicit and implicit strategic behavior to receive an incentive. Thus, advisors do not only consciously inform their clients "self-interested," but they are influenced unconsciously by biased information processing - a tendency which even increased with high

  19. Personal finance: there are no shortcuts to financial security.

    Science.gov (United States)

    Yarkony, Kathryn

    2009-12-01

    Perioperative nurses have skills that lend themselves to sound financial decision-making, and during these difficult economic times, it is important to know how to secure earnings for the future. Key strategies include saving for retirement, consulting a financial advisor, investing in reliable vehicles, holding investments until the market stabilizes, and controlling credit card debt. Nurses can use the nursing process of assessment, diagnosis, planning, implementation, and evaluation to help them make sound financial decisions. (c) AORN, Inc, 2009.

  20. A Strategy for American Power: Energy, Climate and National Security

    Science.gov (United States)

    2008-06-01

    For example, Greg Mankiw , Harvard economist and former chair of President Bush’s Council of Economic Advisors, has proposed phasing in a $1 per...International Energy Barrier By Amy Myers Jaffe 77 Chapter V: Overcoming the Economic Barriers to Climate Change and Energy Security By Jason Furman (lead...Hamilton Project. He previously served in the Clinton administration and at the Council of Economic Advisers, the National Economic Council, and the World

  1. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  2. Ties That Bind: Academic Advisors as Agents of Student Relationship Management

    Science.gov (United States)

    Vianden, Jörg

    2016-01-01

    To affect college retention, academic advisors should act as agents of student relationship management by strengthening the connection between students and their institutions. Satisfaction and dissatisfaction with academic advising as perceived by 29 college students at 3 midwestern comprehensive institutions are described. Discussion is framed in…

  3. Exploring Inner Speech as a Psycho-Educational Resource for Language Learning Advisors

    Science.gov (United States)

    McCarthy, Tanya M.

    2018-01-01

    The analysis of advising sessions has recognized common standards of the profession in areas such as advising skills employed and non-verbal communicative practices. There are however numerous variations in advisor behavior due to differences in cognitive processes. This study used a stimulated recall approach to identify the content of inner…

  4. 77 FR 10736 - President's Council of Advisors on Science and Technology (PCAST)

    Science.gov (United States)

    2012-02-23

    ... an overview of the Department of Agriculture's science, technology, and innovation activities, and... DEPARTMENT OF ENERGY President's Council of Advisors on Science and Technology (PCAST) AGENCY... Science and Technology (PCAST), and describes the functions of the Council. Notice of this meeting is...

  5. Teachers Providing Social and Emotional Support: A Study of Advisor Role Enactment in Small High Schools

    Science.gov (United States)

    Phillippo, Kate L.

    2010-01-01

    Background/Context: This study investigates the teacher's role in the student advisory process, which to date has generated limited research literature. Teachers who serve as student advisors assume a role that extends beyond the more traditional instructional role, and includes implied or explicit expectations to provide student advisees with…

  6. 40 CFR 35.4190 - How does my group identify a qualified technical advisor?

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false How does my group identify a qualified technical advisor? 35.4190 Section 35.4190 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GRANTS...: (1) Demonstrated knowledge of hazardous or toxic waste issues, relocation issues, redevelopment...

  7. 77 FR 65593 - PNC Capital Advisors, LLC, et al.; Notice of Application

    Science.gov (United States)

    2012-10-29

    ... registered open-end management investment companies that operate as ``funds of funds'' to acquire shares of.... Applicants: PNC Capital Advisors, LLC (``Adviser'') and PNC Funds and PNC Advantage Funds (each a ``Trust... statutory trust. Each Trust is comprised of separate series that pursue distinct investment objectives and...

  8. The Moderating Effect of Personality Traits on Advisor Relationships in Predicting Doctoral Student Burnout

    Science.gov (United States)

    Kosh, Emily P.

    2014-01-01

    Personality affects relationships. During the doctoral education, the second most important factor in degree completion, after financial support, is the student-advisor relationship. Approximately half of doctoral students do not finish their degrees. While it is known mentors have a profound impact on the success of doctoral students, the effect…

  9. Aspects Fostering the Programming of Today's College Radio Station: The Advisor's Perspective.

    Science.gov (United States)

    Sauls, Samuel J.

    To help ascertain leadership, guidance, and capabilities of the station advisor (those who foster the efforts of their student staffs), this paper provides an overview of programming elements discussing such topics as programming philosophy, general formats, and legal and ethical issues. It states that those advising the campus radio station can…

  10. Installation and evaluation of a nuclear power plant operator advisor based on artificial intelligence technology

    International Nuclear Information System (INIS)

    Hajek, B.K.; Miller, D.W.

    1989-01-01

    This report discusses the following topics on a Nuclear Power Plant operator advisor based on artificial Intelligence Technology; Workstation conversion; Software Conversion; V ampersand V Program Development Development; Simulator Interface Development; Knowledge Base Expansion; Dynamic Testing; Database Conversion; Installation at the Perry Simulator; Evaluation of Operator Interaction; Design of Man-Machine Interface; and Design of Maintenance Facility

  11. Graduate Students' Perceptions of Their Advisors: Is There Systematic Disadvantage in Mentorship?

    Science.gov (United States)

    Noy, Shiri; Ray, Rashawn

    2012-01-01

    We explore how race and gender shape graduate students' perceptions of their advisors. We find evidence that women of color and students in the biological/physical sciences report significantly less support than other groups. Our findings speak to the utility of the intersectionality framework for examining interpersonal relations in higher…

  12. Architects, Captains, and Dreamers: Creating Advisor Roles that Foster Youth-Adult Partnerships

    Science.gov (United States)

    Mitra, Dana; Lewis, Tiffanie; Sanders, Felicia

    2013-01-01

    While research has documented the many ways in which student voice can enable educational change, the process of how adults can help to enable student voice is less clear. This article examines how adults new to working as advisors of student voice initiatives begin to develop partnerships with young people. Using a Youth-Adult Partnership…

  13. The treatment implementation advisor: a component of the GypsES project

    Science.gov (United States)

    Michael C. Saunders; Michael A. Foster

    1991-01-01

    The treatment implementation advisor is one of the knowledge based advisory modules of GypsES, a knowledge system environment for decision support in gypsy moth management. Its function is to provide detailed advice on intervention tactics for gypsy moth: e.g. aerial and ground application of insecticides and microbials, inundative or augmentative releases of...

  14. Bioenergy, Land Use Change and Climate Change Mitigation. Report for Policy Advisors and Policy Makers

    Energy Technology Data Exchange (ETDEWEB)

    Berndes, Goran [Chalmers Univ. of Technology (Sweden); Bird, Nell [Joanneum Research (Austria); Cowle, Annette [National Centre for Rural Greenhouse Gas Research (Australia)

    2010-07-01

    The report addresses a much debated issue - bioenergy and associated land use change, and how the climate change mitigation from use of bioenergy can be influenced by greenhouse gas emissions arising from land use change. The purpose of the report was to produce an unbiased, authoritative statement on this topic aimed especially at policy advisors and policy makers.

  15. 76 FR 70779 - President's Council of Advisors on Science and Technology

    Science.gov (United States)

    2011-11-15

    ... University of Michigan North Campus Research Complex, 2800 Plymouth Road, Building 18, Ann Arbor, MI 48109... the University of Michigan North Research Complex from 8:30 a.m. to 2:45 p.m. on December 12, 2011... OFFICE OF SCIENCE AND TECHNOLOGY POLICY President's Council of Advisors on Science and Technology...

  16. The Advisor as Servant: The Theoretical and Philosophical Relevance of Servant Leadership to Academic Advising

    Science.gov (United States)

    McClellan, Jeffrey L.

    2007-01-01

    Servant. This novel actively portrays Greenleaf's concept of servant leadership by describing the extracurricular work of a university professor. Consequently, some scholars have demonstrated the relevance of servant leadership to classroom instruction (Powers & Moore, 2005). However, it was not as an instructor, but as an advisor that the…

  17. Elaboration et Suivi des Budgets de Marketing Industriel: le Système ADVISOR

    OpenAIRE

    Choffray, Jean-Marie; Delabre, Gilles

    1982-01-01

    Cet article revoit les problèmes posés par l'élaboration et le suivi des budgets de marketing dans un environnement industriel. Il présente le système ADVISOR pour lequel nous avons développé un programme interactif adapté aux besoins des entreprises Françaises.

  18. Dissemination of colorectal cancer screening by Filipino American community health advisors: a feasibility study.

    Science.gov (United States)

    Maxwell, Annette E; Danao, Leda L; Bastani, Roshan

    2013-07-01

    Filipino Americans underutilize life-saving screening tests for colorectal cancer, resulting in late stage of diagnosis and poor survival relative to other racial/ethnic groups. Education regarding colorectal cancer screening and distribution of free fecal occult blood test (FOBT) kits are evidence-based interventions that can significantly increase screening. However, this community will only benefit if the intervention is broadly disseminated. We assessed the feasibility of promoting colorectal cancer screening in Filipino American community settings working with community health advisors, and the practicality of conducting one-on-one or small group education, in addition to passing out free FOBT kits. Twenty community health advisors from 4 organizations engaged in recruitment and education activities with 132 participants. Community health advisors consistently completed screening questionnaires to establish eligibility and kept logs of FOBT distribution. However, they did not consistently record eligible participants who did not consent to participate. Process checklists that indicated what information was covered in each educational session and postsession follow-up logs were partially completed. Almost all participants reported receipt of intervention components and receipt of screening at 4-month follow-up and reported high acceptability of the program. The pilot study established the feasibility of working with community health advisors to promote colorectal cancer screening in Filipino American community settings. Findings informed the design of a dissemination trial that is currently ongoing with regards to monitoring recruitment, intervention implementation and follow-up and allowing flexibility regarding one-on-one or small group education.

  19. Demographic Trends and Advocacy Experiences of Gay-Straight Alliance Advisors

    Science.gov (United States)

    Graybill, Emily C.; Varjas, Kris; Meyers, Joel; Dever, Bridget V.; Greenberg, Daphne; Roach, Andrew T.; Morillas, Catalina

    2015-01-01

    Using an ecological model, the individual-, school-, and sociocultural-level characteristics that affect gay-straight alliance (GSA) advisors were examined in the current study. The formation of GSAs has been one way that schools have sought to improve the school climate for lesbian, gay, bisexual, and transgender (LGBT) youth. Limited information…

  20. Culturally Competent Training Program: A Key to Training Lay Health Advisors for Promoting Breast Cancer Screening

    Science.gov (United States)

    Yu, Mei-yu; Song, Lixin; Seetoo, Amy; Cai, Cuijuan; Smith, Gary; Oakley, Deborah

    2007-01-01

    The lay health advisor (LHA) training program for breast cancer screening was conducted among Chinese-English bilingual trainees residing in Southeast Michigan. Guided by Bandura's Social Learning Theory, the development of the training curriculum followed the health communication process recommended by the National Cancer Institute. Data analysis…

  1. Student goal orientation in learning inquiry skills with modifiable software advisors

    Science.gov (United States)

    Shimoda, Todd Adrian

    A computer support environment (SCI-WISE) for learning and doing inquiry was designed. The system incorporates software advisors that give task completion advice (eg., forming hypotheses), general purpose advice (e.g., brainstorming), or system modification advice. Advisors' knowledge includes concepts, strategies, examples, referrals to other advisors, and criteria for evaluating good products and skills. Students using SCI-WISE can select the advisors' advice type (specific, general, or hints), and when advisors give advice (anytime, alert, or ask). Students can also modify the advisors' knowledge. The system is designed partly on a theoretical framework that assumes giving students higher levels of agency will facilitate higher-level goal orientation (such as knowledge-building) and produce higher levels of competence. In two studies of sixth graders, science students took a pretest of an open-ended inquiry question and a questionnaire that measured their goal orientations. The students worked in pairs on an inquiry project about memory, using one of two versions of SCI-WISE, one modifiable and one not modifiable. After finishing the project, the students took a posttest similar to the pretest, and evaluated the system. The main hypotheses predicted that knowledge-oriented students using the modifiable version would rate the system higher, use it more effectively, and do better on the inquiry posttest than task-oriented students. The results supported many of the hypotheses generated from the theoretical framework. Knowledge-oriented students tended to rate SCI-WISE higher, use more general purpose and system development advisors, and select more general advice and hints than task-oriented students. On the posttest inquiry test, students with higher goal orientations scored higher on average, particularly when paired with another knowledge oriented student. The studies also showed that goal orientation was not correlated with grade point average. Finally, the

  2. Analysis Of The Socioeconomic And Environmental Impacts Of Irrigated Agriculture In The Irrigated Perimeter Of Pau Dos Ferros (Rn

    Directory of Open Access Journals (Sweden)

    José Jobson Garcia de Almeida

    2014-07-01

    Full Text Available The Brazilian Government implemented irrigated perimeters to ameliorate problems of drought and poverty in the Northeast. In this sense, the objective of this work was to analyze the social, economic and environmental impacts generated by the practice of irrigated agriculture in the municipality of Pau dos Ferros-RN, resulting from the impacts caused by the activity. Obtained references on the topic, on-site visits and interviews with producers of the perimeter. It was observed the presence of negative impacts in the area, such as waste, contamination and water salinisation, compaction and soil erosion, deforestation caused by the removal of the native vegetation, high consumption of energy and public health problems.

  3. THE IMPACT ASSESSMENT OF THE ABANDONED URANIUM MINING EXPLOITATIONS ON ROCKS AND SOILS - ZIMBRU PERIMETER, ARAD COUNTY

    Directory of Open Access Journals (Sweden)

    DIANA M. BANU

    2016-10-01

    Full Text Available The mining exploration and exploitation, especially the activity of uranium mineralization exploration and exploitation has a negative impact on the environment by the alterations of the landscape and the degradation of the environmental factors' quality. The principal environmental factors that could be affected by mining operations resulting from uranium exploitation are: water, air, soil, population, fauna, and flora. The aim of this study is, first, to identify the sources of pollution (natural radionuclides - natural radioactive series of uranium, radium, thorium, potassium and heavy metals that are accompanying the mineralizations for two of the most important environmental factors: rocks and soils: and, second, to assess the pollution impact on those two environmental factors. In order to identify this pollutants and their impact assessment it was selected as a study case an abandoned uranium mining perimeter named the Zimbru perimeter located in Arad County, Romania.

  4. A study on optimization of hybrid drive train using Advanced Vehicle Simulator (ADVISOR)

    Energy Technology Data Exchange (ETDEWEB)

    Same, Adam; Stipe, Alex; Grossman, David; Park, Jae Wan [Department of Mechanical and Aeronautical Engineering, University of California, Davis, One Shields Ave, Davis, CA 95616 (United States)

    2010-10-01

    This study investigates the advantages and disadvantages of three hybrid drive train configurations: series, parallel, and ''through-the-ground'' parallel. Power flow simulations are conducted with the MATLAB/Simulink-based software ADVISOR. These simulations are then applied in an application for the UC Davis SAE Formula Hybrid vehicle. ADVISOR performs simulation calculations for vehicle position using a combined backward/forward method. These simulations are used to study how efficiency and agility are affected by the motor, fuel converter, and hybrid configuration. Three different vehicle models are developed to optimize the drive train of a vehicle for three stages of the SAE Formula Hybrid competition: autocross, endurance, and acceleration. Input cycles are created based on rough estimates of track geometry. The output from these ADVISOR simulations is a series of plots of velocity profile and energy storage State of Charge that provide a good estimate of how the Formula Hybrid vehicle will perform on the given course. The most noticeable discrepancy between the input cycle and the actual velocity profile of the vehicle occurs during deceleration. A weighted ranking system is developed to organize the simulation results and to determine the best drive train configuration for the Formula Hybrid vehicle. Results show that the through-the-ground parallel configuration with front-mounted motors achieves an optimal balance of efficiency, simplicity, and cost. ADVISOR is proven to be a useful tool for vehicle power train design for the SAE Formula Hybrid competition. This vehicle model based on ADVISOR simulation is applicable to various studies concerning performance and efficiency of hybrid drive trains. (author)

  5. The introduction of forensic advisors in Belgium and their role in the criminal justice system.

    Science.gov (United States)

    Bitzer, Sonja; Heudt, Laetitia; Barret, Aurélie; George, Lore; Van Dijk, Karolien; Gason, Fabrice; Renard, Bertrand

    2018-05-01

    Forensic advisors (FA) at the National Institute for Criminalistics and Criminology (NICC), generalists in forensic science, act as an advising body to the magistrate to improve communication between the various parties involved in the investigation: magistrate, police and crime scene investigators, and forensic experts. Their role is manifold, but their main objectives are to optimise trace processing by selecting the most pertinent traces in the context of the case and by advising magistrates on the feasibility of forensic analyses in particular circumstances in regards to the latest technical advances. Despite the absence of a legal framework governing their role and involvement in judicial cases, the demand for their services has increased over the years. Initially, forensic advisors were called for complex homicide cases. Due to the proximity with the Public Prosecutor's Office, the types of offences for which their expertise was sought have become more diverse (mainly including robbery, burglary and sexual assault cases), leading to a diversity in the types of cases handled by the forensic advisors (complex, simple and review). In many of the cases they are requested for, in addition to consulting on the best analytical strategy, forensic advisors also assume the role of case coordinator regarding the seized objects and their respective analyses. Indeed, in the majority of cases treated by the FAs, two or more types of expertise have been requested and performed, either at the internal laboratories of NICC or at external laboratories. This paper explains the role of the forensic advisors in Belgium, the path that let to their current status and problems encountered. Copyright © 2017 The Chartered Society of Forensic Sciences. Published by Elsevier B.V. All rights reserved.

  6. The influence of TripAdvisor portal on hotel bussines in Serbia

    Directory of Open Access Journals (Sweden)

    Čačić Krunoslav

    2013-01-01

    Full Text Available Numerous researches have shown the existence of influence of specialized Web 2.0 portals on hotel business. One of most famous portals of that kind is TripAdvisor. The goal of this work is to determine the degree and mode of representation of hotels in Serbia on TripAdvisor portal. The results of the conducted research show that in past years the number of hotels from Serbia represented on this portal has increased significantly. At the end of 2012 there have been registered 3.288 comments which evaluated the service quality of 165 hotels from Serbia. The average vote, on five-degree scale, calculated at the level of all represented hotels at the end of 2012 was 3,92. Considering that Belgrade represents the primarily business, administrative and touristic center of Serbia, on the Belgrade's hotels specimen there has been analyzed the connection between business performances of hotels expressed through indicator TREVPAR and their image on TripAdvisor expressed through average vote determined based on user's comments, as well as in relation with TripAdvisor Popularity Index (TPI. The results show the high degree of correlation between analyzed features on the specimen of Belgrade's hotels, in range of hotels of second (4* and third category (3*. Having in mind the results of conducted research it is obvious that the hotels managers from Serbia should adopt and implement the corresponding procedures of monitoring and adequate reactions on contents on TripAdvisor, considering their influence on behavior of modern consumer in hotels.

  7. Symmetric Link Key Management for Secure Neighbor Discovery in a Decentralized Wireless Sensor Network

    Science.gov (United States)

    2017-09-01

    KEY MANAGEMENT FOR SECURE NEIGHBOR DISCOVERY IN A DECENTRALIZED WIRELESS SENSOR NETWORK by Kelvin T. Chew September 2017 Thesis Advisor...and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT...DATE September 2017 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE SYMMETRIC LINK KEY MANAGEMENT FOR SECURE NEIGHBOR

  8. Economy Over Security: Why Crises Fail to Impact Economic Behavior in East Asia

    Science.gov (United States)

    2017-12-01

    SECURITY: WHY CRISES FAIL TO IMPACT ECONOMIC BEHAVIOR IN EAST ASIA by Aaron R. Sipos December 2017 Thesis Advisor: Michael Glosny Second...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE ECONOMY OVER SECURITY: WHY CRISES FAIL TO IMPACT ECONOMIC BEHAVIOR IN EAST...release. Distribution is unlimited. 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) This study examines changes in economic behavior in

  9. Uncertainties estimation in surveying measurands: application to lengths, perimeters and areas

    Science.gov (United States)

    Covián, E.; Puente, V.; Casero, M.

    2017-10-01

    The present paper develops a series of methods for the estimation of uncertainty when measuring certain measurands of interest in surveying practice, such as points elevation given a planimetric position within a triangle mesh, 2D and 3D lengths (including perimeters enclosures), 2D areas (horizontal surfaces) and 3D areas (natural surfaces). The basis for the proposed methodology is the law of propagation of variance-covariance, which, applied to the corresponding model for each measurand, allows calculating the resulting uncertainty from known measurement errors. The methods are tested first in a small example, with a limited number of measurement points, and then in two real-life measurements. In addition, the proposed methods have been incorporated to commercial software used in the field of surveying engineering and focused on the creation of digital terrain models. The aim of this evolution is, firstly, to comply with the guidelines of the BIPM (Bureau International des Poids et Mesures), as the international reference agency in the field of metrology, in relation to the determination and expression of uncertainty; and secondly, to improve the quality of the measurement by indicating the uncertainty associated with a given level of confidence. The conceptual and mathematical developments for the uncertainty estimation in the aforementioned cases were conducted by researchers from the AssIST group at the University of Oviedo, eventually resulting in several different mathematical algorithms implemented in the form of MATLAB code. Based on these prototypes, technicians incorporated the referred functionality to commercial software, developed in C++. As a result of this collaboration, in early 2016 a new version of this commercial software was made available, which will be the first, as far as the authors are aware, that incorporates the possibility of estimating the uncertainty for a given level of confidence when computing the aforementioned surveying

  10. COMPARISON OF FAST PERIMETRIC STRATEGIES USING G2 PROGRAM ON OCTOPUS 101 PERIMETER

    Directory of Open Access Journals (Sweden)

    Jernej Pajek

    2002-12-01

    Full Text Available Background. The duration of the perimetric examination was significantly shortened by development of fast perimetric strategies. By analyzing the results of normal, dynamic and TOP strategy we studied the differences in determination of MD, LV, in determination of number of all points with a deficit and number of points with a significant deficit of p < 0.5%.Methods. 22 normal visual fields of 17 subjects (mean age 33 ± 15 years and 22 visual fields with defects of 17 patients (47 ± 16 years having different types and degrees of visual lesions were examined. All visual fields were examined once with each strategy in alternating order using Octopus 101 perimeter with the G2 program.Results. No statistically significant differences were measured in MD values. In abnormal visual fields group, TOP strategy showed 11 ± 14 dB2 lower LV values compared to dynamic strategy (p < 0.01 and 9.8 ± 16 dB2 lower LV values compared to normal strategy (p = 0.02. In the abnormal visual fields group the dynamic strategy measured in average 3 points with the deficit less compared to the other two strategies (p < 0.05. There were no significant differences between strategies in the number of points with a deficit of p < 0.5%.Conclusions. With the exception of lower LV values measured with TOP strategy, the differences between TOP, dynamic strategy results are small and the time sparing benefits are substantial. Therefore the usage of fast perimetric strategies is clinically justified.

  11. 29 CFR Appendix F to Subpart R of... - Perimeter Columns: Non-Mandatory Guidelines for Complying With § 1926.756(e) To Protect the...

    Science.gov (United States)

    2010-07-01

    ... to Subpart R of Part 1926 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND... Steel Erection Pt. 1926, Subpt. R, App. F Appendix F to Subpart R of Part 1926—Perimeter Columns: Non...

  12. The process of candidates choose graduate programs: an analysis from the advisor perspective

    International Nuclear Information System (INIS)

    Nascimento, Ridnal Joao do

    2016-01-01

    This study aims to identify the criteria used by advisors in the decision-making on whether to accept a candidate for mentoring in a postgraduate strictu sensu program and examines possible relationships between this decision and their scientific production and mentees evasion. In order to meet these goals one seeks to identify and analyze the selection criteria of candidates for the master's and doctorate programs at an institution; in this case, the Energy and Nuclear Research Institute - IPEN. More specifically, one seeks to study similarities and differences between those criteria among the advisors; find out whether there is a correlation between the selection criteria and the advisors characteristics (Profile); identify the selection process used by advisors and point out which are the motivations that lead to evasion according to their point of view. To meet these challenges, as the starting point of the research, a conceptual model was designed in order to form the basis for the preparation of the script for the interviews with open-ended questions as to identify the selection criteria used by a small group of advisors with a predefined profile. From that point, based on the responses obtained in interviews, the survey was expanded to all advisors working in the IPEN Postgraduate program by implementing an online survey using Google Docs app for data collection. These data were then analyzed and reorganized according to an operational model of research that would guide the analysis by structural equation modeling (SEM) by means of the SmartPLS software, in order to identify the presence or absence of correlation between the criteria adopted by the advisors and their academic production and the evasion of their mentees, for that one relied on studies in: Bazerman and Moore (2010); Cohen (1988); Hair Jr. et al (2009); Hansmann and Ringle (2004); Martins (1997); Ringle, C.; Silva and Bido (2014); Sousa (2007); Sousa and Yu (2014); Torres (2014); Yu (2011

  13. A modular real time Operator Advisor expert system for installation on a full function nuclear power plant simulator

    International Nuclear Information System (INIS)

    Hajek, B.K.; Miller, D.W.; Bhatnagar, R.; Maresh, J.L.

    1989-01-01

    A knowledge-based expert system that uses the Generic Task approach is being developed to serve as an operator Advisor in the control room of a commercial nuclear power plant. Having identified the broad scope tasks performed by an operator in responding to abnormal plant conditions, our research team has modularized the Operator Advisor according to the tasks of (1) monitoring plant parameters, (2) classifying or diagnosing the abnormality, and (3) planning for execution of the procedures for recovery. The operator Advisor uses the Perry Nuclear Power Plant full-scope simulator as the reference system, and is currently being prepared for direct connection to the simulator

  14. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  15. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  16. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    terrorist or criminal targets based on their grade, assignment, symbolic value, criticality, and threat and vulnerability assessment. Levels of protection The recommendations contained in this criterion are intended to minimize the possibility of HRP casualties in buildings or portions of buildings in which they work and live. These recommendations provide appropriate and implementable measures to establish a level of protection against terrorist attacks where no known threat of terrorist activity currently exists. While complete protection against all potential threats is cost prohibitive, the intent of these recommendations can be achieved through prudent master planning, real estate acquisition, and design and construction practices. Tag number The tag number at the beginning of each physical security measure (recommendation is unique and is intended to be a communication aid when linking the requirement (recommendation to the supporting text or commentary. The three-character tag number uses the following legend. Tag Number First Character -The first character is an abbreviation for the defense zone layer that is most applicable for the countermeasure. “S” is used to represent site or external zone issues. “P” is used to represent the perimeter zone. “G” is used to represent issues relative to the property grounds. “E” is used to represent issues associated with the building exterior of the HRP office or residence. “I” is used to represent issues associated with the building interior. “H” is used to represent issues associated with the safe room or safe haven. Tag Number Second Character - The second character is a sequential number for countermeasures in a given zone - a requirement or a recommendation. This number ensures a unique tag number. Tag Number Third Character- The third character indicates whether the countermeasure is applicable to offices, residences, or both (common. “O” indicates a requirement or recommendation unique to

  17. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  18. Partnering With a Family Advisor to Improve Communication in a Pediatric Intensive Care Unit.

    Science.gov (United States)

    Czulada, Laura; Leino, Patience; Willis, Tina Schade

    2016-11-01

    Inadequate communication between medical teams and families can lead to errors and poor-quality care. The objective was to understand why communication between the clinical team and families was not occurring consistently in the pediatric intensive care unit and improve the system using a multidisciplinary improvement team including a family advisor. This improvement project used Lean Six Sigma. The team observed updates and collected documented communication, survey, interview, and focus group data from families and staff. Root causes of failures included lack of assigned responsibility, lack of defined daily update, and lack of a daily communication standard. Process changes were implemented, resulting in an increased mean documented communication rate from 13% pre intervention to 65% post intervention that was sustained for more than 2 years (P < .001). Including a family advisor as an equal member of an improvement team provides family empowerment and a greater chance of success in complex areas. © The Author(s) 2015.

  19. Design and Operational Evaluation of the Traffic Management Advisor at the Fort Worth Air Route Traffic Control Center

    Science.gov (United States)

    1997-06-19

    NASA and the Federal Aviation Administration (FAA) have designed and developed an automation tool known as the Traffic Management Advisor (TMA). The TMA is a time-based strategic planning tool that provides Traffic Management Coordinators (TMCs) and ...

  20. Decommissioning economic risk advisor: DERAD Version 1.0 user's manual. Final report

    International Nuclear Information System (INIS)

    Gjerde, A.R.; Qian, M.; Govil, P.; Balson, W.E.

    1995-04-01

    DERAD - Decommissioning Economic and Risk ADvisor - is a decision support tool designed to help utility decision makers analyze economics and financial risk of decommissioning nuclear power plants. Your current copy of DERAD, Version 1.0, is customized for PWR configurated plants. DERAD has been developed by Decision Focus Incorporated under EPRI sponsorship. If you have ideas or recommendations for how we can improve and enhance future versions of DERAD, we would like to hear from you

  1. Knowledge Sharing Among Tourists via Social Media: A Comparison Between Facebook and TripAdvisor

    OpenAIRE

    Okazaki Ono, Shintaro; Andreu, Luisa; Campo, Sara

    2016-01-01

    This paper examines tourists’ knowledge sharing behavior in social media. Based on social capital theory, we aim to examine the effects of three dimensions of social capital—structural (social interaction ties), cognitive (shared vision), and relational (trust)—for two different types of social media: Facebook and TripAdvisor. We propose a structural model that connects an antecedent (homophily) and a consequence (knowledge sharing through posting) of these main dimensions of social capital. ...

  2. Robo advisor, your reliable partner? Building a trustworthy digital investment management service

    OpenAIRE

    Salo, Anni

    2017-01-01

    Investment management services have strongly relied on traditional face-to-face business models, causing the services being highly expensive and therefore available only for the wealthiest population. Recently a new digital business model, robo advisors, entered the market and are predicted to democratise the entire industry by bringing investment management services available to a wider public than ever before. Although the business models in financial services are changing, customer tr...

  3. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  4. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  5. The Remote Security Station (RSS) final report

    International Nuclear Information System (INIS)

    Pletta, J.B.; Amai, W.A.; Klarer, P.; Frank, D.; Carlson, J.; Byrne, R.

    1992-10-01

    The Remote Security Station (RSS) was developed by Sandia National Laboratories for the Defense Nuclear Agency to investigate issues pertaining to robotics and sensor fusion in physical security systems. This final report documents the status of the RSS program at its completion in April 1992. The RSS system consists of the Man Portable Security Station (MaPSS) and the Telemanaged Mobile Security Station (TMSS), which are integrated by the Operator's Control Unit (OCU) into a flexible exterior perimeter security system. The RSS system uses optical, infrared, microwave, and acoustic intrusion detection sensors in conjunction with sensor fusion techniques to increase the probability of detection and to decrease the nuisance alarm rate of the system. Major improvements to the system developed during the final year are an autonomous patrol capability, which allows TMSS to execute security patrols with limited operator interaction, and a neural network approach to sensor fusion, which significantly improves the system's ability to filter out nuisance alarms due to adverse weather conditions

  6. How do incentives lead to deception in advisors-client interactions? Explicit and implicit strategies of self-interested deception.

    Directory of Open Access Journals (Sweden)

    Barbara eMackinger

    2012-12-01

    Full Text Available When confronted with important questions we like to rely on the advice of experts. However, uncertainty can occur regarding advisors’ motivation to pursue self-interest and deceive the client. This can especially occur when the advisor has the possibility to receive an incentive by recommending a certain alternative. We investigated how the possibility to pursue self-interest led to explicit strategic behavior (bias in recommendation and transfer of information and to implicit strategic behavior (bias in information processing: evaluation and memory. In Study 1 explicit strategic behavior could be identified: Self-interested advisors recommended more often the self-serving alternative and transferred more self-interested biased information to their client compared to the advisor without specific interest. Also deception through implicit strategic behavior was identified: Self-interested advisors biased the evaluation of information less in favor of the client compared to the control group. Self-interested advisors also remembered conflicting information regarding their self-interest worse compared to advisors without self-interest. In Study 2 beside self-interest we assessed accountability which interacted with self-interest and increased the bias: When accountability was high advisor’s self-interest led to higher explicit strategic behavior (less transfer of conflicting information, and to higher implicit strategic behavior (devaluated and remembered less conflicting information. Both studies identified implicit strategic behavior as mediator which can explain the relation between self-interest and explicit strategic behavior. Results of both studies suggest that self-interested advisors use explicit and implicit strategic behavior to receive an incentive. Thus, advisors do not only consciously inform their clients self-interested, but they are influenced unconsciously by biased information processing—a tendency which even increased with

  7. Expanding the Use of Time-Based Metering: Multi-Center Traffic Management Advisor

    Science.gov (United States)

    Landry, Steven J.; Farley, Todd; Hoang, Ty

    2005-01-01

    Time-based metering is an efficient air traffic management alternative to the more common practice of distance-based metering (or "miles-in-trail spacing"). Despite having demonstrated significant operational benefit to airspace users and service providers, time-based metering is used in the United States for arrivals to just nine airports and is not used at all for non-arrival traffic flows. The Multi-Center Traffic Management Advisor promises to bring time-based metering into the mainstream of air traffic management techniques. Not constrained to operate solely on arrival traffic, Multi-Center Traffic Management Advisor is flexible enough to work in highly congested or heavily partitioned airspace for any and all traffic flows in a region. This broader and more general application of time-based metering is expected to bring the operational benefits of time-based metering to a much wider pool of beneficiaries than is possible with existing technology. It also promises to facilitate more collaborative traffic management on a regional basis. This paper focuses on the operational concept of the Multi-Center Traffic Management Advisor, touching also on its system architecture, field test results, and prospects for near-term deployment to the United States National Airspace System.

  8. Testing the effects of perimeter fencing and elephant exclosures on lion predation patterns in a Kenyan wildlife conservancy.

    Science.gov (United States)

    Dupuis-Desormeaux, Marc; Davidson, Zeke; Pratt, Laura; Mwololo, Mary; MacDonald, Suzanne E

    2016-01-01

    The use of fences to segregate wildlife can change predator and prey behaviour. Predators can learn to incorporate fencing into their hunting strategies and prey can learn to avoid foraging near fences. A twelve-strand electric predator-proof fence surrounds our study site. There are also porous one-strand electric fences used to create exclosures where elephant (and giraffe) cannot enter in order to protect blocs of browse vegetation for two critically endangered species, the black rhinoceros (Diceros bicornis) and the Grevy's zebra (Equus grevyi). The denser vegetation in these exclosures attracts both browsing prey and ambush predators. In this study we examined if lion predation patterns differed near the perimeter fencing and inside the elephant exclosures by mapping the location of kills. We used a spatial analysis to compare the predation patterns near the perimeter fencing and inside the exclosures to predation in the rest of the conservancy. Predation was not over-represented near the perimeter fence but the pattern of predation near the fence suggests that fences may be a contributing factor to predation success. Overall, we found that predation was over-represented inside and within 50 m of the exclosures. However, by examining individual exclosures in greater detail using a hot spot analysis, we found that only a few exclosures contained lion predation hot spots. Although some exclosures provide good hunting grounds for lions, we concluded that exclosures did not necessarily create prey-traps per se and that managers could continue to use this type of exclusionary fencing to protect stands of dense vegetation.

  9. Testing the effects of perimeter fencing and elephant exclosures on lion predation patterns in a Kenyan wildlife conservancy

    Directory of Open Access Journals (Sweden)

    Marc Dupuis-Desormeaux

    2016-02-01

    Full Text Available The use of fences to segregate wildlife can change predator and prey behaviour. Predators can learn to incorporate fencing into their hunting strategies and prey can learn to avoid foraging near fences. A twelve-strand electric predator-proof fence surrounds our study site. There are also porous one-strand electric fences used to create exclosures where elephant (and giraffe cannot enter in order to protect blocs of browse vegetation for two critically endangered species, the black rhinoceros (Diceros bicornis and the Grevy’s zebra (Equus grevyi. The denser vegetation in these exclosures attracts both browsing prey and ambush predators. In this study we examined if lion predation patterns differed near the perimeter fencing and inside the elephant exclosures by mapping the location of kills. We used a spatial analysis to compare the predation patterns near the perimeter fencing and inside the exclosures to predation in the rest of the conservancy. Predation was not over-represented near the perimeter fence but the pattern of predation near the fence suggests that fences may be a contributing factor to predation success. Overall, we found that predation was over-represented inside and within 50 m of the exclosures. However, by examining individual exclosures in greater detail using a hot spot analysis, we found that only a few exclosures contained lion predation hot spots. Although some exclosures provide good hunting grounds for lions, we concluded that exclosures did not necessarily create prey-traps per se and that managers could continue to use this type of exclusionary fencing to protect stands of dense vegetation.

  10. Area G perimeter surface-soil and single-stage water sampling: Environmental surveillance for fiscal year 1993

    International Nuclear Information System (INIS)

    Conrad, R.; Childs, M.; Rivera-Dirks, C.; Coriz, F.

    1995-07-01

    Area G, in Technical Area 54, has been the principle facility at Los Alamos National Laboratory for the storage and disposal of low-level and transuranic (TRU) radioactive wastes since 1957. The current environmental investigation consisted of ESH-19 personnel who collected soil and single-stage water samples around the perimeter of Area G to characterize possible contaminant movement through surface-water runoff. These samples were analyzed for tritium, total uranium, isotopic plutonium, americium-241 (soil only), and cesium 137. The metals, mercury, lead, and barium, were analyzed using x-ray fluorescence

  11. Application Development: AN Interactive, Non-Technical Perspective of the Geology and Geomorphology of the Ouray Perimeter Tail, CO.

    Science.gov (United States)

    Allen, H. M.; Giardino, J. R.

    2015-12-01

    Each year people seek respite from their busy lifestyles by traveling to state or national parks, national forests or wilderness areas. The majority of these parks were established in order to help preserve our natural heritage, including wildlife, forests, and the beauty of landscapes formed from thousands of years of geologic/geomorphologic processes. Whilst being able to enjoy the tranquility of nature, tourists are being robbed of a more in-depth experience as a result of the lack of a geologic background. One such location that attracts a large number of summer tourists is the perimeter trail in Ouray, Colorado. Located in the Southwestern portion of Colorado, Ouray is situated in the beautiful San Juan Mountain range along the "Million Dollar Highway." The Perimeter trail is a six-mile trail loop that circles the city of Ouray. The city is a very popular place for summertime tourism because of its unparalleled scenery. Ouray is situated in an area that is riddled with textbook angular unconformities, metasedimentary, sedimentary, and volcanic rocks. In the study area, The San Juans have been beautifully sculpted by an array of major faulting events, glacial activity and volcanics. With the understanding that technology is ever expanding, we think there is no better way to experience the Perimeter Trail than to have an interactive application that will be both educational as well as interesting. This application is a non-technical way of looking at the geology and geomorphology of the perimeter trail. Additionally, a paper brochure shows the most noteworthy points of interest. The brochure contains a brief geologic history of the San Juan Mountains accompanied with annotated photographs to illustrate the complex geology/geomorphology encountered on the trail. The application is based on an interactive three-dimensional map, which can be zoomed to various scales. The app hosts a locational service that uses the phone's GPS to communicate location of the hiker

  12. The impact of patient advisors on healthcare outcomes: a systematic review

    Directory of Open Access Journals (Sweden)

    Anjana E. Sharma

    2017-10-01

    Full Text Available Abstract Background Patient advisory councils are a way for healthcare organizations to promote patient engagement. Despite mandates to implement patient advisory councils through programs like the Patient-Centered Medical Home (PCMH, there is a paucity of data measuring the impact of patients functioning in advisory roles. Our objective is to investigate whether patient engagement in patient advisory councils is linked to improvements in clinical quality, patient safety or patient satisfaction. Methods We searched PubMed, SCOPUS, CINAHL and Google Scholar for English language publications between November 2002 to August 2015, using a combination of “patient advisor” and “care outcomes” search terms. Article selection utilized dual screening facilitated by DistillerSR software, with group discussion to resolve discordance. Observational studies, randomized controlled trials, and case studies were included that described patients serving in an advisory role where primary outcomes were mentioned. Reference lists of included studies and grey literature searches were conducted. Qualitative thematic analysis was performed to synthesize results. Results Database searching yielded 639 articles total after removing duplicates, with 129 articles meeting full text inclusion criteria. 32 articles were identified for final review, 16 of which were case studies. Advisory roles included patient advisory councils, ad-hoc patient committees, community advisory councils, experience-based co-design, and other. Four practice-based studies from one research group, involving community advisors in the design of public health interventions, found improved clinical outcomes. No prospective experimental studies assessed the impact of patient advisors on patient safety or patient satisfaction. One cluster-randomized RCT showed that patient advisors helped health care planning efforts identify priorities more aligned with the PCMH. Ten case studies reported

  13. The use of geological data from pilot holes for predicting FPI (full perimeter intersection) fractures

    Energy Technology Data Exchange (ETDEWEB)

    Joutsen, A.

    2012-02-15

    Posiva Oy is responsible for preparation of final disposal of spent nuclear fuel in Olkiluoto. The knowledge about existing network of fractures is important for the safety and feasibility of the final repository. The bedrock properties essential for safety case are analyzed in investigations of Rock Suitability Criteria (RSC). One subtask in RSC is avoidance of large (long) fractures adjacent to disposal holes. The long fractures have been defined in tunnel mapping to indicate tunnel cross-cutting fractures (TCF) or full perimeter intersections (FPI). The purpose for this study was to evaluate the possibility of recognizing FPIs from drill cores by their geological properties. The study was carried out by correlating FPIs mapped from the ONKALO tunnel to the pilot holes logging data with a view of finding out which fracture in the pilot hole corresponds to the FPI in the tunnel. It was also estimated what kind of geological properties does FPIs commonly have in the tunnel and how does these properties differ from the FPI correlated pilot hole fractures. The data sources for this study are the pilot holes from ONK-PH8 to ONK-PH14 and the systematic geological mapping data. The FPIs used in this study usually follow the general trends of the fracturing in the Olkiluoto bedrock. The fracture surface profiles are principally undulating and a striation can be often seen on the fracture surfaces. The FPIs are frequently moderately to intensely altered with diverse filling mineralogy and thick fracture fillings in comparison to the regular fractures. The FPI correlated pilot hole fractures have slightly different properties in comparison to the FPIs. These fractures have wider range of different fracture surface profiles and are slightly less altered than the FPIs. Filling mineralogy follows the trends of the FPIs but filling thicknesses are thinner. These differences probably occur because of the variable uncertainties related to the correlation and to the fact that the

  14. The use of geological data from pilot holes for predicting FPI (full perimeter intersection) fractures

    International Nuclear Information System (INIS)

    Joutsen, A.

    2012-02-01

    Posiva Oy is responsible for preparation of final disposal of spent nuclear fuel in Olkiluoto. The knowledge about existing network of fractures is important for the safety and feasibility of the final repository. The bedrock properties essential for safety case are analyzed in investigations of Rock Suitability Criteria (RSC). One subtask in RSC is avoidance of large (long) fractures adjacent to disposal holes. The long fractures have been defined in tunnel mapping to indicate tunnel cross-cutting fractures (TCF) or full perimeter intersections (FPI). The purpose for this study was to evaluate the possibility of recognizing FPIs from drill cores by their geological properties. The study was carried out by correlating FPIs mapped from the ONKALO tunnel to the pilot holes logging data with a view of finding out which fracture in the pilot hole corresponds to the FPI in the tunnel. It was also estimated what kind of geological properties does FPIs commonly have in the tunnel and how does these properties differ from the FPI correlated pilot hole fractures. The data sources for this study are the pilot holes from ONK-PH8 to ONK-PH14 and the systematic geological mapping data. The FPIs used in this study usually follow the general trends of the fracturing in the Olkiluoto bedrock. The fracture surface profiles are principally undulating and a striation can be often seen on the fracture surfaces. The FPIs are frequently moderately to intensely altered with diverse filling mineralogy and thick fracture fillings in comparison to the regular fractures. The FPI correlated pilot hole fractures have slightly different properties in comparison to the FPIs. These fractures have wider range of different fracture surface profiles and are slightly less altered than the FPIs. Filling mineralogy follows the trends of the FPIs but filling thicknesses are thinner. These differences probably occur because of the variable uncertainties related to the correlation and to the fact that the

  15. Supporting non proliferation and global security efforts

    International Nuclear Information System (INIS)

    Pochon, E.

    2013-01-01

    CEA contributes as a major actor of France's action against nuclear proliferation and to the strengthening of nuclear security at national level as European and International levels, in particular through the support of the IAEA activities in nuclear non proliferation with the French Support Programme for the IAEA safeguards system and security with the contribution to the IAEA Nuclear Security Plan and cooperation projects with the European Commission. The CEA is a French government funded technological research organization, organized around 5 branches: Nuclear Energy, Technological Researches, Defence (DAM), Material Sciences and Life Sciences. Within the scope of its activities, CEA covers most of the research areas and techniques in nuclear non-proliferation and security. The CEA is also the advisor of the French Government on nuclear policy. Treaty monitoring and the development and implementation of non proliferation and global security programs is an important mission of DAM which rely on nuclear weapons manufacture and past testing experience. The programmes on non proliferation and global security carried out to fulfil DAM's mission cover the following areas: development of monitoring and detection methods and equipments, country profiles and nuclear stockpiles assessment, arms control instruments, proliferation resistance of nuclear fuel cycle, monitoring of nuclear tests, operation and maintenance of national detection capabilities and contribution to CTBT verification systems. (A.C.)

  16. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  17. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  18. Crop advisors as climate information brokers: Building the capacity of US farmers to adapt to climate change

    Directory of Open Access Journals (Sweden)

    Maria Carmen Lemos

    2014-01-01

    Full Text Available This paper examines the role of crop advisors as brokers of climate information to support US corn farmers to adapt to climatic change. It uses quantitative data collected from a broad survey of crop advisors in the US Corn Belt to examine the factors that shape advisors’ use of (and willingness to provide climate information to their clients. Building upon a general model of climate information usability we argue that advisors’ willingness to provide climate advice to farmers is influenced by three main factors: their information seeking habits and behavior, their experience with innovation in the past, and how climate information interplays with other kinds of information that they provide—especially agronomic advice. We find that advisors’ willingness to provide climate related information depends both on factors at the individual and organizational level and on the type of advice they provide. First, at the individual and organizational levels, advisors who work in supportive organizations and who collaborate with other advisors are more likely to provide climate information. Second, advisors are more likely to provide climate information if it does not interfere with their main profit making business (e.g. provision of agronomic advice. Third, there is a significant positive relationship between trust in a greater number or sources of information and use of climate information. Fourth, the way advisors perceive short- and long-term risk also influences their willingness to provide climate information; the more concerned they are about long-term climate-related risks to farming, the more likely they are to provide (or want to provide advice based on climate information. Differently from other empirical work in the literature, our analytical model suggests that neither negative experiences with climate information in the past nor the high level of uncertainty characteristic of climate information appear to influence advisors

  19. Science PhD career preferences: levels, changes, and advisor encouragement.

    Directory of Open Access Journals (Sweden)

    Henry Sauermann

    Full Text Available Even though academic research is often viewed as the preferred career path for PhD trained scientists, most U.S. graduates enter careers in industry, government, or "alternative careers." There has been a growing concern that these career patterns reflect fundamental imbalances between the supply of scientists seeking academic positions and the availability of such positions. However, while government statistics provide insights into realized career transitions, there is little systematic data on scientists' career preferences and thus on the degree to which there is a mismatch between observed career paths and scientists' preferences. Moreover, we lack systematic evidence whether career preferences adjust over the course of the PhD training and to what extent advisors exacerbate imbalances by encouraging their students to pursue academic positions. Based on a national survey of PhD students at tier-one U.S. institutions, we provide insights into the career preferences of junior scientists across the life sciences, physics, and chemistry. We also show that the attractiveness of academic careers decreases significantly over the course of the PhD program, despite the fact that advisors strongly encourage academic careers over non-academic careers. Our data provide an empirical basis for common concerns regarding labor market imbalances. Our results also suggest the need for mechanisms that provide PhD applicants with information that allows them to carefully weigh the costs and benefits of pursuing a PhD, as well as for mechanisms that complement the job market advice advisors give to their current students.

  20. Science PhD career preferences: levels, changes, and advisor encouragement.

    Science.gov (United States)

    Sauermann, Henry; Roach, Michael

    2012-01-01

    Even though academic research is often viewed as the preferred career path for PhD trained scientists, most U.S. graduates enter careers in industry, government, or "alternative careers." There has been a growing concern that these career patterns reflect fundamental imbalances between the supply of scientists seeking academic positions and the availability of such positions. However, while government statistics provide insights into realized career transitions, there is little systematic data on scientists' career preferences and thus on the degree to which there is a mismatch between observed career paths and scientists' preferences. Moreover, we lack systematic evidence whether career preferences adjust over the course of the PhD training and to what extent advisors exacerbate imbalances by encouraging their students to pursue academic positions. Based on a national survey of PhD students at tier-one U.S. institutions, we provide insights into the career preferences of junior scientists across the life sciences, physics, and chemistry. We also show that the attractiveness of academic careers decreases significantly over the course of the PhD program, despite the fact that advisors strongly encourage academic careers over non-academic careers. Our data provide an empirical basis for common concerns regarding labor market imbalances. Our results also suggest the need for mechanisms that provide PhD applicants with information that allows them to carefully weigh the costs and benefits of pursuing a PhD, as well as for mechanisms that complement the job market advice advisors give to their current students.

  1. Take me where I want to go: Institutional prestige, advisor sponsorship, and academic career placement preferences.

    Directory of Open Access Journals (Sweden)

    Diogo L Pinheiro

    Full Text Available Placement in prestigious research institutions for STEM (science, technology, engineering, and mathematics PhD recipients is generally considered to be optimal. Yet some doctoral recipients are not interested in intensive research careers and instead seek alternative careers, outside but also within academe (for example teaching positions in Liberal Arts Schools. Recent attention to non-academic pathways has expanded our understanding of alternative PhD careers. However, career preferences and placements are also nuanced along the academic pathway. Existing research on academic careers (mostly research-centric has found that certain factors have a significant impact on the prestige of both the institutional placement and the salary of PhD recipients. We understand less, however, about the functioning of career preferences and related placements outside of the top academic research institutions. Our work builds on prior studies of academic career placement to explore the impact that prestige of PhD-granting institution, advisor involvement, and cultural capital have on the extent to which STEM PhDs are placed in their preferred academic institution types. What determines whether an individual with a preference for research oriented institutions works at a Research Extensive university? Or whether an individual with a preference for teaching works at a Liberal Arts college? Using survey data from a nationally representative sample of faculty in biology, biochemistry, civil engineering and mathematics at four different Carnegie Classified institution types (Research Extensive, Research Intensive, Master's I & II, and Liberal Arts Colleges, we examine the relative weight of different individual and institutional characteristics on institutional type placement. We find that doctoral institutional prestige plays a significant role in matching individuals with their preferred institutional type, but that advisor involvement only has an impact on those

  2. Take me where I want to go: Institutional prestige, advisor sponsorship, and academic career placement preferences.

    Science.gov (United States)

    Pinheiro, Diogo L; Melkers, Julia; Newton, Sunni

    2017-01-01

    Placement in prestigious research institutions for STEM (science, technology, engineering, and mathematics) PhD recipients is generally considered to be optimal. Yet some doctoral recipients are not interested in intensive research careers and instead seek alternative careers, outside but also within academe (for example teaching positions in Liberal Arts Schools). Recent attention to non-academic pathways has expanded our understanding of alternative PhD careers. However, career preferences and placements are also nuanced along the academic pathway. Existing research on academic careers (mostly research-centric) has found that certain factors have a significant impact on the prestige of both the institutional placement and the salary of PhD recipients. We understand less, however, about the functioning of career preferences and related placements outside of the top academic research institutions. Our work builds on prior studies of academic career placement to explore the impact that prestige of PhD-granting institution, advisor involvement, and cultural capital have on the extent to which STEM PhDs are placed in their preferred academic institution types. What determines whether an individual with a preference for research oriented institutions works at a Research Extensive university? Or whether an individual with a preference for teaching works at a Liberal Arts college? Using survey data from a nationally representative sample of faculty in biology, biochemistry, civil engineering and mathematics at four different Carnegie Classified institution types (Research Extensive, Research Intensive, Master's I & II, and Liberal Arts Colleges), we examine the relative weight of different individual and institutional characteristics on institutional type placement. We find that doctoral institutional prestige plays a significant role in matching individuals with their preferred institutional type, but that advisor involvement only has an impact on those with a

  3. Reference Value Advisor: a new freeware set of macroinstructions to calculate reference intervals with Microsoft Excel.

    Science.gov (United States)

    Geffré, Anne; Concordet, Didier; Braun, Jean-Pierre; Trumel, Catherine

    2011-03-01

    International recommendations for determination of reference intervals have been recently updated, especially for small reference sample groups, and use of the robust method and Box-Cox transformation is now recommended. Unfortunately, these methods are not included in most software programs used for data analysis by clinical laboratories. We have created a set of macroinstructions, named Reference Value Advisor, for use in Microsoft Excel to calculate reference limits applying different methods. For any series of data, Reference Value Advisor calculates reference limits (with 90% confidence intervals [CI]) using a nonparametric method when n≥40 and by parametric and robust methods from native and Box-Cox transformed values; tests normality of distributions using the Anderson-Darling test and outliers using Tukey and Dixon-Reed tests; displays the distribution of values in dot plots and histograms and constructs Q-Q plots for visual inspection of normality; and provides minimal guidelines in the form of comments based on international recommendations. The critical steps in determination of reference intervals are correct selection of as many reference individuals as possible and analysis of specimens in controlled preanalytical and analytical conditions. Computing tools cannot compensate for flaws in selection and size of the reference sample group and handling and analysis of samples. However, if those steps are performed properly, Reference Value Advisor, available as freeware at http://www.biostat.envt.fr/spip/spip.php?article63, permits rapid assessment and comparison of results calculated using different methods, including currently unavailable methods. This allows for selection of the most appropriate method, especially as the program provides the CI of limits. It should be useful in veterinary clinical pathology when only small reference sample groups are available. ©2011 American Society for Veterinary Clinical Pathology.

  4. Perspective of the Science Advisor to the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    WEART, WENDELL D.

    1999-01-01

    In 1975 Sandia National Laboratories (SNL) was asked by the predecessor to the Department of Energy to assume responsibility for the scientific programs necessary to assure the safe and satisfactory development of a geologic repository in the salt beds of southeast New Mexico. Sandia has continued in the role of Science Advisor to the Waste Isolation Pilot Plant (WIPP) to the present time. This paper will share the perspectives developed over the past 25 years as the project was brought to fruition with successful certification by the Environmental Protection Agency (EPA) on May 13, 1998 and commencement of operations on April 26, 1999

  5. The life, times, and health care of Harry L Hopkins: Presidential advisor and perpetual patient.

    Science.gov (United States)

    Pappas, Theodore N; Swanson, Sven

    2018-02-01

    Harry Hopkins was the most important nontitled allied leader in World War II. He was the advisor to President Roosevelt who managed the diplomacy between Roosevelt, Churchill, and Stalin from 1941 to 1946. Throughout these times, Hopkins was ill and required transfusions, admissions to the hospital, and nutritional supplementation to keep him well enough to travel the world and manage the allied war diplomacy. There has been no unifying theory to account for all his symptoms and his reported pathologic and autopsy findings. In this paper, we will review his political and medical history and a differential diagnosis of his illness.

  6. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  7. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  8. Area G perimeter surface-soil and single-stage water sampling. Environmental surveillance for fiscal year 95. Progress report

    International Nuclear Information System (INIS)

    Childs, M.; Conrad, R.

    1997-09-01

    ESH-19 personnel collected soil and single-stage water samples around the perimeter of Area G at Los Alamos National Laboratory (LANL) during FY 95 to characterize possible radionuclide movement out of Area G through surface water and entrained sediment runoff. Soil samples were analyzed for tritium, total uranium, isotopic plutonium, americium-241, and cesium-137. The single-stage water samples were analyzed for tritium and plutonium isotopes. All radiochemical data was compared with analogous samples collected during FY 93 and 94 and reported in LA-12986 and LA-13165-PR. Six surface soils were also submitted for metal analyses. These data were included with similar data generated for soil samples collected during FY 94 and compared with metals in background samples collected at the Area G expansion area

  9. Spatial and Temporal Patterns of Unburned Areas within Fire Perimeters in the Northwestern United States from 1984 to 2014

    Science.gov (United States)

    Meddens, A. J.; Kolden, C.; Lutz, J. A.; Abatzoglou, J. T.; Hudak, A. T.

    2016-12-01

    Recently, there has been concern about increasing extent and severity of wildfires across the globe given rapid climate change. Areas that do not burn within fire perimeters can act as fire refugia, providing (1) protection from the detrimental effects of the fire, (2) seed sources, and (3) post-fire habitat on the landscape. However, recent studies have mainly focused on the higher end of the burn severity spectrum whereas the lower end of the burn severity spectrum has been largely ignored. We developed a spatially explicit database for 2,200 fires across the inland northwestern USA, delineating unburned areas within fire perimeters from 1984 to 2014. We used 1,600 Landsat scenes with one or two scenes before and one or two scenes after the fires to capture the unburned proportion of the fire. Subsequently, we characterized the spatial and temporal patterns of unburned areas and related the unburned proportion to interannual climate variability. The overall classification accuracy detecting unburned locations was 89.2% using a 10-fold cross-validation classification tree approach in combination with 719 randomly located field plots. The unburned proportion ranged from 2% to 58% with an average of 19% for a select number of fires. We find that using both an immediate post-fire image and a one-year post fire image improves classification accuracy of unburned islands over using just a single post-fire image. The spatial characteristics of the unburned islands differ between forested and non-forested regions with a larger amount of unburned area within non-forest. In addition, we show trends of unburned proportion related primarily to concurrent climatic drought conditions across the entire region. This database is important for subsequent analyses of fire refugia prioritization, vegetation recovery studies, ecosystem resilience, and forest management to facilitate unburned islands through fuels breaks, prescribed burning, and fire suppression strategies.

  10. Computer Security: How to succeed in software deployment

    CERN Multimedia

    Computer Security Team

    2014-01-01

    The summer student period has ended and we would like to congratulate all those who successfully accomplished their project! In particular, well done to those who managed to develop and deploy sophisticated web applications in the short summer season. Unfortunately, not all web applications made the final cut, moved into production and became visible on the Internet. We had to reject some... let me explain why.   Making a web application visible on the Internet requires an opening in the CERN outer perimeter firewall. Such a request is usually made through the CERN WebReq web interface. As standard procedure, the CERN Computer Security team reviews every request and performs a security assessment. This is where you, your supervisee and the Computer Security team all start to get frustrated. Many summer students delivered awesome web applications with great new functions and a good “look and feel” following precise use cases, using modern web technologies, dashboards, integr...

  11. Installation and evaluation of a nuclear power plant Operator Advisor based on artificial intelligence technology

    International Nuclear Information System (INIS)

    Hajek, B.K.; Miller, D.W.

    1993-02-01

    The Artificial Intelligence Group in the Nuclear Engineering Program has designed and built an Operator Advisor (OA), an AI system to monitor nuclear power plant parameters, detect component and system malfunctions, dispose their causes, and provide the plant operators with the correct procedures for mitigating the consequences of the malfunctions. It then monitors performance of the procedures, and provides backup steps when specific operator actions fail. The OA has been implemented on Sun 4 workstations in Common Lisp, and has been interfaced to run in real time on the Perry Nuclear Power Plant full-function simulator in the plant training department. The eventual goal for a fully functioning Operator Advisor would be to have reactor operators receive direction for all plant operations. Such a goal requires considerable testing of the system within limited malfunction boundaries, an extensive Verification ampersand Validation (V ampersand V) effort, a large knowledge base development effort, and development of tools as part of the system to automate its maintenance. Clearly, these efforts are beyond the scope of the feasibility effort expended during this project period. However, as a result of this project, we have an AI based platform upon which a complete system can be built

  12. A Career Exploration Program: An Effective Alternative to the Traditional Use of Faculty Advisors.

    Science.gov (United States)

    Olive, Kenneth E; Kwasigroch, Thomas E; Wooten, Daniel J; Lybrand, Cynthia; Peeples, Catherine R

    2016-11-01

    Providing medical students with resources to make effective career choices is challenging for medical schools as career options outnumber the formal clinical rotations students can experience during their undergraduate education. In 2009, the authors introduced the Career Exploration (CE) courses into the required curriculum at the Quillen College of Medicine. This three-course sequence includes large-group sessions addressing broad issues related to career choices, small-group specialty interest groups, individual student self-assessments, assignments through which students receive individualized feedback, and individual student advising sessions. The overall objective of the course sequence is to involve all students in career planning from the beginning of medical school so as to help them make more informed career decisions. The authors used improvement in student satisfaction with career planning activities as a surrogate measure for the outcome of helping students make more informed career choices. Students evaluated the CE courses positively, and overall satisfaction scores averaged 4 (1 = poor to 5 = excellent). Scores on Association of American Medical Colleges Graduation Questionnaire items related to career planning showed improved student satisfaction from 2010 to 2015. Succession planning for the first- and second-year career advisor is vital-as is faculty development for all clinical advisors to ensure that they have current information regarding both the curriculum and Match process, especially as residency selection becomes increasingly competitive. Enhancing the role of fourth-year students who serve as CE III mentors has the potential to prepare these students to be better teachers as residents.

  13. A Workflow-based Intelligent Network Data Movement Advisor with End-to-end Performance Optimization

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Michelle M. [Southern Illinois Univ., Carbondale, IL (United States); Wu, Chase Q. [Univ. of Memphis, TN (United States)

    2013-11-07

    Next-generation eScience applications often generate large amounts of simulation, experimental, or observational data that must be shared and managed by collaborative organizations. Advanced networking technologies and services have been rapidly developed and deployed to facilitate such massive data transfer. However, these technologies and services have not been fully utilized mainly because their use typically requires significant domain knowledge and in many cases application users are even not aware of their existence. By leveraging the functionalities of an existing Network-Aware Data Movement Advisor (NADMA) utility, we propose a new Workflow-based Intelligent Network Data Movement Advisor (WINDMA) with end-to-end performance optimization for this DOE funded project. This WINDMA system integrates three major components: resource discovery, data movement, and status monitoring, and supports the sharing of common data movement workflows through account and database management. This system provides a web interface and interacts with existing data/space management and discovery services such as Storage Resource Management, transport methods such as GridFTP and GlobusOnline, and network resource provisioning brokers such as ION and OSCARS. We demonstrate the efficacy of the proposed transport-support workflow system in several use cases based on its implementation and deployment in DOE wide-area networks.

  14. A Pervasive Social Networking Application: I-NFC enabled Florist Smart Advisor

    Science.gov (United States)

    Swee Wen, Khoo; Mahinderjit Singh, Manmeet

    2016-11-01

    Location based service is an information and entertainment service, accessible with mobile devices through the mobile network and utilizing the ability to make use of the geographical position of the mobile device. NFC location based service is using one of the modes of NFC such as peer-to-peer, reader/writer, and card emulation to obtain the information of the object and then get the location of the object. In this paper, the proposed solution is I- NFC-enabled Pervasive Social Networking apps for florists. It combines the NFC location based service with Online Social Network (OSN). In addition, a smart advisor in the system to provide output in making their own decision while purchasing products.The development of the system demonstrates that a designed commerce site is provided which enable a communication between NFC-enabled smartphone, NFC-enabled application and OSN. GPS functionalities also implemented to provide map and location of business services. Smart advisor also designed to provide information for users who do not have ideas what to purchase.

  15. Oxytocin facilitation of acceptance of social advice is dependent upon the perceived trustworthiness of individual advisors.

    Science.gov (United States)

    Luo, Ruixue; Xu, Lei; Zhao, Weihua; Ma, Xiaole; Xu, Xiaolei; Kou, Juan; Gao, Zhao; Becker, Benjamin; Kendrick, Keith M

    2017-09-01

    The neuropeptide oxytocin may increase social cohesion by making us more willing to trust others and/or to conform to their opinions. Here we investigated whether intranasal oxytocin can influence acceptance of advice given on solving everyday social problems by either individual expert (psychologist) or non-expert advisors with or without influencing their perceived likeability or trustworthiness. In a double-blind, between-subject, placebo-control design study in 160 male and female subjects, intranasal oxytocin (24IU) only significantly enhanced acceptance of advice given by female psychologists who were rated as the most trustworthy advisors. However, oxytocin itself did not alter either trustworthiness or likeability ratings. The oxytocin effect on acceptance of the female psychologist's advice was not maintained after a week, with subjects mainly reverting to their original solutions. These findings suggest that while oxytocin can transiently increase acceptance of advice from the most trustworthy individuals this is because it makes subjects more likely to conform to their opinions rather than enhancing their perceived trustworthiness or likeability. Thus in every day contexts oxytocin may primarily promote social cohesion by facilitating conformity towards the opinions of the most trusted individuals. Copyright © 2017. Published by Elsevier Ltd.

  16. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  17. How can the West Better Assist Partner Nations in Establishing Internal Security

    Science.gov (United States)

    2017-03-31

    disappointing results. At the heart of this issue is the inability to respond to failures of internal security in partner nations. This essay posits that...Antis, Ph. Deputy Director Joint Advanced War Thesis Advisors: Approved by: Signature: Peter IL Yeager, Colonel! Acting Dean of Faculty and Academic ...of an element of land forces to respond to a new, additional paradigm of war. This essay surveys why helping partner nations build transparent

  18. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  19. Computer Security: The dilemma of fractal defence

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Aren’t mathematical fractals just beautiful? The Mandelbrot set and the Julia set, the Sierpinski gasket, the Menger sponge, the Koch curve (see here)… Based on very simple mathematical rules, they quickly develop into a mosaic of facets slightly different from each other. More and more features appear the closer you zoom into a fractal and expose similar but not identical features of the overall picture.   Computer security is like these fractals, only much less pretty: simple at first glance, but increasingly complex and complicated when you look more closely at the details. The deeper you dig, the more and more possibilities open up for malicious people as the attack surface grows, just like that of “Koch’s snowflakes”, where the border length grows exponentially. Consequently, the defensive perimeter also increases when we follow the bits and bytes layer by layer from their processing in the CPU, trickling up the software stack thro...

  20. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  1. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  2. Rigorous derivation of the perimeter generating functions for the mean-squared radius of gyration of rectangular, Ferrers and pyramid polygons

    International Nuclear Information System (INIS)

    Lin, Keh Ying

    2006-01-01

    We have derived rigorously the perimeter generating functions for the mean-squared radius of gyration of rectangular, Ferrers and pyramid polygons. These functions were found by Jensen recently. His nonrigorous results are based on the analysis of the long series expansions. (comment)

  3. Evaluating the Relation between Dominant and Non-Dominant Hand Perimeters and Handgrip Strength of Basketball, Volleyball, Badminton and Handball Athletes

    Science.gov (United States)

    Kaplan, Defne Öcal

    2016-01-01

    In this study, it's aimed to evaluate the relation between dominant and non-dominant hand perimeters and handgrip strength of basketball, volleyball, badminton and handball athletes. Totally 101 active athletes (49 females, 52 male), of the average age in female 20±1.42 years, in male 21±1.99 years, joined to this study. Height, body weight, BMI…

  4. Las Matematicas: Lenguaje Universal. Grados Intermedios, Nivel 5b: Medida Lineal, Perimetro y Area (Mathematics: A Universal Language. Intermediate Grades, Level 5b: Linear Measure, Perimeter and Area).

    Science.gov (United States)

    Dissemination and Assessment Center for Bilingual Education, Austin, TX.

    This is one of a series of student booklets designed for use in a bilingual mathematics program in grades 6-8. The general format is to present each page in both Spanish and English. The mathematical topics in this booklet include measurement, perimeter, and area. (MK)

  5. [Irrigated perimeters as a geopolitical strategy for the development of the semi-arid region and its implications for health, labor and the environment].

    Science.gov (United States)

    Pontes, Andrezza Graziella Veríssimo; Gadelha, Diego; Freitas, Bernadete Maria Coêlho; Rigotto, Raquel Maria; Ferreira, Marcelo José Monteiro

    2013-11-01

    An analysis was made of irrigated perimeters as a geopolitical strategy for expanding Brazilian agricultural frontiers and the "development" of the northeastern semi-arid region with respect to social determinants in health in rural communities. Research was conducted in the Chapada do Apodi in the states of Ceará and Rio Grande do Norte between 2007 and 2011. Various research techniques and tools were adopted, such as research-action, ethnographic studies, questionnaires and laboratory exams, water contamination analyses, social cartography and focal groups. In the context of agribusiness expansion, it was revealed that public policies of irrigation have had consequences for health, labor and the environment with the implementation of the Jaguaribe-Apodi Irrigated Perimeter in Ceará. The social and environmental conflict and resistance in the phase prior to the installation of the Santa Cruz do Apodi Irrigated Perimeter in Rio Grande do Norte was significant as it had consequences for the health-disease process on rural communities. It is important for the evaluation of public irrigation policies to consider the impacts of the perimeters on the lifestyle, labor, health and the environment of the affected territories.

  6. Pushing the physics envelope Canada's new Perimeter Institute is planning to apply the risk-taking approach of venture capitalism to the pursuit of theoretical physics

    CERN Multimedia

    Spurgeon, D

    2001-01-01

    An highly successful business man has donated 100 million Canadian dollars to found the Perimeter Institue for Theoretical Physics. It is designed to attract young, innovative scientists to tackle some of the most difficult problems in physics such as quantum gravity and quantum information theory (1 page).

  7. The role of fire severity, distance from fire perimeter and vegetation on post-fire recovery of small-mammal communities in chaparal

    Science.gov (United States)

    Jay Diffendorfer; Genie M. Fleming; Scott Tremor; Wayne Spencer; Jan L. Beyers

    2012-01-01

    Chaparral shrublands in southern California, US, exhibit significant biodiversity but are prone to large, intense wildfires. Debate exists regarding fuel reduction to prevent such fires in wildland areas, but the effects of these fires on fauna are not well understood. We studied whether fire severity and distance from unburned fire perimeter influenced recovery of the...

  8. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  9. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  10. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  11. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  12. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  13. Career Preparation: An Often Omitted Element of the Advisor-Graduate Student Relationship

    Science.gov (United States)

    McManus, D. A.

    2001-05-01

    Most graduate research advisors care about the education of their graduate students. However, they often define "graduate education" so narrowly that it consists only of solving a research problem. This narrow definition is consistent with their principal goal as geoscientists, to understand the Earth better, and with the reward system typical of research universities, with its emphasis on research. As a result, most advisors usually well prepare students to be researchers in research universities. Research, however, is only part of a faculty member's duties. Commonly omitted is mentoring in the teaching and service duties of a faculty member. Students interested in teaching, in positions in other academic institutions, or in careers outside of academia may be perceived as questioning the advisors' career values and may not be encouraged in these interests. Graduate students should take an active role in their education. In addition to seeking information on career preparation from the campus career center and teaching center and from books, newsmagazines, newspapers, and seminars, students should also seek mentors who have demonstrated an interest in what the student is interested in: teaching and service, as well as research, or in careers outside academia. These mentors may be the students' committee members, other faculty members, or other professional geoscientists. With a broad base of information and some personal decisions, students will have a rationale for exploring careers. The questions students ask can now be more specific: How do they gain the requisite breadth in knowledge and the beneficial skills, beyond the depth of the research experience, and how do they gain opportunities to practice these skills? In short, how can they experience, and preferably practice, what professional geoscientists do in particular careers? If necessary, graduate students can work together to answer these questions by inviting experts to offer workshops in the department

  14. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  15. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  16. 75 FR 56568 - Application Nos. and Proposed Exemptions; D-11400, Wasatch Advisors, Inc.; D-11585, Retirement...

    Science.gov (United States)

    2010-09-16

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration [D-11400; D-11585; D-11603-07... AG; et al. AGENCY: Employee Benefits Security Administration, Labor. ACTION: Notice of proposed... Employee Benefits Security Administration (EBSA), Office of Exemption Determinations, Room N-5700, U.S...

  17. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  18. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  19. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  20. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  1. 77 FR 41464 - IndexIQ Advisors LLC and IndexIQ Active ETF Trust; Notice of Application

    Science.gov (United States)

    2012-07-13

    ...] IndexIQ Advisors LLC and IndexIQ Active ETF Trust; Notice of Application July 9, 2012. AGENCY... IndexIQ Active ETF Trust (``Trust''). Filing Dates: The application was filed on September 9, 2011, and... relief is unusual insofar as the requested order seeks relief for an ETF. Applicants note, however, that...

  2. 78 FR 21349 - Meeting of the Board of Advisors to the Presidents of the Naval Postgraduate School and Naval War...

    Science.gov (United States)

    2013-04-10

    ... DEPARTMENT OF DEFENSE Department of the Navy Meeting of the Board of Advisors to the Presidents of the Naval Postgraduate School and Naval War College, Naval Postgraduate School Subcommittee AGENCY... War College report on progress to the Secretary of the Navy. The Board will meet in closed executive...

  3. The Effects of Task Clarification, Feedback, and Goal Setting on Student Advisors' Office Behaviors and Customer Service

    Science.gov (United States)

    Tittelbach, Danielle; DeAngelis, Maureen; Sturmey, Peter; Alvero, Alicia M.

    2007-01-01

    This study evaluated the effects of feedback, task clarification and goal-setting on office behaviors and customer service of ten undergraduate participants that served as university advisors. A multiple baseline design was implemented across three target behaviors: client greeting, front-desk behaviors, and punctuality. During intervention the…

  4. 75 FR 13264 - Meeting of the Board of Advisors (BOA) to the President, Naval Postgraduate School (NPS)

    Science.gov (United States)

    2010-03-19

    ... DEPARTMENT OF DEFENSE Department of the Navy Meeting of the Board of Advisors (BOA) to the President, Naval Postgraduate School (NPS) AGENCY: Department of the Navy, DoD. ACTION: Notice of open... access, information, or to send written comments regarding the NPS BOA, contact Ms. Jaye Panza, Naval...

  5. 76 FR 33376 - Altegris Advisors, L.L.C. and Northern Lights Fund Trust; Notice of Application

    Science.gov (United States)

    2011-06-08

    ... the Fund and its shareholders, and does not involve a conflict of interest from which the Adviser or... amend subadvisory agreements without shareholder approval. Applicants: Altegris Advisors, L.L.C. (the.... Interested persons may request a hearing by writing to the Commission's Secretary and serving applicants with...

  6. Fostering Academic Self-Concept: Advisor Support and Sense of Belonging among International and Domestic Graduate Students

    Science.gov (United States)

    Curtin, Nicola; Stewart, Abigail J.; Ostrove, Joan M.

    2013-01-01

    International doctoral students in the United States face challenges of acculturation in academia yet complete graduate school at higher rates and more quickly than their domestic counterparts. This study examined advisor support, sense of belonging, and academic self-concept among international and domestic doctoral students at a research…

  7. The Honors Thesis: A Handbook for Honors Directors, Deans, and Faculty Advisors. National Collegiate Honors Council Monograph Series

    Science.gov (United States)

    Anderson, Mark; Lyons, Karen; Weiner, Norman

    2014-01-01

    This handbook is intended to help all those who design, administer, and implement honors thesis programs--honors directors, deans, staff, faculty, and advisors--evaluate their thesis programs, solve pressing problems, select more effective requirements or procedures, or introduce an entirely new thesis program. The authors' goal is to provide…

  8. Resident Advisor General Intelligence, Emotional Intelligence, Personality Dimensions, and Internal Belief Characteristics as Predictors of Rated Performance

    Science.gov (United States)

    Wu, Max B.; Stemler, Steven

    2008-01-01

    Resident Advisors (RAs) have a significant hand in helping students adjust and thrive in college life. Given the importance of selecting high-performing RAs, this study sought to examine how well various measures of intelligence (e.g., general, emotional) in addition to personality and additional "internal belief" characteristics predict…

  9. 77 FR 60732 - PACE Select Advisors Trust and UBS Global Asset Management (Americas) Inc.; Notice of Application

    Science.gov (United States)

    2012-10-04

    ....; Institutional Capital, LLC; J.P. Morgan Investment Management, Inc.; Kayne Anderson Rudnick Investment...; Standish Mellon Asset Management Company, LLC; Systematic Financial Management, L.P.; Wellington Management... Select Advisors Trust and UBS Global Asset Management (Americas) Inc.; Notice of Application September 27...

  10. 75 FR 53958 - Meeting of the Board of Advisors to the Presidents of the Naval Postgraduate School and the Naval...

    Science.gov (United States)

    2010-09-02

    ... the Naval Postgraduate School and the Naval War College AGENCY: Department of the Navy, DoD. ACTION... of Advisors (BOA) to the Presidents of the Naval Postgraduate School (NPS) and the Naval War College... elicit the advice of the Board on the Naval Service's Postgraduate Education Program and the...

  11. Building Rapport between International Graduate Students and Their Faculty Advisors: Cross- Cultural Mentoring Relationships at the University of Guelph

    Science.gov (United States)

    Omar, Faiza; Mahone, James P.; Ngobia, Jane; FitzSimons, John

    2016-01-01

    Mentoring graduate students is very challenging, even when both the student and faculty have similar cultural values. Many international students have a different culture from that of Canadian. Their challenge is adapting to their new environment, and for their faculty advisors to understand and work well with them. This research explored the…

  12. Cloud-based crowd sensing: a framework for location-based crowd analyzer and advisor

    Science.gov (United States)

    Aishwarya, K. C.; Nambi, A.; Hudson, S.; Nadesh, R. K.

    2017-11-01

    Cloud computing is an emerging field of computer science to integrate and explore large and powerful computing systems and storages for personal and also for enterprise requirements. Mobile Cloud Computing is the inheritance of this concept towards mobile hand-held devices. Crowdsensing, or to be precise, Mobile Crowdsensing is the process of sharing resources from an available group of mobile handheld devices that support sharing of different resources such as data, memory and bandwidth to perform a single task for collective reasons. In this paper, we propose a framework to use Crowdsensing and perform a crowd analyzer and advisor whether the user can go to the place or not. This is an ongoing research and is a new concept to which the direction of cloud computing has shifted and is viable for more expansion in the near future.

  13. Validation of PV-RPM Code in the System Advisor Model.

    Energy Technology Data Exchange (ETDEWEB)

    Klise, Geoffrey Taylor [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Lavrova, Olga [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Freeman, Janine [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2017-04-01

    This paper describes efforts made by Sandia National Laboratories (SNL) and the National Renewable Energy Laboratory (NREL) to validate the SNL developed PV Reliability Performance Model (PV - RPM) algorithm as implemented in the NREL System Advisor Model (SAM). The PV - RPM model is a library of functions that estimates component failure and repair in a photovoltaic system over a desired simulation period. The failure and repair distributions in this paper are probabilistic representations of component failure and repair based on data collected by SNL for a PV power plant operating in Arizona. The validation effort focuses on whether the failure and repair dist ributions used in the SAM implementation result in estimated failures that match the expected failures developed in the proof - of - concept implementation. Results indicate that the SAM implementation of PV - RPM provides the same results as the proof - of - concep t implementation, indicating the algorithms were reproduced successfully.

  14. Parabolic Trough Reference Plant for Cost Modeling with the Solar Advisor Model (SAM)

    Energy Technology Data Exchange (ETDEWEB)

    Turchi, C.

    2010-07-01

    This report describes a component-based cost model developed for parabolic trough solar power plants. The cost model was developed by the National Renewable Energy Laboratory (NREL), assisted by WorleyParsons Group Inc., for use with NREL's Solar Advisor Model (SAM). This report includes an overview and explanation of the model, two summary contract reports from WorleyParsons, and an Excel spreadsheet for use with SAM. The cost study uses a reference plant with a 100-MWe capacity and six hours of thermal energy storage. Wet-cooling and dry-cooling configurations are considered. The spreadsheet includes capital and operating cost by component to allow users to estimate the impact of changes in component costs.

  15. Reference Manual for the System Advisor Model's Wind Power Performance Model

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, J.; Jorgenson, J.; Gilman, P.; Ferguson, T.

    2014-08-01

    This manual describes the National Renewable Energy Laboratory's System Advisor Model (SAM) wind power performance model. The model calculates the hourly electrical output of a single wind turbine or of a wind farm. The wind power performance model requires information about the wind resource, wind turbine specifications, wind farm layout (if applicable), and costs. In SAM, the performance model can be coupled to one of the financial models to calculate economic metrics for residential, commercial, or utility-scale wind projects. This manual describes the algorithms used by the wind power performance model, which is available in the SAM user interface and as part of the SAM Simulation Core (SSC) library, and is intended to supplement the user documentation that comes with the software.

  16. An intelligent, knowledge-based multiple criteria decision making advisor for systems design

    Science.gov (United States)

    Li, Yongchang

    of an appropriate decision making method. Furthermore, some DMs may be exclusively using one or two specific methods which they are familiar with or trust and not realizing that they may be inappropriate to handle certain classes of the problems, thus yielding erroneous results. These issues reveal that in order to ensure a good decision a suitable decision method should be chosen before the decision making process proceeds. The first part of this dissertation proposes an MCDM process supported by an intelligent, knowledge-based advisor system referred to as Multi-Criteria Interactive Decision-Making Advisor and Synthesis process (MIDAS), which is able to facilitate the selection of the most appropriate decision making method and which provides insight to the user for fulfilling different preferences. The second part of this dissertation presents an autonomous decision making advisor which is capable of dealing with ever-evolving real time information and making autonomous decisions under uncertain conditions. The advisor encompasses a Markov Decision Process (MDP) formulation which takes uncertainty into account when determines the best action for each system state. (Abstract shortened by UMI.)

  17. Using CBT with Anxious Language Learners: The Potential Role of the Learning Advisor

    Directory of Open Access Journals (Sweden)

    Neil Curry

    2014-01-01

    Full Text Available Foreign Language Anxiety (FLA can be a crippling condition for many students, preventing them from taking an active part in the classroom, and also retarding their L2 use in wider communicative situations. Providing learners with the tools to overcome anxiety on an individual basis is an area which needs further investigation. Cognitive Behaviour Therapy (CBT is a widespread counselling practice used to treat anxieties. It shares similarities with some techniques employed in Advising in Language Learning (ALL for helping students with language goals, and it is worthwhile investigating and raising awareness of how it can be used for FLA. The article describes major characteristics of FLA and also CBT, and then describes four functions which CBT and ALL share: goal-setting, guided discovery, Socratic questioning and use of reflection. Preliminary research also demonstrates how some of the practices associated with CBT could be applied by Learning Advisors to help students to overcome FLA.

  18. Evaluating Community Health Advisor (CHA) Core Competencies: The CHA Core Competency Retrospective Pretest/Posttest (CCCRP).

    Science.gov (United States)

    Story, Lachel; To, Yen M

    2016-05-01

    Health care and academic systems are increasingly collaborating with community health advisors (CHAs) to provide culturally relevant health interventions that promote sustained community transformation. Little attention has been placed on CHA training evaluation, including core competency attainment. This study identified common CHA core competencies, generated a theoretically based measure of those competencies, and explored psychometric properties of that measure. A concept synthesis revealed five CHA core competencies (leadership, translation, guidance, advocacy, and caring). The CHA Core Competency Retrospective Pretest/Posttest (CCCRP) resulted from that synthesis, which was administered using multiple approaches to individuals who previously received CHA training (N= 142). Exploratory factor analyses revealed a two-factor structure underlying the posttraining data, and Cronbach's alpha indicated high internal consistency. This study suggested some CHA core competencies might be more interrelated than previously thought, and two major competencies exist rather than five and supported the CCCRP's use to evaluate core competency attainment resulting from training. © The Author(s) 2014.

  19. Airway basement membrane perimeter in human airways is not a constant; potential implications for airway remodeling in asthma.

    Science.gov (United States)

    McParland, Brent E; Paré, Peter D; Johnson, Peter R A; Armour, Carol L; Black, Judith L

    2004-08-01

    Many studies that demonstrate an increase in airway smooth muscle in asthmatic patients rely on the assumption that bronchial internal perimeter (P(i)) or basement membrane perimeter (P(bm)) is a constant, i.e., not affected by fixation pressure or the degree of smooth muscle shortening. Because it is the basement membrane that has been purported to be the indistensible structure, this study examines the assumption that P(bm) is not affected by fixation pressure. P(bm) was determined for the same human airway segment (n = 12) fixed at distending pressures of 0 cmH(2)O and 21 cmH(2)O in the absence of smooth muscle tone. P(bm) for the segment fixed at 0 cmH(2)O was determined morphometrically, and the P(bm) for the same segment, had the segment been fixed at 21 cmH(2)O, was predicted from knowing the luminal volume and length of the airway when distended to 21 cmH(2)O (organ bath-derived P(i)). To ensure an accurate transformation of the organ bath-derived P(i) value to a morphometry-derived P(bm) value, had the segment been fixed at 21 cmH(2)O, the relationship between organ bath-derived P(i) and morphometry-derived P(bm) was determined for five different bronchial segments distended to 21 cmH(2)O and fixed at 21 cmH(2)O (r(2) = 0.99, P < 0.0001). Mean P(bm) for bronchial segments fixed at 0 cmH(2)O was 9.4 +/- 0.4 mm, whereas mean predicted P(bm), had the segments been fixed at 21 cmH(2)O, was 14.1 +/- 0.5 mm (P < 0.0001). This indicates that P(bm) is not a constant when isolated airway segments without smooth muscle tone are fixed distended to 21 cmH(2)O. The implication of these results is that the increase in smooth muscle mass in asthma may have been overestimated in some previous studies. Therefore, further studies are required to examine the potential artifact using whole lungs with and without abolition of airway smooth muscle tone and/or inflation.

  20. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  1. Codification of scan path parameters and development of perimeter scan strategies for 3D bowl-shaped laser forming

    Science.gov (United States)

    Tavakoli, A.; Naeini, H. Moslemi; Roohi, Amir H.; Gollo, M. Hoseinpour; Shahabad, Sh. Imani

    2018-01-01

    In the 3D laser forming process, developing an appropriate laser scan pattern for producing specimens with high quality and uniformity is critical. This study presents certain principles for developing scan paths. Seven scan path parameters are considered, including: (1) combined linear or curved path; (2) type of combined linear path; (3) order of scan sequences; (4) the position of the start point in each scan; (5) continuous or discontinuous scan path; (6) direction of scan path; and (7) angular arrangement of combined linear scan paths. Regarding these path parameters, ten combined linear scan patterns are presented. Numerical simulations show continuous hexagonal, scan pattern, scanning from outer to inner path, is the optimized. In addition, it is observed the position of the start point and the angular arrangement of scan paths is the most effective path parameters. Also, further experimentations show four sequences due to creat symmetric condition enhance the height of the bowl-shaped products and uniformity. Finally, the optimized hexagonal pattern was compared with the similar circular one. In the hexagonal scan path, distortion value and standard deviation rather to edge height of formed specimen is very low, and the edge height despite of decreasing length of scan path increases significantly compared to the circular scan path. As a result, four-sequence hexagonal scan pattern is proposed as the optimized perimeter scan path to produce bowl-shaped product.

  2. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  3. Final Environmental Assessment, Construct Antenna Parts Storage Facility, Upgrade Perimeter Security Fence and Demolish Camera Shed, Red River Air Force Space Surveillance Station (AFSSS), Lewisville, Arkansas

    Science.gov (United States)

    2012-11-01

    root plowed for construction of the Installation. Now the Installation consists mostly of short grasses which are routinely mowed. Woods border...aristata* bracted plantain Rumex crispus* curly dock Setaria parviflora yellow bristlegrass Solanum carolinense* Carolina horse nettle Sorghum...the land was covered with a hardwood forest. The land was cleared and root plowed dur- ing construction of the Installation. Earthen platforms were

  4. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  5. Area G perimeter surface-soil and single-stage water sampling: Environmental surveillance for fiscal year 94, Group ESH-19. Progress report

    International Nuclear Information System (INIS)

    Conrad, R.; Childs, M.; Lyons, C.R.; Coriz, F.

    1996-08-01

    ESH-19 personnel collected soil and single-stage water samples around the perimeter of Area G at Los Alamos National Laboratory during FY94 to characterize possible contaminant movement out of Area G through surface-water and sediment runoff. These samples were analyzed for tritium, total uranium, isotopic plutonium, americium-241, and cesium-137. Ten metals were also analyzed on selected soils using analytical laboratory techniques. All radiochemical data are compared with analogous samples collected during FY 93 and reported in LA-12986. Baseline concentrations for future disposal operations were established for metals and radionuclides by a sampling program in the proposed Area G Expansion Area. Considering the amount of radioactive waste that has been disposed at Area G, there is evidence of only low concentrations of radionuclides on perimeter surface soils. Consequently, little radioactivity is leaving the confines of Area G via the surface water runoff pathway

  6. 76 FR 30323 - President's Board of Advisors on Historically Black Colleges and Universities

    Science.gov (United States)

    2011-05-25

    ... philanthropic, business, government, military, homeland- security, and education communities in a national..., technology, engineering, and mathematics) policies affecting HBCUs and possible strategies to enable the...

  7. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  8. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  9. 78 FR 59013 - President's Council of Advisors on Science and Technology

    Science.gov (United States)

    2013-09-25

    ... Cyber-security report. DATES: The public conference call will be held on Monday, October 7, 2013, from 4.... to 4:30 p.m. (ET) During the conference call, PCAST will discuss its Cyber-security report... work, not for business marketing purposes. Oral Comments: To be considered for the public speaker list...

  10. 78 FR 42115 - NGAM Advisors, LP, et al.; Notice of Application

    Science.gov (United States)

    2013-07-15

    ... size, experience and potentially stronger relationships in the fixed income markets. Purchases of... to deposit securities into, and receive securities from, the series in connection with the purchase... anticipate that the price of a Share will range from $20 to $200. All orders to purchase Creation Units must...

  11. 78 FR 37614 - Guggenheim Funds Investment Advisors, LLC, et al.; Notice of Application

    Science.gov (United States)

    2013-06-21

    ... securities into, and receive securities from, the series in connection with the purchase and redemption of... of Ethics \\12\\ and Inside Information Policy of the Adviser and Sub- Advisers, personnel of those... adopted or will adopt a code of ethics pursuant to Rule 17j-1 under the Act and Rule 204A-1 under the...

  12. 78 FR 46388 - NGAM Advisors, L.P., et al.; Notice of Application

    Science.gov (United States)

    2013-07-31

    ... consist of a portfolio of securities and other instruments (``Portfolio Securities'') selected to... Redemption Instruments will be identical, unless the Fund is Rebalancing (as defined below). In addition, the... Fund's portfolio (including cash positions),\\6\\ except: (a) In the case of bonds, for minor differences...

  13. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  14. The challenges of science journalism: The perspectives of scientists, science communication advisors and journalists from New Zealand.

    Science.gov (United States)

    Ashwell, Douglas James

    2016-04-01

    The news media play an important role in informing the public about scientific and technological developments. Some argue that restructuring and downsizing result in journalists coming under increased pressure to produce copy, leading them to use more public relations material to meet their deadlines. This article explores science journalism in the highly commercialised media market of New Zealand. Using semi-structured interviews with scientists, science communication advisors and journalists, the study finds communication advisors and scientists believe most media outlets, excluding public service media, report science poorly. Furthermore, restructuring and staff cuts have placed the journalists interviewed under increasing pressure. While smaller newspapers appear to be printing press releases verbatim, metropolitan newspaper journalists still exercise control over their use of such material. The results suggest these journalists will continue to resist increasing their use of public relations material for some time to come. © The Author(s) 2014.

  15. Career advising in family medicine: a theoretical framework for structuring the medical student/faculty advisor interview

    Directory of Open Access Journals (Sweden)

    Melissa Bradner

    2013-08-01

    Full Text Available Background: There are unique challenges to recruiting students into the specialty of family medicine within academic medical centers. Methods: At Virginia Commonwealth University, we developed an advising framework to help students address institutional and personal obstacles to choosing family medicine as a career. Results: The role of a faculty advisor is not to direct the student to a career choice but rather to foster a mentor relationship and help the student come to his or her own realizations regarding career choice. The faculty advisor/medical student interview is conceptualized as five discussion topics: self-knowledge, perception, organizational voice, cognitive dissonance, and anticipatory counseling. Conclusion: This framework is intended to assist faculty in their efforts to encourage students to consider a career in family medicine.

  16. Theoretical construction of the contextualized dynamics of the constant shaping of advisor professors in the teaching unit

    Directory of Open Access Journals (Sweden)

    Nirma Pérez-Pelipiche

    2016-10-01

    Full Text Available This work paper shows research results on the contextualized dynamics of the constant shaping of advisor professors in the teaching unit, taking epistemological foundations as a starting point, which substantiate their theoretical construction. A model has been displayed basing on comprehension and interpretation of this process as a whole, in which its subsystems, components, structure, relations and levels among them, prove contradictions that become evident in such process, therefore allowing to structure the dynamics of shaping professors as an instrument, earning, as a result, the transforming capability of advisor professors when practicing their skill, having the teaching unit as a scenary. In that way we used different techniques: questionnaire, interviews, observation, statistical techniques and methods: historical-logical; analysis-synthesis and systemic-structural-functional, all of those ones from the hermeneutic-dialectic focus.

  17. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  18. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  19. The StreamCat Dataset: Accumulated Attributes for NHDPlusV2 Catchments (Version 2.1) for the Conterminous United States: Wildland Fire Perimeters By Year 2000 - 2010

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset represents the historical fire perimeters within individual local NHDPlusV2 catchments and upstream, contributing watersheds based on the GeoMAC...

  20. The StreamCat Dataset: Accumulated Attributes for NHDPlusV2 Catchments Riparian Buffer (Version 2.1) for the Conterminous United States: Wildland Fire Perimeters By Year 2000 - 2010

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset represents the historical fire perimeters within individual local NHDPlusV2 catchments and upstream, contributing watersheds riparian buffers based on...

  1. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  2. AN EXPLORATORY STUDY OF DIVERSIFIED MENTORING RELATIONSHIPS AMONG GRADUATE STUDENTS AND THEIR ADVISORS IN SCIENCE, TECHNOLOGY, ENGINEERING, AND MATHEMATICS FIELDS

    OpenAIRE

    Bodden, Krystin R.

    2014-01-01

    Minorities and women continue to be underrepresented in science, technology, engineering, and mathematics (STEM) fields. In graduate education, factors such as racism, prejudice, discrimination, sexism, stereotypes, tokenism, and a lack of role models can all plague students and contribute to uncompleted degrees and non-entrance into STEM fields. One of the tools being used to combat these barriers is effective mentoring. Graduate students and their advisors generally have close working relat...

  3. Does young adults' preferred role in decision making about health, money, and career depend on their advisors' leadership skills?

    Science.gov (United States)

    Garcia-Retamero, Rocio; Galesic, Mirta

    2013-01-01

    Few empirical data exist on how decision making about health differs from that in other crucial life domains with less threatening consequences. To shed light on this issue we conducted a study with 175 young adults (average age 19 years). We presented the participants with scenarios involving advisors who provided assistance in making decisions about health, money, and career. For each scenario, participants were asked to what extent they wanted the advisor to exhibit several leadership styles and competencies and what role (active, collaborative, or passive) they preferred to play when making decisions. Results show that decision making about health is distinct from that in the other domains in three ways. First, most of the participants preferred to delegate decision making about their health to their physician, whereas they were willing to collaborate or play an active role in decision making about their career or money. Second, the competencies and leadership style preferred for the physician differed substantially from those desired for advisors in the other two domains: Participants expected physicians to show more transformational leadership--the style that is most effective in a wide range of environments--than those who provide advice about financial investments or career. Finally, participants' willingness to share medical decision making with their physician was tied to how strongly they preferred that the physician shows an effective leadership style. In contrast, motivation to participate in decision making in the other domains was not related to preferences regarding advisors' leadership style or competencies. Our results have implications for medical practice as they suggest that physicians are expected to have superior leadership skills compared to those who provide assistance in other important areas of life.

  4. Navy Chaplains as Religious Advisors: A Combatant Commander’s Strategic Asset in Conflict, Reconstruction and Peace

    Science.gov (United States)

    2012-04-05

    attempting to foster a climate of fairness, trust, and accountability .40 As the essential advisor, the chaplain operates as the moral conscience for the...local community. In doing so, the chaplain affords the widest possible free exercise of religion in the most cost effective manner. In addition...Operations, JP 1-05 (Washington, DC: Joint Forces Staff, November 2009), i. 13 SACNAVINST 1730.10, 1. 14 Clifford Drury , The History of the

  5. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  6. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  7. A V ampersand V Program for a real time Operator Advisor expert system

    International Nuclear Information System (INIS)

    Hajek, B.K.; Hardy, C.R.; Miller, D.W.; Bhatnagar, R.

    1989-01-01

    This report discusses an Operator Advisor (OA) consisting of four integrated expert systems which has been under development at the Ohio State University since 1985. The OA was initially conceived as two independent systems, one to manage procedures for the operator, and the other to diagnose plant faults and to validate sensor data. The OA has used the Perry Nuclear Power Plant simulator as the reference plant. It has been programmed with knowledge gathered from power plant experts and plant documents. Following incremental programming, the OA has been tested off line by running scenarios on the plant simulator and verifying that the OA responded as predicted by the simulator. Specifications have been developed and periodically published in the literature over the past four years. These are currently being collected and expanded upon as part of a formal Verification and Validation (V ampersand V) Program. The V ampersand V Program is defined by three types of documents: specification documents, a V ampersand V document, and procedures to support implementation of the specifications and V ampersand V programs

  8. Comparison performance of split plug-in hybrid electric vehicle and hybrid electric vehicle using ADVISOR

    Directory of Open Access Journals (Sweden)

    Mohd Rashid Muhammad Ikram

    2017-01-01

    Full Text Available Electric vehicle suffers from relatively short range and long charging times and consequently has not become an acceptable solution to the automotive consumer. The addition of an internal combustion engine to extend the range of the electric vehicle is one method of exploiting the high efficiency and lack of emissions of the electric vehicle while retaining the range and convenient refuelling times of a conventional gasoline powered vehicle. The term that describes this type of vehicle is a hybrid electric vehicle. Many configurations of hybrid electric vehicles have been designed and implemented, namely the series, parallel and power-split configurations. This paper discusses the comparison between Split Plug-in Hybrid Electric Vehicle(SPHEV and Hybrid Electric Vehicle(HEV. Modelling methods such as physics-based Resistive Companion Form technique and Bond Graph method are presented with powertrain component and system modelling examples. The modelling and simulation capability of existing tools such as ADvanced VehIcle SimulatOR (ADVISOR is demonstrated through application examples. Since power electronics is indispensable in hybrid vehicles, the issue of numerical oscillations in dynamic simulations involving power electronics is briefly addressed.

  9. Facebook Use between College Resident Advisors' and Their Residents: A Mixed Methods Approach.

    Science.gov (United States)

    Kacvinsky, Lauren E; Moreno, Megan A

    2014-01-01

    Facebook use is nearly ubiquitous among college students. Studies have shown links between Facebook displays of depression or problem drinking and risk of these problems. This project aimed to determine whether Facebook could be used to help Resident Advisors (RAs) identify college students at risk for depression or problem drinking. Interviews were conducted with college freshmen to investigate whether they were Facebook "friends" with their RA. Focus groups were conducted with RAs to determine their views on Facebook friending their dormitory residents and using Facebook to help identify at-risk students. 72 freshmen were interviewed and 25 RAs participated in focus groups; both agreed it is common for RAs and residents to be Facebook friends. RAs commonly noted references to depression and problem drinking on residents' Facebook pages, which often led to in-person discussions with the resident. This study provides support that RAs use Facebook to identify issues that may impact their student residents. RAs emphasized benefits of in-person interactions in order to provide support and obtain additional details about the situation. Universities could consider whether providing RA education about Facebook interactions with residents merits encouragement within their existing RA training programs.

  10. Detailed Physical Trough Model for NREL's Solar Advisor Model: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Wagner, M. J.; Blair, N.; Dobos, A.

    2010-10-01

    Solar Advisor Model (SAM) is a free software package made available by the National Renewable Energy Laboratory (NREL), Sandia National Laboratory, and the US Department of Energy. SAM contains hourly system performance and economic models for concentrating solar power (CSP) systems, photovoltaic, solar hot-water, and generic fuel-use technologies. Versions of SAM prior to 2010 included only the parabolic trough model based on Excelergy. This model uses top-level empirical performance curves to characterize plant behavior, and thus is limited in predictive capability for new technologies or component configurations. To address this and other functionality challenges, a new trough model; derived from physical first principles was commissioned to supplement the Excelergy-based empirical model. This new 'physical model' approaches the task of characterizing the performance of the whole parabolic trough plant by replacing empirical curve-fit relationships with more detailed calculations where practical. The resulting model matches the annual performance of the SAM empirical model (which has been previously verified with plant data) while maintaining run-times compatible with parametric analysis, adding additional flexibility in modeled system configurations, and providing more detailed performance calculations in the solar field, power block, piping, and storage subsystems.

  11. Transient simulation for a real-time operator advisor expert system

    International Nuclear Information System (INIS)

    Jakubowski, T.; Hajek, B.K.; Miller, D.W.; Bhatnagar, R.

    1990-01-01

    An Operator Advisor (OA) consisting of four integrated expert systems has been under development at The Ohio State University since 1985. The OA, designed for a General Electric BWR-6 plant, has used the Perry Nuclear Power Plants full scope simulator near Cleveland, Ohio (USA) as the reference plant. The primary goal of this development has been to provide a single system which not only performs monitoring and diagnosis functions, but also provides fault mitigation procedures to the operator, monitors the performance of these procedures and provides backup procudures should the initial ones fail. To test the system off line, a transient event simulation methodology has been developed. The simulator employs event scenarios from the Perry simulator. Scenarios are selected to test both inter- and intra-modular system behavior and response and to verify the consistency and accuracy of the knowledge base. This paper describes the OA architecture and design and the transient simulation. A discussion of a sample scenario test, including the rationale for scenario selection, is included as an example. The results of the testing demonstrate the value of off line transient simulations in that they verify system operation and help to identify characteristics requiring further improvements

  12. PI in the sky: The astronaut science advisor on SLS-2

    Science.gov (United States)

    Hazelton, Lyman R.; Groleau, Nicolas; Frainier, Richard J.; Compton, Michael M.; Colombano, Silvano P.; Szolovits, Peter

    1994-01-01

    The Astronaut Science Advisor (ASA, also known as Principal-Investigator-in-a-Box) is an advanced engineering effort to apply expert systems technology to experiment monitoring and control. Its goal is to increase the scientific value of information returned from experiments on manned space missions. The first in-space test of the system will be in conjunction with Professor Larry Young's (MIT) vestibulo-ocular 'Rotating Dome' experiment on the Spacelab Life Sciences 2 mission (STS-58) in the Fall of 1993. In a cost-saving effort, off-the-shelf equipment was employed wherever possible. Several modifications were necessary in order to make the system flight-worthy. The software consists of three interlocking modules. A real-time data acquisition system digitizes and stores all experiment data and then characterizes the signals in symbolic form; a rule-based expert system uses the symbolic signal characteristics to make decisions concerning the experiment; and a highly graphic user interface requiring a minimum of user intervention presents information to the astronaut operator. Much has been learned about the design of software and user interfaces for interactive computing in space. In addition, we gained a great deal of knowledge about building relatively inexpensive hardware and software for use in space. New technologies are being assessed to make the system a much more powerful ally in future scientific research in space and on the ground.

  13. The knowledge-based framework for a nuclear power plant operator advisor

    International Nuclear Information System (INIS)

    Miller, D.W.

    1989-01-01

    An important facet in the design, development, and evaluation of aids for complex systems is the identification of the tasks performed by the operator. Operator aids utilizing artificial intelligence, or more specifically knowledge-based systems, require identification of these tasks in the context of a knowledge-based framework. In this context, the operator responses to the plant behavior are to monitor and comprehend the state of the plant, identify normal and abnormal plant conditions, diagnose abnormal plant conditions, predict plant response to specific control actions, and select the best available control action, implement a feasible control action, monitor system response to the control action, and correct for any inappropriate responses. These tasks have been identified to formulate a knowledge-based framework for an operator advisor under development at Ohio State University that utilizes the generic task methodology proposed by Chandrasekaran. The paper lays the foundation to identify the responses as a knowledge-based set of tasks in accordance with the expected human operator responses during an event. Initial evaluation of the expert system indicates the potential for an operator aid that will improve the operator's ability to respond to both anticipated and unanticipated events

  14. Simulating Study on Drive System Performance for Hybrid Electric Bus Based on ADVISOR

    Directory of Open Access Journals (Sweden)

    Wang Xingxing

    2017-01-01

    Full Text Available Hybrid electric bus has a number of advantages when compared with ordinary passenger cars, but in the dynamic matching and the vehicle performance are difficult to detect, thus limits its development process. In this paper, combined with the actual models, the hybrid electric bus module parameters were modified in the software of ADVISOR (Advanced Vehicle Simulator, main including: module of the vehicle, the wheel module, motor module, a battery module and engine module, three kinds of bus models for A, B and C were established, and the related performance that need to be analyzed was set up, such as acceleration, gradability, emissions and energy utilization and so on, in order to ensure the vehicle running in the same environment and convenient for comparison, a fixed vehicle driving cycles was chose, then the simulation results was analyzed, and the various performance was compared with the dynamic indicators and economic indicators which determined by referencing of traditional city bus standard and each other, and finally, the performance optimal model of B was chose out which can meet the demand, its related performance parameters of the simulation results are as follows: the best gradability is 26%, maximum speed is 72.7km/h, maximum acceleration is 1.7m/s2, 0~50km/h acceleration time is 9.5s and fuel consumption is 25L/km.

  15. Molten Salt Power Tower Cost Model for the System Advisor Model (SAM)

    Energy Technology Data Exchange (ETDEWEB)

    Turchi, C. S.; Heath, G. A.

    2013-02-01

    This report describes a component-based cost model developed for molten-salt power tower solar power plants. The cost model was developed by the National Renewable Energy Laboratory (NREL), using data from several prior studies, including a contracted analysis from WorleyParsons Group, which is included herein as an Appendix. The WorleyParsons' analysis also estimated material composition and mass for the plant to facilitate a life cycle analysis of the molten salt power tower technology. Details of the life cycle assessment have been published elsewhere. The cost model provides a reference plant that interfaces with NREL's System Advisor Model or SAM. The reference plant assumes a nominal 100-MWe (net) power tower running with a nitrate salt heat transfer fluid (HTF). Thermal energy storage is provided by direct storage of the HTF in a two-tank system. The design assumes dry-cooling. The model includes a spreadsheet that interfaces with SAM via the Excel Exchange option in SAM. The spreadsheet allows users to estimate the costs of different-size plants and to take into account changes in commodity prices. This report and the accompanying Excel spreadsheet can be downloaded at https://sam.nrel.gov/cost.

  16. An insight into the emerging role of regional medical advisor in the pharmaceutical industry

    Directory of Open Access Journals (Sweden)

    Sandeep Kumar Gupta

    2013-01-01

    Full Text Available The position of regional medical advisor (RMA is relatively new in the pharmaceutical industry and its roles and responsibility are still evolving. The RMA is a field based position whose main mission is to foster collaborative relationships with the key opinion leaders (KOLs and to facilitate the exchange of unbiased scientific information between the medical community and the company. Field-based medical liaison teams are expanding world-wide as part of the pharmaceutical industry′s increased focus on global operations including emerging markets. Now, the position of the RMA has evolved into comprehensive, complex, highly interactive, targeted, highly strategic, innovative, and independent role since its inception by the Upjohn Company in 1967. The major objective of the RMA is to develop the professional relationships with the health-care community, particularly KOLs, through peer-to-peer contact. The RMA can facilitate investigator-initiated clinical research proposals from approval until completion, presentation, and publication. It is possible for a RMA to have valuable access to KOLs through his expertise in the clinical research. The RMA can assist in the development, review, and follow-up of the clinical studies initiated within the relevant therapeutic area at the regional/local level. The RMA can lead regional/local clinical projects to ensure that all clinical trials are conducted in compliance with the International Conference of Harmonisation Good Clinical Practice (ICH GCP guidelines.

  17. Inequality confirmed: institutional exclusion in the interaction between job-centre advisors and unemployed young people

    Directory of Open Access Journals (Sweden)

    Ulla Rantakeisu

    2015-09-01

    Full Text Available Since the 1990s, the pressures on the unemployed have intensified in Sweden owing to increasing demands on individuals to be employable. This article centres on unemployed youths’ experiences of their visits to the public employment services in four Swedish municipalities and how these experiences can be understood against the background of the intersection of social class and gender. A total of 18 unemployed youths were interviewed and their reasoning was compared with their respective employment-agency officers. The analysis shows that the employment agency gives priority to young working-class men over young working-class women and to middle-class youths over working-class youths, respectively. Young working-class women’s wish to combine employment with caregiving is seen as an encumbrance by the employment agency and these women expressed the harshest criticism against the employment agency. When the advisors meet youths who do not correspond with the current expectations and ideals of the labour market, they risk taking part in an institutional process of exclusion of these youngsters.

  18. Advocates or cartographers? Scientific advisors and the narratives of German energy transition

    International Nuclear Information System (INIS)

    Leipprand, Anna; Flachsland, Christian; Pahle, Michael

    2017-01-01

    Political debate on energy in Germany has been shaped by two historically opposed discourses, one pushing for a transition to renewables, the other holding on to the status quo. Scientific policy advice (SPA) has been involved in their evolution from the beginning. This paper draws on the Advocacy Coalition Framework and on discourse and narrative theory to study the role of SPA in recent German energy policy. We explore 1) whether scientific advisors have been members of advocacy coalitions, and 2) how their contributions may have interacted with the evolution of the discourses and major narratives. We perform a qualitative text analysis of 50 SPA reports published between 2000 and 2015. We find that the majority of studies clearly take sides in the debate, and that in most cases the reports’ positions are fully transparent. Despite the polarization, SPA provides differentiated information on key aspects of the discourses, and alternative design options for policy instruments. We conclude that SPA contributions have improved the conditions for political consensus and compromise. Collectively, SPA studies provide a basis for mapping different policy pathways and their consequences. In the future, SPA should address additional critical issues such as coal phase-out and international leadership. - Highlights: • We explore the role of scientific policy advice in Germany's energy transition. • There is widespread, mostly transparent advocacy in scientific advisory reports. • We conclude that scientific policy advice has facilitated dialogue and compromise. • We discuss implications for future advisory activity and further improvements.

  19. En Route Descent Advisor Multi-Sector Planning Using Active and Provisional Controller Plans

    Science.gov (United States)

    Vivona, Robert; Green, Steven

    2003-01-01

    As decision support tools are developed to support controllers in complex air traffic control environments, new approaches to maintaining situation awareness and managing traffic planning must be developed to handle the ever-increasing amounts of alerting and advisory data. Within high-density metering and other environments where flight path changes are the rule, not the exception, and where interactions between these changes are required, current trial planning approaches are limited by potential increases in workload. The Enroute Descent Advisor (EDA) is a set of decision support tool capabilities for managing high-density en route traffic subject to metering restrictions. The EDA system s novel approach builds aircraft plans from combinations of user intent data and builds controller plans from combinations of aircraft plans to effectively maintain situation awareness during traffic planning. By maintaining both active (current) and provisional (proposed) controller plans, EDA supports controllers in coordinated traffic planning both within and between sectors. Ultimately, EDA s multi-sector planning approach will facilitate a transition from current sector-oriented operations to a new trajectory-oriented paradigm, enabling new levels of efficiency and collaboration in air traffic control.

  20. Designing a community-based lay health advisor training curriculum to address cancer health disparities.

    Science.gov (United States)

    Gwede, Clement K; Ashley, Atalie A; McGinnis, Kara; Montiel-Ishino, F Alejandro; Standifer, Maisha; Baldwin, Julie; Williams, Coni; Sneed, Kevin B; Wathington, Deanna; Dash-Pitts, Lolita; Green, B Lee

    2013-05-01

    Racial and ethnic minorities have disproportionately higher cancer incidence and mortality than their White counterparts. In response to this inequity in cancer prevention and care, community-based lay health advisors (LHAs) may be suited to deliver effective, culturally relevant, quality cancer education, prevention/screening, and early detection services for underserved populations. APPROACH AND STRATEGIES: Consistent with key tenets of community-based participatory research (CBPR), this project engaged community partners to develop and implement a unique LHA training curriculum to address cancer health disparities among medically underserved communities in a tricounty area. Seven phases of curriculum development went into designing a final seven-module LHA curriculum. In keeping with principles of CBPR and community engagement, academic-community partners and LHAs themselves were involved at all phases to ensure the needs of academic and community partners were mutually addressed in development and implementation of the LHA program. Community-based LHA programs for outreach, education, and promotion of cancer screening and early detection, are ideal for addressing cancer health disparities in access and quality care. When community-based LHAs are appropriately recruited, trained, and located in communities, they provide unique opportunities to link, bridge, and facilitate quality cancer education, services, and research.

  1. UK minister and science advisors reassert roles of PWRs and FBRs

    International Nuclear Information System (INIS)

    Fishlock, D.

    1988-01-01

    Britain continues to vigorously debate the wisdom of privatizing its electricity supply system by breaking the Central Electricity Generating Board into three separate parts, with specific consequences for nuclear energy. What is already clear is that the proposed changes must have a profound impact on all long-term activities, from the future of the fast reactor to national research into the environmental impact of electricity supply. The Government stated that future use of nuclear energy is necessary. The Government then published a nuclear study by its own top technical advisors, the Advisory Council on Science and Technology (ACOST). ACOST recommends that Britain should abandon further research and development on gas-cooled reactors and concentrate wholeheartedly on the PWR, following what it says is the public inquiry's unequivocal endorsement of the Sizewell-B design. The Advisory Council also comments on the fast reactor, in the context of what it calls the Government's responsibility to underpin long-term ventures in power generation. It states that the technology is approaching commercialization

  2. A V and V program for a real time operator advisor expert system

    International Nuclear Information System (INIS)

    Hajek, B.K.; Hardy, C.R.; Miller, D.W.; Bhatnagar, R.

    1991-01-01

    This paper reports on an Operator Advisor (OA) consisting of four integrated expert systems under development at The Ohio State University since 1985. The OA was initially conceived as two independent systems, one to manage procedures for the operator, and the other to diagnose plant faults and to validate sensor data. The OA has used the Perry Nuclear Power Plant simulator as the reference plant. It has been programmed with knowledge gathered from power plant experts and plant documents. Following incremental programming, the OA has been tested off line by running scenarios on the plant simulator and verifying that the OA responded as predicted by the simulator. Specifications have been developed and periodically published in the literature over the past four years. These are currently being collected and expanded upon as part of a formal Verification and Validation (V and V) Program. The V and V Program is defined by three types of documents: specification documents, a V and V document, and procedures to support implementation of the specifications and V and V program

  3. Assisting emergency operating procedures execution with AMAS, an Accident Management Advisor System

    International Nuclear Information System (INIS)

    Guarro, S.; Milici, T.; Wu, J.S.; Apostolakis, G.

    2004-01-01

    In an accident situation, because any decisions that the operators make will depend on how instrumentation readings are ultimately interpreted, the issue of instrument uncertainty is of paramount importance. This uncertainty exists because instrument readings may not be available in the desired form - i.e., only indirect readings for a parameter of interest may exist, with uncertainty on which physical models may be used to deduce its value from these indirect indications -, or because readings may be coming from instruments whose accuracy and reliability in the face of the severe conditions produced by the accident are far from what may be expected under normal operating conditions. In following the EOPs, the operators must rely on instrumentation whose readings may not reflect the real situation. The Accident Management Advisor System (AMAS) is a decision aid intended to supplement plant Emergency Operating Procedures (EOPs) by accounting for instrumentation uncertainty, and by alerting the operators if they are on the wrong procedures, or otherwise performing an action that is not optimal in terms of preventing core damage. In AMAS, the availability and reliability of certain important instrument readings is treated in probabilistic, rather than deterministic terms. This issue is discussed in greater detail later in the paper, since it relates to one of the key characteristics of the AMAS decision aid. (author)

  4. Roofline Analysis in the Intel® Advisor to Deliver Optimized Performance for applications on Intel® Xeon Phi™ Processor

    OpenAIRE

    Koskela, TS; Lobet, M

    2017-01-01

    In this session we show, in two case studies, how the roofline feature of Intel Advisor has been utilized to optimize the performance of kernels of the XGC1 and PICSAR codes in preparation for Intel Knights Landing architecture. The impact of the implemented optimizations and the benefits of using the automatic roofline feature of Intel Advisor to study performance of large applications will be presented. This demonstrates an effective optimization strategy that has enabled these science appl...

  5. Doctoral Advisor-Advisee Pairing in STEM Fields: Selection Criteria and Impact of Faculty, Student and Departmental Factors

    Directory of Open Access Journals (Sweden)

    Simy Joy

    2015-09-01

    Full Text Available Unlike the doctoral programs in places where students are paired with advisors at the time of admission itself, most US programs require the students to choose their advisors, and the advisors to formally accept the students as advisees. Little research has been done to understand how students and faculty approach this mutual selection and pairing process. This paper examines this process in STEM departments (Science, Technology, Engineering and Mathematics, with specific focus on factors influencing the decisions. Based on focus groups and interviews of doctoral students and faculty from STEM departments in an American university, we identify criteria applied by students and faculty in making their choices. Students were found to assess faculty on available funding, area of research, personality, ability to graduate students fast, and career prospects for students, and faculty to assess students on their qualifications/credentials and perceived ability to contribute to research. We also found that this mutual assessment was not objective, but influenced by perceptions associated with faculty gender and career stage, and student nationality. In the end, whether students and faculty were actually paired with persons of their choice depended on departmental factors including prevalent pairing practices, restrictions on student numbers per faculty, and reward structure. We discuss implications of the findings for research and practice.

  6. Comparative analysis of the tools 'Retrofit Advisor' and 'EPIQR+' - Final report; Analisi comparativa degli strumenti 'Retrofit Advisor' e 'EPIQR+' - Rapporto finale

    Energy Technology Data Exchange (ETDEWEB)

    Pittet, D.; Ghirlanda, L.

    2008-07-01

    This report represents the final phase of Swiss Federal Office of Energy project 'Strategy for long-term management of city-owned real estate - the case of the City Council of Chiasso'. It contains a comparative analysis of two tools for the evaluation of the potential for retrofitting and refurbishment of buildings (Retrofit Advisor and Epiqr+). By applying the two tools in parallel, it was possible to compare information and data obtained, and also to obtain indications for the evaluation of the usability of the tools. To achieve this, five buildings in the territory of the city of Chiasso were submitted to the tools for analysis. The applications have highlighted the usability of each case study. The ease of use of Retrofit Advisor has allowed the evaluation of each proposed scenario; by using the same reference system, comparable data are obtained (at indication level) to support the choice of the intervention strategy on existing buildings. In addition to the analysis of the current status, the tool Retrofit Advisor supports a structure analysis over three intervention scenarios, namely reparation, renovation, rebuild. Data entry does not require advanced knowledge of construction work, and is limited to basic characteristics. The analysis performed through Epiqr+ is more rigorous, providing a specific and detailed diagnosis on the state of deterioration of each construction element, supported by a series of intervention suggestions. The Epiqr+ tool has furthermore allowed the evaluation (within a precision range of {+-}15%) the cost of reparation/renovation works, and also the thermal energy balance of each building, based on the characteristics of their envelops. On the basis of contents criteria and cost analysis, the approach has allowed the evaluation of different options for the improvement of the buildings, from simple reparation to total rebuild. Estimates are evaluated in terms of cost, of environmental impact, and, in the case of Retrofit

  7. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  8. Current state in the research on electronic monitoring systems for the security and flow of objects and individuals

    Directory of Open Access Journals (Sweden)

    Man Dietrich Marcela

    2017-01-01

    Full Text Available This paper sets forth the current state of security systems in prisons from Romania and around the world, particularly aiming electronic systems of monitoring the flow of people, materials control and perimeter security, focusing on the research results concluded by motion detection tests and devices. The currently used systems were observed in order to put an analysis of the methodology together and implement and perfect these systems in protected areas. The protection of citizens must be performed to the extent that is allowed by the legislation.

  9. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  10. Summary Report for the Radiation Detection for Nuclear Security Summer School 2012

    Energy Technology Data Exchange (ETDEWEB)

    Runkle, Robert C.; Baciak, James E.; Stave, Jean A.

    2012-08-22

    The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the inaugural Radiation Detection for Nuclear Security Summer School from June 11 – 22, 2012. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. The first week of the summer school focused on the foundational knowledge required by technology practitioners; the second week focused on contemporary applications. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectives of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security.

  11. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  12. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  13. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  14. The recovery boiler advisor. Combination of practical experience and advanced thermodynamic modelling

    Energy Technology Data Exchange (ETDEWEB)

    Backman, R. [Aabo Akademi, Turku (Finland); Eriksson, G. [LTH/RWTH (Germany); Sundstroem, K. [Tampella Power Oy, Tampere (Finland)

    1996-12-31

    The Aabo Advisor is a computer based program intended to provide information about the high temperature ash and fluegas chemistry in pulping spent black liquor recovery boilers of kraft pulp mills. The program can be used for predictions of a variety of furnace and flue gas phenomena, such as fireside fouling of the heat exchanger surfaces caused by the flue gas particulate matter, emissions of SO{sub 2}(g), HCl(g) and NO{sub x}(g) with the flue gas etc. The program determines the composition of the fluegas as well as the amount and composition of the two typical fly ash fractions found in recovery boiler fluegases, the condensed fly ash particles and the carry over particles. These data are used for calculating the melting behavior of the fly ash present at different locations in the boiler and this characteristic behavior is used for the fireside fouling predictions. The program may also be used for studying how different mill processes affecting the black liquor composition affects on the fireside chemistry of the recovery boiler. As input data for the calculations only a few boiler operation parameters and the composition of the black liquor is required. The calculations are based on a one-dimensional, multi-stage chemistry model where both thermodynamic equilibrium calculations and stoichiometric material balances are used. The model calculates at first the chemistry in the lower furnace and smelt after which it moves to the upper furnace and the radiative parts of the fluegas channel. As the last block the program calculates the chemistry in the convective part, the electrostatic precipitator cath and stack. The results from each block are presented in tables, key numbers and melt curves representing the fluegas or fly ash fraction present at each location

  15. Detecting the Online Image of “Average” Restaurants on TripAdvisor

    Directory of Open Access Journals (Sweden)

    Hrvoje Jakopović

    2016-06-01

    Full Text Available Collective intelligence can be interpreted as the actions of individuals that provide collective effects. In online spaces, the more user comments about a matter of discussion, the higher the potential that certain repeated points of view will be used as a story frame. This observation can be a very useful explanation for the value of user comments, reviews and the ratings in the field of public relations. Nowadays, it has become noticeable that many indecisive people who are thinking of buying a product or using a certain service rely on information left by users who already have some kind of experience with the product or service. This information has an effect on decision-making and taking action. In the case of contemporary PR, collective intelligence, facilitated through user comments/reviews, is involved in the image making process. This paper uses the idea of collective intelligence to measure restaurants’ online image, using sentiment analysis to gain insight to users’ attitudes and opinions. Image is interpreted as a short-term outcome of organizational activities that can be identified through individual attitudes and opinions in this study. The author uses sentiment analysis, the use of natural language processing applications, to examine user comments and reviews for restaurants in Dubrovnik rated as “average” on the website TripAdvisor. This paper tests the accuracy of sentiment analysis software, therefore the efficiency of automated sentiment analysis is compared to human sentiment analysis. The results indicate that sentiment analysis tools could be important instruments for the estimation of a positive, negative, or neutral sentiment and detection of organization’s online image.

  16. The recovery boiler advisor. Combination of practical experience and advanced thermodynamic modelling

    Energy Technology Data Exchange (ETDEWEB)

    Backman, R [Aabo Akademi, Turku (Finland); Eriksson, G [LTH/RWTH (Germany); Sundstroem, K [Tampella Power Oy, Tampere (Finland)

    1997-12-31

    The Aabo Advisor is a computer based program intended to provide information about the high temperature ash and fluegas chemistry in pulping spent black liquor recovery boilers of kraft pulp mills. The program can be used for predictions of a variety of furnace and flue gas phenomena, such as fireside fouling of the heat exchanger surfaces caused by the flue gas particulate matter, emissions of SO{sub 2}(g), HCl(g) and NO{sub x}(g) with the flue gas etc. The program determines the composition of the fluegas as well as the amount and composition of the two typical fly ash fractions found in recovery boiler fluegases, the condensed fly ash particles and the carry over particles. These data are used for calculating the melting behavior of the fly ash present at different locations in the boiler and this characteristic behavior is used for the fireside fouling predictions. The program may also be used for studying how different mill processes affecting the black liquor composition affects on the fireside chemistry of the recovery boiler. As input data for the calculations only a few boiler operation parameters and the composition of the black liquor is required. The calculations are based on a one-dimensional, multi-stage chemistry model where both thermodynamic equilibrium calculations and stoichiometric material balances are used. The model calculates at first the chemistry in the lower furnace and smelt after which it moves to the upper furnace and the radiative parts of the fluegas channel. As the last block the program calculates the chemistry in the convective part, the electrostatic precipitator cath and stack. The results from each block are presented in tables, key numbers and melt curves representing the fluegas or fly ash fraction present at each location

  17. Parabolic Trough Collector Cost Update for the System Advisor Model (SAM)

    Energy Technology Data Exchange (ETDEWEB)

    Kurup, Parthiv [National Renewable Energy Lab. (NREL), Golden, CO (United States); Turchi, Craig S. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2015-11-01

    This report updates the baseline cost for parabolic trough solar fields in the United States within NREL's System Advisor Model (SAM). SAM, available at no cost at https://sam.nrel.gov/, is a performance and financial model designed to facilitate decision making for people involved in the renewable energy industry. SAM is the primary tool used by NREL and the U.S. Department of Energy (DOE) for estimating the performance and cost of concentrating solar power (CSP) technologies and projects. The study performed a bottom-up build and cost estimate for two state-of-the-art parabolic trough designs -- the SkyTrough and the Ultimate Trough. The SkyTrough analysis estimated the potential installed cost for a solar field of 1500 SCAs as $170/m2 +/- $6/m2. The investigation found that SkyTrough installed costs were sensitive to factors such as raw aluminum alloy cost and production volume. For example, in the case of the SkyTrough, the installed cost would rise to nearly $210/m2 if the aluminum alloy cost was $1.70/lb instead of $1.03/lb. Accordingly, one must be aware of fluctuations in the relevant commodities markets to track system cost over time. The estimated installed cost for the Ultimate Trough was only slightly higher at $178/m2, which includes an assembly facility of $11.6 million amortized over the required production volume. Considering the size and overall cost of a 700 SCA Ultimate Trough solar field, two parallel production lines in a fully covered assembly facility, each with the specific torque box, module and mirror jigs, would be justified for a full CSP plant.

  18. Security Force Assistance

    Science.gov (United States)

    2009-05-01

    themselves isolated with great autonomy and no The Advisor 1 May 2009 FM 3-07.1 7-3 supervision. These conditions present moral and ethical dilemmas daily...Group 8-59. Cultures may be individualistic or collectivist in their orientation. An individualist culture is one in which the ties between...individuals are loose—where people are expected to take care of themselves and their immediate families. In a collectivist culture, people are raised from

  19. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  20. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  1. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  2. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  3. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  4. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  5. Preliminary field evaluation of solid state cameras for security applications

    International Nuclear Information System (INIS)

    1987-01-01

    Recent developments in solid state imager technology have resulted in a series of compact, lightweight, all-solid-state closed circuit television (CCTV) cameras. Although it is widely known that the various solid state cameras have less light sensitivity and lower resolution than their vacuum tube counterparts, the potential for having a much longer Mean Time Between Failure (MTBF) for the all-solid-state cameras is generating considerable interest within the security community. Questions have been raised as to whether the newest and best of the solid state cameras are a viable alternative to the high maintenance vacuum tube cameras in exterior security applications. To help answer these questions, a series of tests were performed by Sandia National Laboratories at various test sites and under several lighting conditions. In general, all-solid-state cameras need to be improved in four areas before they can be used as wholesale replacements for tube cameras in exterior security applications: resolution, sensitivity, contrast, and smear. However, with careful design some of the higher performance cameras can be used for perimeter security systems, and all of the cameras have applications where they are uniquely qualified. Many of the cameras are well suited for interior assessment and surveillance uses, and several of the cameras are well designed as robotics and machine vision devices

  6. Supporting Rape Survivors Through the Criminal Injuries Compensation Scheme: An Exploration of English and Welsh Independent Sexual Violence Advisors' Experiences.

    Science.gov (United States)

    Smith, Olivia; Galey, Jessica

    2018-07-01

    English and Welsh responses to rape have long been critically examined, leading to attempted improvements in the criminal justice system. Despite this, little attention has been paid to the Criminal Injuries Compensation Scheme (CICS) and the difficulties applying it to rape. To begin addressing this gap, researchers interviewed three, and qualitatively surveyed 22, Independent Sexual Violence Advisors. The findings suggest that CICS may not only reinforce rape myths and disadvantage vulnerable survivors, but is also a source of validation and contributes to survivor justice. The study, while exploratory, therefore, highlights the need for further discussion about rape survivor compensation.

  7. Advisor-advisee relationship: the multiplier knowledge Relação orientador-orientando: o conhecimento multiplicador

    Directory of Open Access Journals (Sweden)

    Lydia Masako Ferreira

    2009-06-01

    Full Text Available The article captures the essence of the advisor-advisee relationship as the fulcrum of the graduate program, and its influence and implications in the present formation process of new researchers.O artigo resgata a essência da relação orientador-orientado como núcleo de sustentação de um programa de pós-graduação senso estrito e suas influências e implicações no processo atual de formação dos pesquisadores.

  8. VAMIL and EIA regulations. Options for the installer/advisor; VAMIL- en EIA-regeling. Kansen voor installateur/adviseur

    Energy Technology Data Exchange (ETDEWEB)

    Wondergem, J. [Wondergem Intermedium, (Netherlands)

    1997-03-01

    The new title financial incentives regulations of the Dutch government are outlined. VAMIL and EIA came into effect January 1, 1997. The regulations offer the tax payer a number of financial advantages when investments are made for energy saving capital goods. Also for installers and advisors the regulations offer new chances to realize energy saving measures in maintenance, replacement or extension of existing installations. In this article attention is paid to the practical possibilities of the VAMIL and EIA regulations for the installation sector. 2 tabs.

  9. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  10. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  11. 78 FR 68040 - President's Council of Advisors on Science and Technology Meeting

    Science.gov (United States)

    2013-11-13

    ... provide updates on its studies of education information technology and cyber- security. Additional... only for substantive commentary on PCAST's work, not for business marketing purposes. Oral Comments: To... ten business days prior to the meeting so that appropriate arrangements can be made. Issued in...

  12. 78 FR 40204 - ProShare Advisors LLC, et al.; Notice of Application

    Science.gov (United States)

    2013-07-03

    ... receive securities from, the series in connection with the purchase and redemption of Creation Units; and... Inside Information Policy. In accordance with the Code of Ethics \\13\\ and Inside Information Policy of.... \\13\\ The Adviser has also adopted or will adopt a code of ethics pursuant to Rule 17j-1 under the Act...

  13. 78 FR 37605 - Sigma Investment Advisors, LLC, et al.; Notice of Application

    Science.gov (United States)

    2013-06-21

    ..., and receive securities from, the series in connection with the purchase and redemption of Creation... with the Code of Ethics \\12\\ and Inside Information Policy of the Adviser and Sub-Advisers, personnel.... \\12\\ The Adviser has also adopted or will adopt a code of ethics pursuant to Rule 17j-1 under the Act...

  14. 77 FR 74230 - PNC Capital Advisors, LLC, et al.; Notice of Application

    Science.gov (United States)

    2012-12-13

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30298; File No. 812-14055... Exchange Commission (``Commission''). ACTION: Notice of an application under section 6(c) of the Investment... voting stock to be owned by investment companies and companies controlled by them. 2. Section 12(d)(1)(G...

  15. 77 FR 22616 - Huntington Asset Advisors, Inc., et al.; Notice of Application

    Science.gov (United States)

    2012-04-16

    ...''), Huntington Strategy Shares (``Trust''), and SEI Investments Distribution Co. Summary of Application.... \\14\\ If Shares are listed on The NASDAQ Stock Market LLC (``Nasdaq'') or a similar electronic Listing... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30032; 812-13785...

  16. 78 FR 11909 - Emerging Global Advisors, LLC, et al.; Notice of Application

    Science.gov (United States)

    2013-02-20

    ... management companies that may utilize active management investment strategies (``Future Funds''). Any Future... discount or premium in relation to their NAV. \\15\\ If Shares are listed on The NASDAQ Stock Market LLC... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30382; 812-14117] Emerging...

  17. 77 FR 76099 - Yorkville ETF Trust and Yorkville ETF Advisors, LLC; Notice of Application

    Science.gov (United States)

    2012-12-26

    ... to have aggregate investment characteristics, fundamental characteristics, and liquidity measures... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 30306; File No. 812-13874... section 6(c) of the Investment Company Act of 1940 (the ``Act'') for an exemption from sections 2(a)(32...

  18. 77 FR 72416 - Foreside Advisor Services, LLC, et al.; Notice of Application

    Science.gov (United States)

    2012-12-05

    ... portfolio as a result of the rebalancing of its Underlying Index (any such change, a ``Rebalancing''). If... portfolio of securities and other instruments (``Portfolio Instruments'') selected to correspond generally... identical, unless the Fund is Rebalancing (as defined below). In addition, the Deposit Instruments and the...

  19. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  20. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  1. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  2. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  3. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  4. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  5. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  6. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  7. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  8. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  9. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  10. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  11. Impacts of Vehicle (In)Security

    Energy Technology Data Exchange (ETDEWEB)

    Chugg, J.; Rohde, K.

    2015-05-01

    Nuclear and radioactive material is routinely transported worldwide every day. Since 2010, the complexity of the transport vehicle to support such activities has grown exponentially. Many core functions of a vehicle are now handled by small embedded computer modules with more being added each year to enhance the owner’s experience and convenience. With a system as complex as today’s automobile, the potential for cyber security issues is certain. Hackers have begun exploring this new domain with public information increasingly disseminated. Because vehicles are allowed into and around secure nuclear facilities, the potential for using a vehicle as a new cyber entry point or vector into the facility is now plausible and must be mitigated. In addition, compromising such a vehicle could aide in illicit removal of nuclear material, putting sensitive cargo at risk. Because cyber attacks can now be introduced using vehicles, cyber security, needs to be integrated into an organization’s design basis threat document. Essentially, a vehicle now extends the perimeter for which security professionals are responsible.Electronic Control Units (ECU) responsible for handling all core and ancillary vehicle functions are interconnected using the controller area network (CAN) bus. A typical CAN network in a modern automobile contains 50 or more ECUs. The CAN protocol now supports a wide variety of areas, including automotive, road transportation, rail transportation, industrial automation, power generation, maritime, military vehicles, aviation, and medical devices. In many ways, the nuclear industry is employing the CAN bus protocol or other similar broadcast serial networks. This paper will provide an overview of the current state of automobile and CAN Bus security, as well as an overview of what has been publicly disclosed by many research organizations. It will then present several hypotheses of how vehicle security issues may impact nuclear activities. An initial

  12. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  13. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  14. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  15. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  16. Radionuclides, Heavy Metals, and Polychlorinated Biphenyls in Soils Collected Around the Perimeter of Low-Level Radioactive Waste Disposal Area G during 2006

    International Nuclear Information System (INIS)

    P. R. Fresquez

    2007-01-01

    Twenty-one soil surface samples were collected in March around the perimeter of Area G, the primary disposal facility for low-level radioactive solid waste at Los Alamos National Laboratory (LANL). Three more samples were collected in October around the northwest corner after elevated tritium levels were detected on an AIRNET station located north of pit 38 in May. Also, four soil samples were collected along a transect at various distances (48, 154, 244, and 282 m) from Area G, starting from the northeast corner and extending to the Pueblo de San Ildefonso fence line in a northeasterly direction (this is the main wind direction). Most samples were analyzed for radionuclides ( 3 H, 238 Pu, 239,240 Pu, 241 Am, 234 U, 235 U, and 238 U), inorganic elements (Al, Ba, Be, Ca, Cr, Co, Cu, Fe, Mg, Mn, Ni, K, Na, V, Hg, Zn, Sb, As, Cd, Pb, Se, Ag, and Tl) and polychlorinated biphenyl (PCB) concentrations. As in previous years, the highest levels of 3 H in soils (690 pCi/mL) were detected along the south portion of Area G near the 3 H shafts; whereas, the highest concentrations of 241 Am (1.2 pCi/g dry) and the Pu isotopes (1.9 pCi/g dry for 238 Pu and 5 pCi/g dry for 239,240 Pu) were detected along the northeastern portions near the transuranic waste pads. Concentrations of 3 H in three soil samples and 241 Am and Pu isotopes in one soil sample collected around the northwest corner in October increased over concentrations found in soils collected at the same locations earlier in the year. Almost all of the heavy metals, with the exception of Zn and Sb in one sample each, in soils around the perimeter of Area G were below regional statistical reference levels (mean plus three standard deviations) (RSRLs). Similarly, only one soil sample collected on the west side contained PCB concentrations--67 (micro)g/kg dry of aroclor-1254 and 94 (micro)g/kg dry of aroclor-1260. Radionuclide and inorganic element concentrations in soils collected along a transect from Area G to the

  17. Communicating Health Risks under Pressure: Homeland Security Applications

    International Nuclear Information System (INIS)

    Garrahan, K.G.; Collie, S.L.

    2006-01-01

    The U.S. Environmental Protection Agency's (EPA) Office of Research and Development (ORD) Threat and Consequence Assessment Division (TCAD) within the National Homeland Security Research Center (NHSRC) has developed a tool for rapid communication of health risks and likelihood of exposure in preparation for terrorist incidents. The Emergency Consequence Assessment Tool (ECAT) is a secure web-based tool designed to make risk assessment and consequence management faster and easier for high priority terrorist threat scenarios. ECAT has been designed to function as 'defensive play-book' for health advisors, first responders, and decision-makers by presenting a series of evaluation templates for priority scenarios that can be modified for site-specific applications. Perhaps most importantly, the risk communication aspect is considered prior to an actual release event, so that management or legal advisors can concur on general risk communication content in preparation for press releases that can be anticipated in case of an actual emergency. ECAT serves as a one-stop source of information for retrieving toxicological properties for agents of concern, estimating exposure to these agents, characterizing health risks, and determining what actions need to be undertaken to mitigate the risks. ECAT has the capability to be used at a command post where inputs can be checked and communicated while the response continues in real time. This front-end planning is intended to fill the gap most commonly identified during tabletop exercises: a need for concise, timely, and informative risk communication to all parties. Training and customization of existing chemical and biological release scenarios with modeling of exposure to air and water, along with custom risk communication 'messages' intended for public, press, shareholders, and other partners enable more effective communication during times of crisis. For DOE, the ECAT could serve as a prototype that would be amenable to

  18. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  19. Using cyber vulnerability testing techniques to expose undocumented security vulnerabilities in DCS and SCADA equipment

    International Nuclear Information System (INIS)

    Pollet, J.

    2006-01-01

    This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-critical networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)

  20. Using cyber vulnerability testing techniques to expose undocumented security vulnerabilities in DCS and SCADA equipment

    Energy Technology Data Exchange (ETDEWEB)

    Pollet, J. [PlantData Technologies, Inc., 1201 Louisiana Street, Houston, TX 77002 (United States)

    2006-07-01

    This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-critical networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)

  1. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  2. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  3. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  4. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  5. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  6. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  7. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  8. Repeatability of Retinal Sensitivity Measurements Using a Medmont Dark-Adapted Chromatic Perimeter in Healthy and Age-Related Macular Degeneration Cases.

    Science.gov (United States)

    Tan, Rose S; Guymer, Robyn H; Luu, Chi D

    2018-05-01

    To determine the intrasession and intersession test-retest repeatability of retinal sensitivity measurements using a dark-adapted chromatic perimeter (DACP). For intrasession testing, retinal sensitivity within the central 24° for the 505-nm stimulus was measured after 20, 30, and 40 minutes of dark adaptation (DA) and for the 625-nm stimulus was measured after the first and second 505-nm tests. For intersession testing, retinal sensitivity for both stimuli was measured after 30 minutes of DA at baseline and 1 month. The point-wise sensitivity (PWS) difference and coefficient of repeatability (CoR) of each stimulus and group were determined. For intrasession testing, 10 age-related macular degeneration (AMD) and eight control subjects were recruited. The overall CoR for the 505-nm stimulus was 8.4 dB for control subjects and 9.1 dB for AMD cases, and for the 625-nm stimulus was 6.7 dB for control subjects and 9.5 dB for AMD cases. For intersession testing, seven AMD cases and 13 control subjects returned an overall CoR for the 505-nm stimulus of 8.2 dB for the control and 11.7 dB for the AMD group. For the 625-nm stimulus the CoR was 6.2 dB for the control group and 8.4 dB for the AMD group. Approximately 80% of all test points had a PWS difference of ±5 dB between the two intrasession or intersession measurements for both stimuli. The CoR for the DACP is larger than that reported for scotopic perimeters; however, the majority of test points had a PWS difference of ±5 dB between tests. The DACP offers an opportunity to measure static and dynamic rod function at multiple locations with an acceptable reproducibility level.

  9. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  10. Dissertation Leadership Knowledge Transfer Using Sparsely Connected Networks with Bidirectional Edges: Case Study of Chester Hayden McCall Jr., His Dissertation Advisors, and His Students

    Science.gov (United States)

    Mallette, Leo A.

    2012-01-01

    There are many modes of information flow in the sciences: books, journals, conferences, research and development, acquisition of companies, co-workers, students, and professors in schools of higher learning. In the sciences, dissertation students learn from their dissertation advisor (or chairperson or mentor) and the other dissertation committee…

  11. Navigating graduate school and beyond: A career guide for graduate students and a must read for every advisor

    Science.gov (United States)

    Schultz, Colin

    2012-05-01

    Beginning his scientific career as an engineering student at PSG College of Technology, in Coimbatore, India, Sundar A. Christopher has negotiated and navigated the higher-education system to become the chairman of the Department of Atmospheric Sciences at the University of Alabama in Huntsville. Drawing on his own experiences and on insights gleaned from the students who have passed through his graduate-level professional development course, Christopher takes a lighthearted look at peer review, proposal writing, managing budgets, and making the most of conferences in the AGU bookNavigating Graduate School and Beyond: A Career Guide for Graduate Students and a Must Read for Every Advisor. In this interview, Eos speaks to Christopher about overcoming the bureaucratic, logistical, and personal hurdles that too often lead students to disillusionment and conflict.

  12. University First Year Advisors: A network approach for first year student transition and retention. A Practice Report.

    Directory of Open Access Journals (Sweden)

    Geraldine Box

    2012-03-01

    Full Text Available Focussing expressly on student support and retention, improving the first year experience has been addressed by Murdoch University through the implementation of a School discipline-specific network of professional First Year Advisors (FYAs. FYA initiatives, both broad-based and varied, have been developed in alignment with the changing needs of students as identified throughout the semesters. A combination of outreach telephone campaigns and face-to-face student support enables FYAs to conduct a "just in time" approach to positively increase student engagement, and ultimately, retention. With a bespoke database, FYAs and academic staff have been able to streamline the process of reporting students in need of support, and gather data relating to student retention. The FYA program is yet to be formally evaluated although initial feedback and student consultation is promising. This paper outlines the program's development, current initiatives and expected outcomes.  

  13. The Challenges of Field Testing the Traffic Management Advisor (TMA) in an Operational Air Traffic Control Facility

    Science.gov (United States)

    Hoang, Ty; Swenson, Harry N.

    1997-01-01

    The Traffic Management Advisor (TMA), the sequence and schedule tool of the Center/TRACON Automation System (CTAS), was evaluated at the Fort Worth Center (ZFW) in the summer of 1996. This paper describes the challenges encountered during the various phases of the TMA field evaluation, which included system (hardware and software) installation, personnel training, and data collection. Operational procedures were developed and applied to the evaluation process that would ensure air safety. The five weeks of field evaluation imposed minimal impact on the hosting facility and provided valuable engineering and human factors data. The collection of data was very much an opportunistic affair, due to dynamic traffic conditions. One measure of the success of the TMA evaluation is that, rather than remove TMA after the evaluation until it could be fully implemented, the prototype TMA is in continual use at ZFW as the fully operational version is readied for implementation.

  14. An intrusion prevention system as a proactive security mechanism in network infrastructure

    Directory of Open Access Journals (Sweden)

    Dulanović Nenad

    2008-01-01

    Full Text Available A properly configured firewall is a good starting point in securing a computer network. However, complex network environments that involve higher number of participants and endpoints require better security infrastructure. Intrusion Detection Systems (IDS, proposed as a solution to perimeter defense, have many open problems and it is clear that better solutions must be found. Due to many unsolved problems associated with IDS, Intrusion Prevention Systems (IPS are introduced. The main idea in IPS is to be proactive. This paper gives an insight of Cobrador Bouncer IPS implementation. System architecture is given and three different Bouncer IPS deployment modes are presented. The Bouncer IPS as a proactive honeypot is also discussed.

  15. The Role of Student-Advisor Interactions in Apprenticing Undergraduate Researchers into a Scientific Community of Practice

    Science.gov (United States)

    Thiry, Heather; Laursen, Sandra L.

    2011-12-01

    Among science educators, current interest in undergraduate research (UR) is influenced both by the traditional role of the research apprenticeship in scientists' preparation and by concerns about replacing the current scientific workforce. Recent research has begun to demonstrate the range of personal, professional, and intellectual benefits for STEM students from participating in UR, yet the processes by which student-advisor interactions contribute to these benefits are little understood. We employ situated learning theory (Lave and Wenger, Situated learning: legitimate peripheral participation, Cambridge University Press, Cambridge in 1991) to examine the role of student-advisor interactions in apprenticing undergraduate researchers, particularly in terms of acculturating students to the norms, values, and professional practice of science. This qualitative study examines interviews with a diverse sample of 73 undergraduate research students from two research-extensive institutions. From these interviews, we articulate a continuum of practices that research mentors employed in three domains to support undergraduate scientists-in-training: professional socialization, intellectual support, and personal/emotional support. The needs of novice students differed from those of experienced students in each of these areas. Novice students needed clear expectations, guidelines, and orientation to their specific research project, while experienced students needed broader socialization in adopting the traits, habits, and temperament of scientific researchers. Underrepresented minority students, and to a lesser extent, women, gained confidence from their interactions with their research mentors and broadened their future career and educational possibilities. Undergraduate research at research-extensive universities exemplifies a cycle of scientific learning and practice where undergraduate researchers are mentored by graduate students and postdoctoral researchers, who are

  16. Working Together to Deliver Usable Climate Information to Agricultural Producers and Advisors in the U.S. Corn Belt

    Science.gov (United States)

    Prokopy, L. S.; Widhalm, M.

    2012-12-01

    Weather and climate patterns are a driving force behind the success or failure of cropping systems. With U.S. corn and soybean production accounting for nearly one-third of global supplies and contributing $100 billion annually to the national economy, the ability to successfully produce crops under more variable climate conditions is critical. Useful to Usable (U2U): Transforming Climate Variability and Change Information for Cereal Crop Producers is a USDA-funded research and extension project focused on delivering to producers and farm advisors the resources and training they need to more effectively manage variable climate conditions. The U2U team is a diverse and uniquely qualified group of climatologists, crop modelers, agronomists, economists, and social scientists from 10 Midwestern universities and two NOAA Regional Climate Centers. Together, we strive to help producers make better long-term plans on what, when and where to plant and also how to manage crops for maximum yields and minimum environmental damage. Under development are tools that will allow the agricultural community to examine the financial, production, and environmental outcomes of different management options and climate scenarios so farmers can choose strategies that fit their capabilities and acceptable levels of risk. Researchers are currently using existing data and agro-climate models to investigate the impact of climate conditions on key topics such as crop yields, fieldwork opportunities, nitrogen management, and the cost-effectiveness of irrigation and tiling. To ensure relevance and usability of U2U products, our social science team is using a number of techniques including surveys and focus groups to integrate stakeholder interests, needs, and concerns into all aspects of U2U research. It is through this coupling of physical and social science disciplines that we strive to transform existing climate information into actionable knowledge. This presentation will elaborate on U2U

  17. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  18. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  19. Conceptual Design Approach to Implementing Hardware-based Security Controls in Data Communication Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ibrahim, Ahmad Salah; Jung, Jaecheon [KEPCO International Nuclear Graduate School, Ulsan (Korea, Republic of)

    2016-10-15

    In the Korean Advanced Power Reactor (APR1400), safety control systems network is electrically isolated and physically separated from non-safety systems data network. Unidirectional gateways, include data diode fiber-optic cabling and computer-based servers, transmit the plant safety critical parameters to the main control room (MCR) for control and monitoring processes. The data transmission is only one-way from safety to non-safety. Reverse communication is blocked so that safety systems network is protected from potential cyberattacks or intrusions from non-safety side. Most of commercials off-the-shelf (COTS) security devices are software-based solutions that require operating systems and processors to perform its functions. Field Programmable Gate Arrays (FPGAs) offer digital hardware solutions to implement security controls such as data packet filtering and deep data packet inspection. This paper presents a conceptual design to implement hardware-based network security controls for maintaining the availability of gateway servers. A conceptual design of hardware-based network security controls was discussed in this paper. The proposed design is aiming at utilizing the hardware-based capabilities of FPGAs together with filtering and DPI functions of COTS software-based firewalls and intrusion detection and prevention systems (IDPS). The proposed design implemented a network security perimeter between the DCN-I zone and gateway servers zone. Security control functions are to protect the gateway servers from potential DoS attacks that could affect the data availability and integrity.

  20. Conceptual Design Approach to Implementing Hardware-based Security Controls in Data Communication Systems

    International Nuclear Information System (INIS)

    Ibrahim, Ahmad Salah; Jung, Jaecheon

    2016-01-01

    In the Korean Advanced Power Reactor (APR1400), safety control systems network is electrically isolated and physically separated from non-safety systems data network. Unidirectional gateways, include data diode fiber-optic cabling and computer-based servers, transmit the plant safety critical parameters to the main control room (MCR) for control and monitoring processes. The data transmission is only one-way from safety to non-safety. Reverse communication is blocked so that safety systems network is protected from potential cyberattacks or intrusions from non-safety side. Most of commercials off-the-shelf (COTS) security devices are software-based solutions that require operating systems and processors to perform its functions. Field Programmable Gate Arrays (FPGAs) offer digital hardware solutions to implement security controls such as data packet filtering and deep data packet inspection. This paper presents a conceptual design to implement hardware-based network security controls for maintaining the availability of gateway servers. A conceptual design of hardware-based network security controls was discussed in this paper. The proposed design is aiming at utilizing the hardware-based capabilities of FPGAs together with filtering and DPI functions of COTS software-based firewalls and intrusion detection and prevention systems (IDPS). The proposed design implemented a network security perimeter between the DCN-I zone and gateway servers zone. Security control functions are to protect the gateway servers from potential DoS attacks that could affect the data availability and integrity

  1. Feature-based alert correlation in security systems using self organizing maps

    Science.gov (United States)

    Kumar, Munesh; Siddique, Shoaib; Noor, Humera

    2009-04-01

    The security of the networks has been an important concern for any organization. This is especially important for the defense sector as to get unauthorized access to the sensitive information of an organization has been the prime desire for cyber criminals. Many network security techniques like Firewall, VPN Concentrator etc. are deployed at the perimeter of network to deal with attack(s) that occur(s) from exterior of network. But any vulnerability that causes to penetrate the network's perimeter of defense, can exploit the entire network. To deal with such vulnerabilities a system has been evolved with the purpose of generating an alert for any malicious activity triggered against the network and its resources, termed as Intrusion Detection System (IDS). The traditional IDS have still some deficiencies like generating large number of alerts, containing both true and false one etc. By automatically classifying (correlating) various alerts, the high-level analysis of the security status of network can be identified and the job of network security administrator becomes much easier. In this paper we propose to utilize Self Organizing Maps (SOM); an Artificial Neural Network for correlating large amount of logged intrusion alerts based on generic features such as Source/Destination IP Addresses, Port No, Signature ID etc. The different ways in which alerts can be correlated by Artificial Intelligence techniques are also discussed. . We've shown that the strategy described in the paper improves the efficiency of IDS by better correlating the alerts, leading to reduced false positives and increased competence of network administrator.

  2. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  3. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  4. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  5. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  6. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  7. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  8. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  9. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  10. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  11. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  12. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  13. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  14. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  15. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  16. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  17. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  18. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  19. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  20. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  1. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  2. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  3. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  4. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  5. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  6. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  7. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  8. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  9. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  10. Operations Security (OPSEC) Guide

    Science.gov (United States)

    2011-04-01

    Request for Proposal TAC Threat Analysis Center TECHINT Technical Intelligence TMAP Telecommunications Monitoring and Assessment Program TTP...communications security, use of secure telephones, and a robust Telecommunications Monitoring and Assessment Program ( TMAP ) prevents undetermined...and AFI 33-219, Telecommunications Monitoring and Assessment Program ( TMAP ), or Information Assurance (IA) or Communications Security (COMSEC

  11. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  12. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  13. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  14. Refelctions on the security

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  15. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  16. Expert Advisor (EA) Evaluation System Using Web-based ELECTRE Method in Foreign Exchange (Forex) Market

    Science.gov (United States)

    Satibi; Widodo, Catur Edi; Farikhin

    2018-02-01

    This research aims to optimize forex trading profit automatically using EA but its still keep considering accuracy and drawdown levels. The evaluation system will classify EA performance based on trading market sessions (Sydney, Tokyo, London and New York) to determine the right EA to be used in certain market sessions. This evaluation system is a web-based ELECTRE methods that interact in real-time with EA through web service and are able to present real-time charts performance dashboard using web socket protocol communications. Web applications are programmed using NodeJs. In the testing period, all EAs had been simulated 24 hours in all market sessions for three months, the best EA is valued by its profit, accuracy and drawdown criteria that calculated using web-based ELECTRE method. The ideas of this research are to compare the best EA on testing period with collaboration performances of each best classified EA by market sessions. This research uses three months historical data of EUR/USD as testing period and other 3 months as validation period. As a result, performance of collaboration four best EA classified by market sessions can increase profits percentage consistently in testing and validation periods and keep securing accuracy and drawdown levels.

  17. Expert Advisor (EA Evaluation System Using Web-based ELECTRE Method in Foreign Exchange (Forex Market

    Directory of Open Access Journals (Sweden)

    Satibi Satibi

    2018-01-01

    Full Text Available This research aims to optimize forex trading profit automatically using EA but its still keep considering accuracy and drawdown levels. The evaluation system will classify EA performance based on trading market sessions (Sydney, Tokyo, London and New York to determine the right EA to be used in certain market sessions. This evaluation system is a web-based ELECTRE methods that interact in real-time with EA through web service and are able to present real-time charts performance dashboard using web socket protocol communications. Web applications are programmed using NodeJs. In the testing period, all EAs had been simulated 24 hours in all market sessions for three months, the best EA is valued by its profit, accuracy and drawdown criteria that calculated using web-based ELECTRE method. The ideas of this research are to compare the best EA on testing period with collaboration performances of each best classified EA by market sessions. This research uses three months historical data of EUR/USD as testing period and other 3 months as validation period. As a result, performance of collaboration four best EA classified by market sessions can increase profits percentage consistently in testing and validation periods and keep securing accuracy and drawdown levels.

  18. Perceptions of pre-clerkship medical students and academic advisors about sleep deprivation and its relationship to academic performance: a cross-sectional perspective from Saudi Arabia.

    Science.gov (United States)

    AlFakhri, Lama; Sarraj, Jumana; Kherallah, Shouq; Kuhail, Khulood; Obeidat, Akef; Abu-Zaid, Ahmed

    2015-12-01

    The medical student population is believed to be at an increased risk for sleep deprivation. Little is known about students' perceptions towards sleep deprivation and its relationship to academic performance. The aim of study is to explore the perceptions of medical students and their academic advisors about sleep deprivation and its relationship to academic performance. The study took place at Alfaisal University, College of Medicine, Riyadh, Saudi Arabia. An online, anonymous, cross-sectional, self-rating survey was administered to first-, third-year students and their academic advisors. Two-tailed Mann-Whitney U test was used to compare the mean 5-point Likert scale responses between students according to gender, academic year and cumulative grade point average (cGPA). A total of 259 students and 21 academic advisors participated in the survey (response rates: 70.6 and 84%, respectively). The vast majority of students agreed that sleep deprivation negatively affects academic performance (78.8%) and mood (78.4%). Around 62.2 and 73.7% of students agreed that the demanding medical curriculum and stress of final exams lead to sleep deprivation, respectively. While 36.7% of students voiced the need for incorporation of curricular separate courses about healthy sleep patterns into medical curriculum, a much greater proportion of students (45.9%) expressed interest in extracurricular activities about healthy sleep patterns. Interestingly, only 13.5% of students affirmed that they were counselled about sleep patterns and academic performance by their academic advisors. There were several statistically significant differences of means of students' perceptions according to gender, academic year and cGPA. Despite almost all academic advisors (95.5%) asserted the importance of sleep patterns to academic performance, none (0%) inquired about sleep patterns when counselling students. Nineteen academic advisors (90.5%) recommended incorporation of sleep patterns related

  19. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  20. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  1. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  2. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  3. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  4. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  5. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  6. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  7. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  8. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  9. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  10. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  11. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  12. Redox-Active Star Molecules Incorporating the 4-Benzoylpyridinium Cation - Implications for the Charge Transfer Along Branches vs. Across the Perimeter in Dendrimer

    Science.gov (United States)

    Leventis, Nicholas; Yang, Jinua; Fabrizio,Even F.; Rawashdeh, Abdel-Monem M.; Oh, Woon Su; Sotiriou-Leventis, Chariklia

    2004-01-01

    Dendrimers are self-repeating globular branched star molecules, whose fractal structure continues to fascinate, challenge, and inspire. Functional dendrimers may incorporate redox centers, and potential applications include antennae molecules for light harvesting, sensors, mediators, and artificial biomolecules. We report the synthesis and redox properties of four star systems incorporating the 4-benzoyl-N-alkylpyridinium cation; the redox potential varies along the branches but remains constant at fixed radii. Bulk electrolysis shows that at a semi-infinite time scale all redox centers are electrochemically accessible. However, voltammetric analysis (cyclic voltammetry and differential pulse voltammetry) shows that on1y two of the three redox-active centers in the perimeter are electrochemically accessible during potential sweeps as slow as 20 mV/s and as fast as 10 V/s. On the contrary, both redox centers along branches are accessible electrochemically within the same time frame. These results are explained in terms of slow through-space charge transfer and the globular 3-D folding of the molecules and are discussed in terms of their implications on the design of efficient redox functional dendrimers.

  13. P. Gluckman Chief Science Advisor to the Prime Minister, New Zealand signing the Guest book with CERN Director-General R. Heuer and Head of International Relations R. Voss. Accompanied by A. Bell throughout.

    CERN Multimedia

    Anna Pantelia

    2013-01-01

    P. Gluckman Chief Science Advisor to the Prime Minister, New Zealand signing the Guest book with CERN Director-General R. Heuer and Head of International Relations R. Voss. Accompanied by A. Bell throughout.

  14. National Science Foundation Assistant Director for Mathematics and Physical Sciences Tony Chan (USA) visiting LHCb experiment on 23rd May 2007 with Spokesperson T. Nakada, Advisor to CERN Director-General J. Ellis and I. Belyaev of Syracuse

    CERN Multimedia

    Maximilien Brice

    2007-01-01

    National Science Foundation Assistant Director for Mathematics and Physical Sciences Tony Chan (USA) visiting LHCb experiment on 23rd May 2007 with Spokesperson T. Nakada, Advisor to CERN Director-General J. Ellis and I. Belyaev of Syracuse

  15. Japanese Ministry of Education, Culture, Sports, Science and Technology (MEXT) representative H. Ikukawa visiting ATLAS experiment with Collaboration Spokesperson P. Jenni, KEK representative T. Kondo and Advisor to CERN DG J. Ellis on 15 May 2007.

    CERN Multimedia

    Maximilien Brice

    2007-01-01

    Japanese Ministry of Education, Culture, Sports, Science and Technology (MEXT) representative H. Ikukawa visiting ATLAS experiment with Collaboration Spokesperson P. Jenni, KEK representative T. Kondo and Advisor to CERN DG J. Ellis on 15 May 2007.

  16. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  17. Perceptions of pre-clerkship medical students and academic advisors about sleep deprivation and its relationship to academic performance: a cross-sectional perspective from Saudi Arabia

    OpenAIRE

    AlFakhri, Lama; Sarraj, Jumana; Kherallah, Shouq; Kuhail, Khulood; Obeidat, Akef; Abu-Zaid, Ahmed

    2015-01-01

    Background The medical student population is believed to be at an increased risk for sleep deprivation. Little is known about students? perceptions towards sleep deprivation and its relationship to academic performance. The aim of study is to explore the perceptions of medical students and their academic advisors about sleep deprivation and its relationship to academic performance. Methods The study took place at Alfaisal University, College of Medicine, Riyadh, Saudi Arabia. An online, anony...

  18. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  19. Overview of security culture

    International Nuclear Information System (INIS)

    Matulanya, M. A.

    2014-04-01

    Nuclear Security culture concept has been aggressively promoted over the past several years as a tool to improve the physical protection of the nuclear and radioactive materials due to growing threats of catastrophic terrorism and other new security challenges. It is obvious that, the scope of nuclear security and the associated cultures need to be extended beyond the traditional task of protecting weapons-usable materials. The role of IAEA is to strengthen the nuclear security framework globally and in leading the coordination of international activities in this field. Therefore all governments should work closely with the IAEA to take stronger measures to ensure the physical protection, the safety and security of the nuclear and radioactive materials. In the effort to reflect this new realities and concerns, the IAEA in 2008 came up with the document, the Nuclear Security Culture, Nuclear Security Series No. 7, Implementing Guide to the member states which urged every member state to take appropriate measures to promote security culture with respect to nuclear and radioactive materials. The document depicted this cultural approach as the way to protect individual, society and the environment. Among other things, the document defined nuclear security culture as characteristics and attitudes in organizations and of individuals which establishes that, nuclear security issues receives attention warranted by their significance. (au)

  20. Usability Evaluation of Spot and Runway Departure Advisor (SARDA) Concept in Dallas/Fort Worth Airport Tower Simulation

    Science.gov (United States)

    Hayashi, Miwa; Hoang, Ty; Jung, Yoon C.; Gupta, Gautam; Malik, Waqar; Dulchinos, Victoria

    2013-01-01

    Spot and Runway Departure Advisor (SARDA) is a proposed decision-support tool for air traffic control tower controllers for reducing taxi delay and optimizing the departure sequence. In the present study, the tool's usability was evaluated to ensure that its claimed performance benefits are not being realized at the cost of increasing the work burden on controllers. For the evaluation, workload ratings and questionnaire responses collected during a human-in-the-loop simulation experiment were analyzed to assess the SARDA advisories' effects on the controllers' ratings on cognitive resources (e.g., workload, spare attention) and satisfaction. The results showed that SARDA reduced the controllers' workload and increased their spare attention. It also made workload and attention levels less susceptible to the effects of increases in the traffic load. The questionnaire responses suggested that the controllers generally were satisfied with the ease of use of the tool and the objectives of the SARDA concept, but with some caution. To gain more trust from controllers, the the reasoning behind advisories may need to be made more transparent to them.